Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views62 pages

WC Lab Manual For Student

Uploaded by

krishhadiya27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views62 pages

WC Lab Manual For Student

Uploaded by

krishhadiya27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

Ahmedabad Institute of Technology

Information Technology Department


Wireless Communication (3171608)
Laboratory Manual
Year:

NAME

ENROLLMENT NUMBER

BATCH

YEAR

SUBJECT COORDINATOR SUBJECT MEMBER

Page | 1
DEPARTMENT OF INFORMATION TECHNOLOGY

VISION
“To impart quality education and research in Information Technology to
produce a competent, committed and goal oriented workforce to fulfill the
needs of the local and global IT Industry.”

Mission of the Department


The Department‘s Mission is to advance knowledge in the field of Information
Technology and Allied Science by providing our students with the highest quality
educational experience towards
1. M1: Producing quality workforce with cutting edge technology.
2. M2: Engaging in innovative teaching, learning, research and community
service.
3. M3: Inculcating sense of ethical attitude, social responsibility and
developing leadership quality required for a responsible IT professional.

Program Educational Objectives (PEO):


PEO1: To provide the fundamentals of science, mathematics, electronics and
computer science and engineering and skills necessary for a successful IT
professional.
PEO2: To provide scope to learn, apply skills, techniques and competency to use
modern engineering tools to solve computational problems.
PEO3: To enable young graduates to adapt to the challenges of evolving career
opportunities in their chosen fields of career including higher studies, research
avenues, entrepreneurial activities etc.
PEO4: To inculcate life-long learning aptitude, leadership qualities and
teamwork ability with a sense of ethics for a successful professional career in
their chosen field.

Page | 2
PROGRAM OUTCOMES (POs)
Engineering Graduates will be able to:
1. Engineering knowledge: Apply the knowledge of mathematics, science,
engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and
analyze complex engineering problems reaching substantiated conclusions
using first principles of mathematics, natural sciences, and engineering
sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
4. Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments, analysis
and interpretation of data, and synthesis of the information to provide valid
conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modeling to complex engineering activities with an understanding of the
limitations.
6. The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and
demonstrate the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large, such as,
being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear
instructions.
11. Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply these
to one’s own work, as a member and leader in a team, to manage projects and
in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and
ability to engage in independent and life-long learning in the broadest context
of technological change.
Page | 3
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY
PREFACE
It gives us immense pleasure to present the first edition of Wireless
Communication Practical Book for the B.E. 3 rd year students of Ahmedabad
Institute of Technology.
This manual is intended where connectivity drives innovation and societal
progress, wireless communication stands at the forefront of technological
advancement. This text aims to provide a comprehensive overview of the
principles, technologies, and applications that underpin wireless
communication systems.

From the early days of radio waves to the sophisticated networks that enable
our smartphones and IoT devices, wireless communication has
revolutionized the way we interact with the world. This journey not only
highlights the technological milestones but also explores the challenges and
solutions that have shaped the industry.
As we delve into topics such as modulation techniques, signal propagation,
and network architectures, we will also address the impact of emerging
technologies like 5G and beyond. The importance of security, spectrum
management, and the future of wireless communication will be examined,
providing a holistic view of the field.

Whether you are a student, professional, or enthusiast, this text serves as both
a foundational resource and a springboard for deeper exploration into the
dynamic world of wireless communication. Let us embark on this journey to
understand how wireless technologies continue to transform our lives and
connect us in unprecedented ways.

Lab Manual Revised by: Margi Patel

Page | 4
1. Be punctual in arriving at the laboratory with your lab manual and always
wear your ID card.

2. It is mandatory to bring a lab manual in every practical session.

3. Students have to maintain discipline in the lab and should not create any
unnecessary chaos.

4. Students are supposed to occupy the systems allotted to them and are not
supposed to talk or make noise in the lab.

5. Students are required to carry their observation book and lab records with
completed exercises while entering the lab.

6. Lab records need to be submitted every week.

7. Students are not supposed to use pen drives in the lab.

8. All the observations have to be neatly recorded in the Practical Book and
verified by the instructor before leaving the laboratory.

Page | 5
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY

Do’s:

1. Enter the laboratory in student uniform and carry Student ID.


2. Leave footwear outside and keep bags or any other belongings in designated storage
places. Do not keep any valuable things in bags.
3. Carry only the laboratory notebook into the laboratory and keep other belongings at the
place designated for keeping belongings.
4. Know the location of the fire extinguisher and the first aid box and how to use them in
case of an emergency.
5. Report fires or accidents to your lecturer/laboratory technician immediately
6. Report any broken plugs or exposed electrical wires to your lecturer/laboratory
technician immediately.
7. Read and understand how to carry out an activity thoroughly before coming to the
laboratory.
8. For system problems, call laboratory staff for resolving, and do not try to repair the
system on your own.
9. Access to the internet is only on designated systems and against permission.
10. Ensure computer systems are properly shutdown and other equipment are turned-off
after use.
11. Follow the rules of the laboratory strictly. Violation of rules may attract punishment.

Page | 6
WIRELESS COMMUNICATION PRACTICAL BOOK
DEPARTMENT OF INFORMATION TECHNOLOGY

Don’ts:

1. Do not eat or drink in the laboratory.


2. Do not carry and use any pen drive, electronic gadget or cell phone in the laboratory.
3. Do not install, update or download any software on your own in any computer inside
the laboratory.
4. Do not use any unauthorized software or tools.
5. Do not alter or delete configuration settings of any computer laboratory system.
6. Tampering, deleting or modifying CMOS/BIOS settings, IP Configuration, system
parameters, or system files stored in the hard disk are strictly prohibited in the
laboratory.
7. No student or personnel is allowed to attach or detach any peripheral to and from any
IT equipment or devices without explicit permission from the Lab In charge/ Lab
Technician.
8. Do not write/scratch on monitors, walls, tables or chairs in the laboratory.
9. Avoid stepping on electrical wires or any other computer cables.
10. Do not open the system unit casing or monitor casing particularly when the power is
turned on. Some internal components hold electric voltages of up to 30000 volts, which
can be fatal.
11. Do not insert metal objects such as clips, pins and needles into the computer
casings.They may cause fire.

Page | 7
Ahmedabad Institute of Technology
Information Technology Department

CERTIFICATE
This is to certify that Mr. /
Ms._________________________________ of Enrolment No
___________________________has satisfactorily completed the
course in ____________________________________as by the
Gujarat Technological University for ____ Year (B.E.) semester___ of
Information Technology in the Academic year ______.

Date of Submission:-

Faculty Name: Mr. Vipul Patel

Signature (Head Of Department)

Page | 8
INDEX

Page No.
Sr. Experiment Date Marks Signature
No. From To

To study and discuss the mobile


communication standards
1. usefulness of MATLAB for
wireless communication.

To study and analyze Friis Free


2.
Space Propagation Model using
the MATLAB program.

To study and analyze the Log


3.
Distance Path Loss Model using
the MATLAB program.

To study and analyze the

4. Okumura-Hata Model using the


MATLAB program.

5. To study and analyze Two-ray


ground reflection Model using
MATLAB program.

6. To study and analyze a single


knife-edge diffraction Model using
the MATLAB program.

Page | 9
7. To study and write a MATLAB
program to find the cluster size for
different values of i and j and also
find the Q - factor

8. To study different diversity


schemes

9. To study about Mobile trainer


system

10. To understand and read the content


of SIM Card

11. To observe and understand the


process of call connection and call
release of mobile systems.

Page | 10
EXPERIMENT NO: 1 DATE: / /

Aim:

To study and discuss the mobile communication standards and usefulness of MATLAB
for wireless communication.

Theory:
● Wireless engineers use MATLAB to reduce development time, eliminate design
problems early, and streamline testing and verification.

MATLAB provides all these functionalities to analyze and compute wireless system
parameters:

● Prove algorithm and system design concepts with simulation and over-the-air
signals.

● Generate customizable waveforms to verify conformance to the latest 5G, LTE,


and WLAN standards.

● Create models using digital, RF, and antenna elements to explore and optimize
system behavior.

● Automatically generate HDL or C code for prototyping and implementation


without hand-coding.

● Create reusable golden reference models for iterative verification of wireless


designs, prototypes, and implementations.

● Automate analysis of large-scale field test data and visualize your simulation
results.
● Wireless researchers and engineers worldwide rely on MATLAB to explore and
prove new technology concepts and create intellectual property.

Page | 11
● The apps and customizable code in MATLAB toolboxes help you quickly
explore design alternatives, test with live data, and analyze simulation results
and measurements.

● You can use the MATLAB algorithms you create to build standard-compliant
systems, model RF and antenna components, and automate hardware
prototyping and implementation.

Mobile Communication Standards:

GSM standards:
● A set of standards and protocols for mobile telecommunication
● A global system for mobile (GSM) was
● developed by the Groupe Spéciale
● Mobile (GSM)
● Founded in Europe in 1982
● Support cellular network
GSM 900
● GMSK modulation
● FDMA for 124 up channels and 124 down channels
● 890-915 MHz for uplink and 935-960 MHz for downlink
● Channel of bandwidth 200 kHz
● 8 radio-carrier analog-signals TDMA for user access in each deployed channel
● Users time-slices of 577 μs each
● Maximum 14.4 kbps

EGSM (extended global system for mobile communication)


● An additional spectrum of 10 MHz on both uplink and downlink channels

EGSM 900/1800/1900 MHz tri-band


● An additional spectrum of 10 MHz on both uplink and downlink channels
● GSM 1800 1710–1785 MHz for uplink and 1805–1880 MHz for downlink
● GSM 1900 1850–1910 MHz for uplink and 1930–1990 MHz for downlink

Page | 12
GPRS (general packet radio service): GSM 2G+ (2.5G)
● General Packet Radio Service (GPRS) is a new bearer service for GSM that
greatly improves and simplifies wireless access to packet data networks
● GPRS applies packet radio principal to transfer user data packets in an efficient
way between MS & external packet data network
● Packet-oriented service for data communication of mobile devices
● Utilises the unused channels in the TDMA mode in a GSM network
● New Data Services
● High Speed (Data Rate 14.4 – 115 kbps)
● Efficient use of radio bandwidth (Statistical Multiplexing)
● Circuit switching & Packet Switching can be used in parallel
● Constant connectivity
● GPRS uses radio channel i.e. 200 kHz wide
● Radio channel carries digital data stream of 271 kbps
● This rate is divided into 8 time slots each carrying 34 kbps per time slot
● Data rate 14 kbps per time slot achieved after corrections
● GPRS can combine up to 8 time slots giving data rate of 114 kbps

CDMA
● Evolution of CDMA from 2.5G in 1991 as cdmaOne (IS-95)
● CDMA supports high data rates 3G.
● Voice as well as data and multimedia streams.
● CDMA 2000, IMT-2000, WCDMA and UMTS
● Support cellular networks
● Higher capacity
● Improved performance in multipath by diversity
● Lower mobile transmit power = longer battery life
● Power control
● Variable transmission rate with voice activity detection

Page | 13
● Allows soft handoff
● Sectorization gain
● High peak data rates can be accommodated
● Combats other-user interference = lower reuse factors

CDMA-One
● Founded in 1991
● QUALCOM, USA
● Belongs to 2G+
● IS-95 (interim standards 95)
● Operates at 824–849 MHz and 869–894 MHz.
● CDMA channel transmits analog signals from multiple sources and users

WCDMA
● Supports asynchronous operations
● 10 ms frame length with 15 slices.
● Smaller end-to-end delay in the 10 ms frame as compared to 20, 40, or 80 ms
frames
● Each frame length is modulated by QPSK- both for uplink and downlink
● Supports a 3.84 Mbps chipping rate
● Both short and long scrambling code are supported, but for uplink only
● 3G partnership project (3GPP)

CDMA2000
● For voice communication
● Circuit as well as packet switched communication
● Internet protocol (IP) packet transmission
● Multimedia and real time multimedia applications
● 3G partnership project 2
● Chipping rates are in multiples of fs =1.2288 Mbps
● 3G IMT 2000 carrier frequency fc0 = 2 GHz

Page | 14
● Included in UMTS
● CDMA 2000 1x fs = 1.2288 Mbps
● Also backward compatible to 2.5G cdmaOne IS-95

CONCLUSION:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Page | 15
EXPERIMENT NO: 2 DATE: / /

Aim:

To study and analyse Friss Free Space Propagation Model using MATLAB program.

Theory:
● Radio propagation models are broadly classified into large-scale and small scale
models. Large scale effects typically occur in the order of hundreds to thousands
of meters in distance.
● Small scale effects are localized and occur temporally (in the order of a few
seconds) or spatially (in the order of a few meters).
● The important questions in large-scale modeling are - how the signal from a
transmitter reaches the receiver in the first place and what is the relative power
of the received signal with respect to the transmitted power level.
● The Free-space propagation model is the simplest large-scale model, quite
useful in satellite and microwave link modeling. It models a single unobstructed
path between the transmitter and the receiver.
● Applying the fact that the strength of a radiation field decreases as 1=d in the far
field, we arrive at the Friis free space equation that can tell us about the amount
of power received relative to the power transmitted.
● Friis free space propagation model is used to model the LOS path loss incurred
in a free space environment, devoid of any objects that create absorption,
diffraction, reflections, or any other characteristic-altering phenomenonto a
radiated wave.
● It is valid only in the far field region of the transmitting antenna and is based on
the inverse square law of distance which states that the received power at a
Page | 16
particular distance from the transmitter decays by a factor of square of the
distance.
● The Friis equation for received power is given by -

where,
Pr(d) is the received signal power in Watts expressed as a function of separation
distance (d meters) between the transmitter and the receiver,
Pt is the power of the transmitted signal’s Watts,
Gt and Gr are the gains of transmitter and receiver antennas when compared to an
isotropic radiator with unit gain 1,
λ is the wavelength of carrier in meters and
L represents other losses that is not associated with the propagation loss.
The parameter L may include system losses like loss at the antenna, transmission line
attenuation, loss at various filters etc. The factor L is usually greater than or equal to 1
with L = 1 for no such system losses.

● Usually, the transmitted power and the receiver power are specified in terms of dBm
(power in decibels with respect to 1 mW) and the antenna gains in dBi (gain in
decibels with respect to an isotropic antenna).
● Therefore, it is often convenient to work in log scale instead of linear scale. The
alternative form of Friis equation in log scale is given by -

● Following function, implements a generic Friis equation that includes the path loss
exponent, n, whose possible values are listed in the given table -

Page | 17
PROGRAM:
We have to create user defined function first in MATLAB file editor -
Creation of file named as - FrissModel.m
function [Pr_dBm,PL_dB] =
FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n)
%Pt_dBm = Transmitted power in dBm
%Gt_dBi = Gain of the Transmitted antenna in dBi
%Gr_dBi = Gain of the Receiver antenna in dBi
%f = frequency of transmitted signal in Hertz
%d = array of distances at which the loss needs to be
calculated
%L = Other System Losses, No Loss case L=1
%n = path loss exponent (n=2 for free space)
%Pr_dBm = Received power in dBm
%PL_dB = constant path loss factor (including antenna gains)
lambda=3*10^8/f; %Wavelength in meters
PL_dB = Gt_dBi + Gr_dBi + 20*log10(lambda/(4*pi))-
10*n*log10(d)-10*log10(L);%
Pr_dBm = Pt_dBm + PL_dB; %Receieved power in dBm at d meters
end

Example:
For example, consider a WiFi (IEEE 802.11n standard) transmission-reception system
operating at f =2.4 GHz or f =5 GHz band with 0 dBm (1 mW) output power from the
Page | 18
transmitter. The gain of the transmitter antenna is 1 dBi and that of receiving antenna is
1 dBi. It is assumed that there is no system loss, therefore L = 1.

The following Matlab code uses the Friis equation and plots the received power in dBm
for a range of distances -

MATLAB Code to simulate Friss Free Space Equation:

%Matlab code to simulate Friss Free space equation


%--------------------Input section------------------------
Pt_dBm=0; %Input - Transmitted power in dBm
Gt_dBi=1; %Gain of the Transmitted antenna in dBi
Gr_dBi=1; %Gain of the Receiver antenna in dBi
d =2.^[0,1,2,3,4,5] ; %Array of input distances in meters
L=1; %Other System Losses, No Loss case L=1
n=2; %Path loss exponent for Free space
f=2.4e9; %Transmitted signal frequency in Hertz (2.4G WiFi)
%----------------------------------------------------

[Pr1_dBm,PL1_dB] = FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n);
semilogx(d,Pr1_dBm,'b-o');
hold on;
f=5e9; %Transmitted signal frequency in Hertz (5G WiFi)
[Pr2_dBm,PL2_dB] = FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n);
semilogx(d,Pr2_dBm,'r-o');
grid on;
title('Free space path loss');
xlabel('Distance (m)');
ylabel('Received power (dBm)')
legend('Wifi : f = 2.4GHz', 'Wifi : f = 5GHz');

Page | 19
RESULT:
● From the plot, the received power decreases by a factor of 6 dB for every
doubling of the distance.

[Figure-1- Received power using Friss Model for Wifi transmission at f = 2.4GHz and f =
5GHz]

CONCLUSION:

Page | 20
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

EXPERIMENT NO: 3 DATE: / /

Aim:

To study and analyse Log Distance Path Loss Model using MATLAB program.

Theory:
● Log distance path loss model is an extension to the Friis free space model. It is
used to predict the propagation loss for a wide range of environments, whereas,
the Friis free space model is restricted to unobstructed clear path between the
transmitter and the receiver.
● The model encompasses random shadowing effects due to signal blockage by
hills, trees, buildings etc. It is also referred as log normal shadowing model.
● In the far field region of the transmitter, for distances beyond df , if P L(d0) is the
path loss at a distance d0 meters from the transmitter, then the path loss at an
arbitrary distance d > d0 is given by -

where,
PL(d) is the path loss at an arbitrary distance d meters,
n is the path loss exponent that depends on the type of environment, as given in Table.

Page | 21
● Also, χ is a zero-mean Gaussian distributed random variable with standard
deviation σ expressed in dB, used only when there is a shadowing effect.
● The reference path loss PL(d0), also called close-in reference distance, is
obtained by using Friis path loss equation or by field measurements at d 0.
Typically, d0 = 1m to 10m for microcell and d0 = 1 Km for a large cell.

PROGRAM:
● We have to create user defined function first in MATLAB file editor -

Creation of file named as - logNormalShadowing.m


function [PL,Pr_dBm] =
logNormalShadowing(Pt_dBm,Gt_dBi,Gr_dBi,f,d0,d,L,sigma,n)
%Pt_dBm = Transmitted power in dBm
%Gt_dBi = Gain of the Transmitted antenna in dBi
%Gr_dBi = Gain of the Receiver antenna in dBi
%f = frequency of transmitted signal in Hertz
%d0 = reference distance of receiver from the transmitter in
meters
%d = array of distances at which the loss needs to be
calculated
%L = Other System Losses, for no Loss case L=1
%sigma = Standard deviation of log Normal distribution (in dB)
%n = path loss exponent
%Pr_dBm = Received power in dBm
%PL = path loss due to log normal shadowing
lambda=3*10ˆ8/f; %Wavelength in meters

Page | 22
K = 20*log10(lambda/(4*pi)) - 10*n*log10(d0) - 10*log10(L);
%path-loss factor
X = sigma*randn(1,numel(d)); %normal random variable
PL = Gt_dBi + Gr_dBi + K -10*n*log10(d/d0) - X ;%PL(d)
including antennas gains
Pr_dBm = Pt_dBm + PL; %Receieved power in dBm at d meters
end

● The results are generated for an environment with PLE n = 2, frequency of


transmission f = 2.4 GHz, reference distance d0 = 1 m and standard deviation of
the log-normal shadowing σ = 2dB.

MATLAB Program to Simulate Log Normal Shadowing for a range of distances:


% Simulate Log Normal Shadowing for a range of distances
Pt_dBm=0; %Input transmitted power in dBm
Gt_dBi=1; %Gain of the Transmitted antenna in dBi
Gr_dBi=1; %Gain of the Receiver antenna in dBi
f=2.4e9; %Transmitted signal frequency in Hertz
d0=1; %assume reference distance = 1m
d=100*(1:0.2:100); %Array of distances to simulate
L=1; %Other System Losses, No Loss case L=1
sigma=2;%Standard deviation of log Normal distribution (in dB)
n=2; % path loss exponent
%Log normal shadowing (with shadowing effect)
[PL_shadow,Pr_shadow] =
logNormalShadowing(Pt_dBm,Gt_dBi,Gr_dBi,f,d0,d,L,sigma,n);
figure;
plot(d,Pr_shadow,'b');
hold on;
%Friis transmission (no shadowing effect)
[Pr_Friss,PL_Friss] = FrissModel(Pt_dBm,Gt_dBi,Gr_dBi,f,d,L,n);
plot(d,Pr_Friss,'r');

Page | 23
grid on;
xlabel('Distance (m)');
ylabel('P_r (dBm)');
title('Log Normal Shadowing Model');
legend('Log normal shadowing','Friss model');
RESULT:

[Figure- 1-
Simulated result for log normal shadowing path loss model]

● Results clearly show that the log-normal shadowing introduces randomness in


the received signal power, which may put us close to reality.

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Page | 24
EXPERIMENT NO: 4 DATE: / /

Aim:

To study and analyse Okumura-Hata Model using MATLAB program.

Theory:
● Outdoor propagation models involve estimation of propagation loss over
irregular terrains such as mountainous regions, simple curved earth profile, etc.,
with obstacles like trees and buildings. All such models predict the received
signal strength at a particular distance or on a small sector.
● These models vary in approach, accuracy and complexity. Hata-Okumura model
is one such model.
● Okumura model can be adopted for computer simulations by digitizing those
curves provided by Okumura and using them in the form of look-up-tables.
● Since it is based on empirical studies, the validity of parameters is limited in
range. The parameter values outside the range can be obtained by extrapolating
the curves.
● There are also concerns related to the calculation of effective antenna height.
Thus every RF modeling tool incorporates its own interpretations and
adjustments when it comes to implementing Okumura model.

● The received power level in dBm is given by -

Page | 25
● The generic closed form expression for path loss (PL) in dB, is given by -

where, the Tx-Rx separation distance (d) is specified in kilometers (valid range 1
km to 20 Km). The factors A, B, C depend on the frequency of transmission,
antenna heights and the type of environment, as given next

where,
fc = frequency of transmission in MHz, valid range = 150 MHz to 1500 MHz
hb= effective height of transmitting base station antenna in meters, valid range 30m to
200m
hm=effective receiving mobile device antenna height in meters, valid range 1m to 10 m
a(hm) = mobile antenna height correction factor that depends on the environment (Refer
Table) and C = a factor used to correct the formulas for open rural and suburban areas

[Table.1 - Hata Model Parameters]

PROGRAM:
● We have to create user defined function first in MATLAB file editor -

Creation of file named as - Hata_model.m


function PL = Hata_model(fc,d,hb,hm,envType)
%Hata model for propagation loss
% fc - frequency in MHz (single value)

Page | 26
% d - array of distances (in Km) to simulate
% hb - effective base station height in meters
% hm - effective mobile height in meters
% envType - 'metro','smallcity','suburban' or 'open'
% returns the path loss (PL) in dB
%Warning: Hata model is valid only if the model parameters
%falls within certain range of values(see text). This function
%has not implemented those range checks.
envType=lower(envType);
switch envType
case 'metro',
C=0;
if fc<=200, aHm=8.29*(log10(1.54*hm))^2-1.1;
else aHm=3.2*(log10(11.75*hm))^2-4.97;
end
case 'smallcity',
C=0; aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
case 'suburban',
aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
C=-2*(log10(fc/28)).^2-5.4;
case 'open',
aHm = (1.1*log10(fc)-0.7)*hm-(1.56*log10(fc)-0.8);
C=-4.78*(log10(fc)).^2+18.33*log10(fc)-40.98;
otherwise , error('Invalid model selection');
end
A = 69.55 + 26.16*log10(fc) - 13.82*log10(hb)-aHm;
B = 44.9 - 6.55*log10(hb);
PL=A+B*log10(d)+C;
end

MATLAB Program to Simulate Hata model path loss model:


The simulated results are obtained over a range of distances for the following parameter
values fc = 1500 MHz , hb = 70 m and hm = 1.5 m.

Page | 27
Program:
% Simulate Hata model
envType = 'metro';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'b-','LineWidth',1.3);
hold on;
envType = 'suburban';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'r-','LineWidth',1.3);
hold on;

envType = 'open';
fc = 1500;
d = (1:0.2:100);
hb = 70;
hm = 1.5;
PL = Hata_model(fc,d,hb,hm,envType);
semilogx(d,PL,'k-','LineWidth',1.3);
hold on;
grid on;
title('Hata-Okumura Path Loss Model');
xlabel('Distance (km)');
ylabel('Propagation Path Loss(dB)')
legend('Metropolitan Area','Suburban Area','Open rural Area');

Page | 28
RESULT:

[Figure.1 - Simulated distance vs. path loss using Hata model]

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Page | 29
____________________________________________________________________________
____________________________________________________________________________

EXPERIMENT NO: 5 DATE: / /

Aim:

To study and analyse Two-ray ground reflection Model using MATLAB program.

Theory:
● Friis propagation model considers the line-of-sight (LOS) path between the
transmitter and the receiver. The expression for the received power becomes
complicated if the effect of reflections from the earth surface has to be
incorporated in the modeling.
● In addition to the line-of-sight path, a single reflected path is added in the two-
ray ground reflection model.
● This model takes into account the phenomenon of reflection from the ground and
the antenna heights above the ground. The ground surface is characterized by
reflection coefficient - R which depends on the material properties of the surface
and the type of wave polarization.
● The transmitter and receiver antennas are of heights h t and hr respectively and
are separated by the distance of d meters.

Page | 30
[Figure.1 - Two ray ground reflection model]
● The received signal consists of two components: LOS ray that travels the free
space from the transmitter and a reflected ray from the ground surface.

● The distances traveled by the LOS ray and the reflected ray are given by -

● Depending on the phase difference (ϕ) between the LOS ray and reflected ray,
the received signal may suffer constructive or destructive interference. Hence,
this model is also called as two ray interference model.

where, λ is the wavelength of the radiating wave that can be calculated from the
transmission frequency. Under large-scale assumption, the power of the received
signal can be expressed as -

Example:
● The following piece of code implements all the equations and plots the received
power (Pr) against the separation distance (d).
● The resulting plot for f = 900 MHz, R = -1, ht = 50 m, hr = 2 m, Glos = Gref = 1
● In this plot, the transmitter power is normalized such that the plot starts at 0
dBm.

Page | 31
● The plot also contains approximations of the received power over three regions.

MATLAB Code:
f=900e6; %frequency of transmission (Hz)
R = -1; %reflection coefficient
Pt = 1; %Transmitted power in mW
Glos=1;%product of tx,rx antenna patterns in LOS direction
Gref=1;%product of tx,rx antenna patterns in reflection
direction
ht = 50;%height of tx antenna (m)
hr = 2;%height of rx antenna (m)
d=1:0.1:10^5;%separation distance between the tx-rx antennas(m)
L = 1; %no system losses
%Two ray ground reflection model
d_los= sqrt((ht-hr)^2+d.^2);%distance along LOS path
d_ref= sqrt((ht+hr)^2+d.^2);%distance along reflected path
lambda = 3*10^8/f; %wavelength of the propagating wave
phi = 2*pi*(d_ref-d_los)/lambda;%phase difference between the
paths
s = lambda/(4*pi)*(sqrt(Glos)./d_los +
R*sqrt(Gref)./d_ref.*exp(1i*phi));
Pr = Pt*abs(s).^2;%received power
Pr_norm = Pr/Pr(1);%normalized received power to start from 0
dBm
semilogx(d,10*log10(Pr)); hold on; ylim([-160 -55]);
title('Two ray ground reflection model');
xlabel('log_{10}(d)');
ylabel('Normalized Received power (in dB)');
%Approximate models in three difference regions
dc=4*ht*hr/lambda; %critical distance
d1 = 1:0.1:ht; %region 1 -- d<=ht
d2 = ht:0.1:dc; %region 2 -- ht<=d<=dc
d3 = dc:0.1:10^5; %region 3 -- d>=dc
K_fps = Glos*Gref*lambda^2/((4*pi)^2*L);
K_2ray = Glos*Gref*ht^2*hr^2/L;
Page | 32
Pr1 = Pt*K_fps./(d1.^2 + ht^2);%received power in region 1
Pr2 = Pt*K_fps./d2.^2;%received power in region 2
Pr3 = Pt*K_2ray./d3.^4;%received power in region 3
semilogx(d1,10*log10(Pr1),'k-.'); %Pr in region 1
semilogx(d2,10*log10(Pr2),'r-.'); %Pr in region 2
semilogx(d3,10*log10(Pr3),'g-.');%Pr in region 3
grid on
h=line([ht ht],[-160 -55]);set(h,'Color','m');
h=line([dc dc],[-160 -55]);set(h,'Color','m');

RESULT:

● The distance that is denoted as dc in the plot, is called the critical distance. It is
calculated dc = 4hthr / λ.

Page | 33
● For the region beyond the critical distance, the received power falls-off at -40
dB/decade rate.
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

EXPERIMENT NO: 6 DATE: / /

Aim:

To study and analyse single knife-edge diffraction Model using MATLAB program.

Theory:
● The model depicted in Figure.1 considers two idealized cases where a sharp
obstacle is placed between the transmitter and the receiver. Using all the
geometric parameters as indicated in the figure, the diffraction loss can be
estimated with the help of a single, dimension-less quantity called Fresnel-
Krichhoff diffraction parameter - ‘v’.

Page | 34
[Figure.1 - Diffracting single knife edfe obstacle having (a) Positive Height and (b)
negative height]
● Based on the availability of information, any of the following equation can be
used to calculate this parameter -

● After computing the Fresnel-Krichhoff diffraction parameter from the geometry,


the signal level due to the single knife-edge diffraction is obtained by integrating
the contributions from the unhindered portions of the wavefront.

● The diffraction gain (or loss) is obtained as -

where, C(n) and S(n) are respectively the real and imaginary part of the the
complex Fresnel integral F(n) given by -

● The diffraction gain/loss in the equation of G(v) can be obtained using numerical
methods which are quite involved in computation. However, for the case where
v > -0.7, the following approximation can be used -

MATLAB function: diffractionLoss.m


Page | 35
function [Gv]= diffractionLoss(v)
%Compute diffraction loss G(v)dB for Fresnel-Kirchoff
parameter(v)
%according to Rec. ITU-R P.526-5
Gv = zeros(1,length(v));
idx = (v>-0.7); %indices where v>0.7
Gv(idx) = 6.9 + 20*log10(sqrt((v(idx)-0.1).^2 + 1) + v(idx) -
0.1);
Gv(~idx)=0;%for v<-0.7
end
MATLAB Program: Fresnel_Kirchoff_diffLoss.m
v=-5:1:20; %Range of Fresnel-Kirchoff diffraction parameter
Ld= diffractionLoss(v); %diffraction gain/loss (dB)
plot(v,-Ld,'r-','LineWidth',1.2);
title('Diffraction Gain Vs. Fresnel-Kirchoff parameter');
xlabel('Fresnel-Kirchoff parameter (v)');
ylabel('Diffraction gain - G_d(v) dB');
grid on

RESULT:

Page | 36
● Finally, the single knife-edge diffraction model can be coded into a function as
follows. It also incorporates equation 10.16 that help us find the n th Fresnel zone
obstructed by the given obstacle.

MATLAB function: singleKnifeEdgeModel.m


function [Gv, n] = singleKnifeEdgeModel(h,f,d1,d2)
%Compute diffraction loss (G(v)dB) & the Fresnel zone number
(n)
%blocked by the tip of obstruction, given the following inputs
% h - height of the knife-edge above the line joining the tx-rx
(m)
% h is negative if the tip of the knifge edge is below the line
% f - frequency of transmission (Hz)
% d1 - distance from transmitter to tip of the knife-edge (m)
% d2 - distance from receiver to tip of the knife-edge (m)
lambda = 3*10^8/f; %wavelength
v = h*sqrt(2/lambda*(1/d1 + 1/d2));%Fresnel-Kirchoff parameter
Gv = diffractionLoss(v);%approximate diffraction loss (G(v))
delta = h^2/2*(1/d1+1/d2);%path difference b/w LOS & diffracted
rays

Page | 37
n = 2*delta/lambda; %Fresnel zone at the tip of obstruction

Example:
As an example, using the sample script below, we can determine the diffraction loss
incurred for d1 = 10 Km, d2 =5 Km and h=20 m at frequency 10 GHz. The computed
diffraction loss will be LdB =21.969 dB.

MATLAB Program: singleKnifeEdgeTest.m


h=20; f=10e9; d1=10e3; d2=5e3;%input parameters
[L_dB,n]=singleKnifeEdgeModel(h,f,d1,d2)%call
singleKnifeEdgeModel

MATLAB Command window shows this result :-


>> singleKnifeEdgeTest
L_dB =
21.9169
n=
4.0000

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

EXPERIMENT NO: 7 DATE: / /

Aim:

To study and write a MATLAB program to find the custer size for different values of i
and j and also find the Q - factor.

Page | 38
Theory:
● Cellular radio systems rely on an intelligent allocation and reuse of channels
throughout a coverage region. Each cellular base station is allocated a group of
radio channels to be used within a small geographic area called a cell.
● Base stations in adjacent cells are assigned channel groups which contain
completely different channels than neighbouring cells. The base station antennas
are designed to achieve the desired coverage within the particular cell.
● The design process of selecting and allocating channel groups for all of the
cellular base stations within a system is called frequency reuse or frequency
planning.
● The capacity of a cellular system is directly proportional to the number of times
a cluster is replicated in a fixed service area. The factor N is called the cluster
size.
● In order to connect without gaps between adjacent cells—the geometry of
hexagons is such that the number of cells per cluster N, can only have values
which satisfy Equation:

where i and j are non-negative integers.


● When the size of each cell is approximately the same and the base stations
transmit the same power, the co-channel interference ratio is independent of the
transmitted power and becomes a function of the radius of the cell (R) and the
distance between centers of the nearest co-channel cells (D).
● By increasing the ratio of D/R, the spatial separation between co-channel cells
relative to the coverage distance of a cell is increased.
● Thus, interference is reduced from improved isolation of RF energy from the co-
channel cell. The parameter Q, called the co-channel reuse ratio, is related to the
cluster size. For a hexagonal geometry

MATLAB Program:

Page | 39
clc;
clear all;
close all;
i=0;j=0;k=1;
for i=0:10
for j=1:10
N(k)=(i^2)+(j^2)+(i*j); k=k+1;
if k==26 break
end
end
if k==26
break
end
end
N=sort(N)
Q=(3*N).^0.5
plot(N,Q)
xlabel('Number of cells per cluster');
ylabel('Co-channel Reuse Ratio');
grid on
RESULT:
N=
Columns 1 through 20
1 3 4 7 7 9 12 13 16 19 21 25 28 31 36 39 43 49
57 64
Columns 21 through 25
73 81 91 100 111
Q=
Columns 1 through 12
1.7321 3.0000 3.4641 4.5826 4.5826 5.1962 6.0000 6.2450 6.9282
7.5498 7.9373 8.6603
Columns 13 through 24
Page | 40
9.1652 9.6437 10.3923 10.8167 11.3578 12.1244 13.0767 13.8564
14.7986 15.5885 16.5227 17.3205
Column 25
18.2483

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

EXPERIMENT NO: 8 DATE: / /

Aim:

To study different diversity schemes.

Theory:

Page | 41
● Diversity is a powerful communication recierver technique that provides
wireless link improvement at relatively low cost.diversity reiqires no
training overhead since a training sequence is not required by the
transmmitter.there are a wide range of diversity implementation with little
added cost.

● Diversity exploits the random nature of radio propogation by finding


independent signal paths for comminication. In virtually all
applications,diversity decision are made by the reciever and are unknown
to transmitter.

● The diversity concept can be explained simply if one radio path undergoes
a deep fade, another independent path may have a strong signal.by having
more than one path to select from both the instaneous and average SNRs at
the reciever may be improved,often by as much as 20 dB to 30 dB.

● It is the technique used to compensate for fading channel impairments. It is


implemented by using two or more receiving antennas. While Equalization
is used to counter the effects of ISI, Diversity is usually employed to
reduce the depth and duration of the fades experienced by a receiver in a
flat fading channel.

● These techniques can be employed at both base station and mobile


receivers. Spatial Diversity is the most widely used diversity technique

Diversity Techniques:
● Combining the multiple signals in such a fashion so as to reduce the effects
of excessive deep fades.
Diversity

Macro Micros

Macroscopic Diversity:

Page | 42
● Prevent large scale fading
● Large scale fading is caused by shadowing due to variation in both the
terrain profile and the nature of the surrounding. Large scale fading is log
normally distributed signal.
● This fading is prevented by selecting an antenna which is not shadowed
when others are, this allows increase in signal to noise ratio.

Microscopic Diversity:
● Prevents small scale fading

● Small scale fading is caused by multiple reflections from the surroundings. It is


characterized by deep and rapid amplitude fluctuations which occur as the
mobile moves over distance of a few wavelengths.

● This fading is prevented by selecting an antenna which gives strong signal that
mitigates this small signal fading effect.

TYPES OF DIVERSITY TECHNIQUE:


1) Space Diversity Technique
i. Selection Diversity
ii. Feedback Diversity
iii. Maximal Ratio Combining Technique
iv. Equal Gain Combining
2) Polarization Diversity Technique
3) Time Diversity Technique
4) Frequency Diversity Technique
5) Directional Diversity Technique
6) Path Diversity Technique

Space Diversity:

Page | 43
● The space diversity method is also called as the antenna diversity technique. In
the conventional methods of wireless communication the availability of direct
path between transmitter and receiver is not assured.
● Hence, the occurrence of Rayleigh fading will br present. The antenna space
diversity can achieve independent fading changes by applying spatially
separated antennas.
● In the space diversity method the receiver configuration is simple. Several
number of diversity branches are selectable.
● For producing diversity reception at each and every cell site, multiple base
station receiving antennas are effectively used. Generally the space diversity
technique can be used at the base station or mobile or at both the ends.
● A method of transmission or reception, or both, in which the effects of fading are
minimized by the simultaneous use of two or more physically separated
antennas, ideally separated by one half or more wavelengths

Selection Diversity
● In selective diversity combining the branches having the strongest received
signal will be selected. Selecting the best signal among all the signals received
from different braches at the receiving end.
● In selective diversity technique ‘n’ number of demodulator are used and their
gains can be adjusted to give mean signal to noise ratio for every diversity
branches. Then antenna signals will be sampled. Finally the best signal that
possesses good signal strength will be sent to the demodulators

Feedback Diversity
● The feedback diversity is called as scanning diversity. In this method the ‘n’
signals are scanned in proper sequence and monitored to pick a signal in the
sequence that is above the threshold value. The scanning process will be initiated

Page | 44
for received signals. But the drawback of this method is that the fading level
reduction is less than the other diversity methods.
● The advantage of feedback diversity is easier implementation than other
diversity technique. It needs only one receiver.

Maximal Ratio Combining Technique


● The concept of this method is all the branch signals are combined coherently
with necessary coefficient for every diversity branch signals, so that the
reduction of fading will be better leading to overall improvement of system
performance. In the output signals of maximum ration combiner will be such
that the sum of individual signal to noise ratio values will be equal to the SNR
output signal measured.
● The accuracy of this technique is high. The maximal ratio combiner generates an
acceptable SNR value. The maximal ratio combining method produces best
reduction fading.

Equal Gain Combiner


● In this technique all diversity branches are coherently added with the same
weighting factor. This technique also cophases all the diversity branches and
finally adds them up. As the signals are cophased from all branches they provide
an equal gain factor. Configuration of this is very simple. By applying equal gain
combining it is convenient for the receiver to get back the signals. No extra
bandwidth or power is needed.

Polarization Diversity
● Polarization diversity relies on the decorrelation of the two receive ports to
achieve diversity gain. The two receiver ports must remain cross-polarized.
Effective Diversity is obtained with a Correlation Coefficient below 0.7In order
to keep the correlation at this level space diversity at a base station requires
antenna spacing of up to 20 wavelengths for the broadside case, and even more
for the inline case. Polarization diversity at a base station does not require
antenna spacing. At the base station, space diversity is considerably less
Page | 45
practical than at the mobile because the narrow angle of incident fields requires
large antenna spacing. The comparatively high cost of using space diversity at
the base station prompts the consideration of using orthogonal polarization.
Polarization diversity provides two diversity branches and allows the antenna
elements to be considered.

Frequency Diversity
● The same information signal is transmitted and received simultaneously on two
or more independent fading carrier frequencies. The rationale behind this
technique is that frequencies separated by more than the coherence bandwidth of
the channel will not experience the same fade. The probability of simultaneous
fade will be the product of the individual fading probabilities. This is often
employed in microwave LOS links which carry several channels in a frequency
division multiplex mode (FDM).
● This technique not only requires spare bandwidth, but also requires that there be
as many receivers as there are channels used for the frequency diversity.
However, for critical traffic, the expense may be justified.

Time Diversity
● The signals representing the same information are sent over the same channel at
different times. Time Diversity repeatedly transmits information at time spacing
that exceeds the coherence time of the channel.
● Multiple repetitions of the signal will be received with multiple fading
conditions, thereby providing for diversity. A modern implementation of time
diversity involves the use of RAKE receiver for spread spectrum CDMA, where
multipath channel provides redundancy in the transmitted message.

Directional Diversity
● The received signal will arrive from different incidents angles because of one of
the propagation methods reflection diffraction or scattering around the mobile
terminals.

Page | 46
● By using selective directive antennas the independent faded signals can be
received. Directional diversity is suitable to apply in mobile terminal end where
limited directional of signals at base station is linked.

Path Diversity
● In path diversity technique, the signals are coherently combined, that is both the
directed and delayed signals component are combined together. Thus the
diversity branches are generated only after signal reception.
● This method is called as implicit diversity. This method is sensitive to Rayleigh
fading conditions. Hence the propagation path conditions need to be given more
attention. The diversity gain will depend on the delay status.

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________

EXPERIMENT NO: 9 DATE: / /

Page | 47
Aim:
To study about mobile trainer system
Apparatus:
Mobile trainer
Theory:
● We are rapidly moving towards the establishment of a Global Village. Soon, no place
will be considered in accessible and data will be available in any corner of the world,
probably at of a button. The key growth of these proportions has been “Networking”.
● The Mobile Trainer system provides a platform to understand the hardware and software
requirements to implement a GSM Mobile Communication protocols.
● The Mobile trainer is an easy medium of learning the fundamental concept in Mobile
Communication. The main focus of Mobile Trainer system is in opening up a whole new
world for you, some advanced mobile computing/ networking concepts like SMS,
dialing, voice calls
● Standards and other Mobile Network protocols also are experimented on vis-à-vis the
existing environment.

Mobile Trainer System Description

Page | 48
Hardware Specifications
Dual band 900 / 1800 MHz GSM / GPRS Modem. Data, SMS, Voice.
Remote control by AT commands (according to GSM 07.07 and GSM 07.05).
Maximum output power 2W for GSM 900: 1W for GSM 1800.
Input voltage 5.5v to 12 v DC.
Current 1.8A peak at 5.5v, 330mA average at 5.5v

Onboard Details:
1. Antenna connection port
2. TP for Antenna Signal GMSK_Mode
3. TP for Battery Voltage(Output Charging Voltage)
4. Battery Power key
5. TP Charging Voltage
6. JTAG Downloader port
7. Jumper setting for Module power
8. TP for Vibrator PWM signal
9. TP for Buzzer PWM signal
10. RS- 232 Port using PC and GSM Module connection
11. RS- 232 Port using CPU and GSM Module connection(Mobile trainer works like
Standalone)
12. Vibrator ON/OFF Switch
13. Battery charger unit
14. CPU Section
15. GSM Module(SIM300C)
16. HandFree Unit(Include Mike and Speaker I/O Signals)
17. SIM Signals Section
18. Audio Output signal
19. Audio input signal
20. SD Section
21. Power supply
22. Power Switch
23. power supply Different Voltages
24. General Purpose area
25. RESET
26. LCD Power ON/OFF switch
27. 4*4 matrix Keyboard Signals section
28. Microcontroller ports
29. LCD Signals Section
30. LCD Display(LAMPEX_LG128642_Dispaly)
31. 4*4 Matrix Keyboard

Page | 49
Introduction to Cellular Telephone Basics:
● Cellular radio provides mobile telephone service by employing a network of cell sites
distributed over a wide area.
● A cell site contains a radio transceiver and a base station controller which manages,
sends, and receives traffic from the mobiles in its geographical area to a cellular
telephone switch. It also employs a tower and its antennas, and provides a link to the
distant cellular switch called a mobile telecommunications switching office.
● This MTSO places calls from land based telephones to wireless customers, switches
calls between cells as mobiles travel across cell boundaries, and authenticates wireless
customers before they make calls. Cellular uses a principle called frequency reuse to
greatly increase customers served.
● Low powered mobiles and radio equipment at each cell site permit the same radio
frequencies to be reused in different cells, multiplying calling capacity without
creating interference.
● This spectrum efficient method contrasts sharply with earlier mobile systems that used
a high powered, centrally located transmitter, to communicate with high powered car
mounted mobiles on a small number of frequencies, channels which were then
monopolized and not re- used over a wide area.
● Cellular uses a principle called frequency reuse to greatly increase customers served.
Low powered mobiles and radio equipment at each cell site permit the same radio
frequencies to be reused in different cells, multiplying calling capacity without
creating interference.
● This spectrum efficient method contrasts sharply with earlier mobile systems that used
a high powered, centrally located transmitter, to communicate with high powered car
mounted mobiles on a small number of frequencies, channels which were then
monopolized and not re- used over a wide area.

Page | 50
● Complex signaling routines handle call placements, call requests, handovers, or
call transfers from one cell to another, and roaming, moving from one carrier's
area to another. Different cellular radio systems use frequency division
multiplexing (analog), time division multiplexing (TDMA), and spread spectrum
(CDMA) techniques.
● Despite different operating methods, AMPS, PCS, GSM, E-TACS, and NMT are
all cellular radio. That's because they all rely on a distributed network of cell sites
employing frequency re-use. Is your head spinning yet? Let's ease into this
cellular discussion by discussing some history first. improve on the results of
TDMA.
GSM
● GSM (Global System for Mobile communication) is a digital mobiletelephone
system that is widely used in the world. GSM uses a variation of Time Division
Multiple Access (TDMA) and is the most widely used of the three digital wireless
telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and
compresses data, then sends it down a channel with two other streams of user data,
each in its own time slot. It operates at either the 90 MHz or 1,800 MHz frequency
band.

Page | 51
Mobile Frequency Rx: 925-960; Tx: 880-915
Range

Multiple Access Method TDMA/FDM

Duplex Method FDD

Number of Channels 124 (8 users per channel)

Channel Spacing 200kHz

Modulation GMSK (0.3 Gaussian


Filter)

Channel Bit Rate 270.833Kb

Mobile Trainer System:


United’s Mobile Trainer is a low-cost single board unit designed for self-learning the
mobile communication concepts. The UE Mobile Trainer has the GSM modem that is
designed for global market, which is a Tri-band GSM/GPRS modem that works
on frequencies EGSM900MHz, DCS1800MHz and PCS1900MHz. It is the ideal
solution for voice, data and SMS communication.

Our GSM Modem makes integration as simple as possible, it is a stand-alone device, and can
able to fitted with standard interfaces, for a power supply, an antenna, a buzzer, a PC, and a
Microcontroller based system, with its plug & play technology making it very easy to put
into operation.

The Mobile Trainer has 2-modes of operations, One is to control the GSM Module by
GSM software present in the PC, and second way of controlling the GSM Module is through
Microcontroller.

Page | 52
The Mobile Trainer system provides the student a platform to understand the hardware
and software requirements to implement an GSM Mobile Communication protocols.

The Mobile trainer is an easy medium of learning the fundamental concept in Mobile
Communication. The main focus of Mobile Trainer system is in opening up a whole new
world for you, some advanced mobile computing/ networking concepts like SMS, dialing,
voice calls standards and other Mobile Network protocols also are experimented on vis-à-vis
the existing environment.

Various Building blocks of the Mobile Trainer


A. GSM Module
The SIMM 300 is a complete Tri-Band GSM/GPRS solution in a compact plug-in module.
SIMM 300 delivers GSM/GPRS 900/1800/1900MHz performance for voice, SMS, Data and
FAX.

B. SIM Card Holder


A Subscriber Identity Module (SIM) is part of a removable smart card ICC (Integrated
Circuit Card), also known as SIM Cards, for mobile, telephony devices (such as computers)
and mobile phones. SIM card securely store the service-subscriber key (IMSI) used to
identify a subscriber. The SIM card allows users to change phones by simply removing the
SIM card from one mobile phone and inserting it into another mobile phone or broadband
telephony device.

SIM cards are available in two standard sizes. The first is the size of a credit card (85.60 mm
× 53.98 mm x 0.76 mm). The newer, more popular miniature-version has a width of 25
mm, a height of 15 mm, and a thickness of 0.76 mm. However most SIM cards are supplied
as a full- sized card with the smaller card held in place by a few plastic links and can be
easily broken off to be used in a phone that uses the smaller SIM.

Each SIM is Internationally identified by its ICC-ID (Integrated Circuit Card ID). ICCID’s
Page | 53
are stored in the SIM card and are also engraved or printed on the SIM card body during a
process called personalization. The ICCID is defined by the ITU-T recommendation E.118.
The number is up to 18 digits long and in addition is often associated with a single check
digit calculated using the Luhn algorithm.
SIM cards are identified on their individual operator networks by holding a unique
International Mobile Subscriber Identity. Mobile operators connect mobile phone calls and
communicate withtheir market SIM cards using their IMSI.
Authentication key (Ki) - The Ki is a 128-bit value used in authenticating the SIM’s on the
mobile network. Each SIM holds a unique Ki assigned to it by the operator during the
personalization process.

The Ki is also stored on a database (known as Authentication Center or AuC) on the carrier’s
network.

C. SD Card Holder
Secured Digital Card of capacity 1GB

AT Command Syntax
The “AT” or "at” prefix must be set at the beginning of each command line. To terminate a
command line enter <CR>.
The AT command set implemented by SIM300 is a combination of GSM07.05,
GSM07.07 and ITU-T recommendation V.25ter and the AT commands developed by
SIMCOM.tax

Page | 54
AT Commands

Page | 55
Page | 56
Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________

Page | 57
EXPERIMENT NO: 10 DATE: / /

Aim:
To understand and read the content of SIM Card

Prior Concepts:
Knowledge of mobile handset
● SIM (Subscriber Identification Module): It is a removable unit that can be
inserted in the handset by user. Any GSM terminal capable of receiving a
detachable SIM card can become the user's Mobile Station- (MS) with the SIM
card is inserted into it.

AT +CIMI
It is a command that is used to to read and identify the IMSI (International Mobile
Subscriber Identity) of the SIM card.
Command Syntax: AT +CIMI
Possible response: 208200120320599 (IMSI is a 15-digit number.)

AT +CCID
It is a command that orders the handset to read card 10 i.e. EF-CCIO file on the SIM
card. Command Syntax: AT +CCIO
Possible response: +CCIOD123456789AB111121314D

Command AT+CCID
Response = +CCID0123456789AB1111213140 I

AT +CPBS

It is a command that selects phone book memory storage.


AT+CPBS?
Command syntax: AT +CPB8 = <storage> Possible response: OK
AT+CPBS
Page | 58
Response
(CPBS: <storage> [. <used>, <total] I
“SM” – SIM Abbreviated dialling
“FD” = SIM fixed Dialling
<Use> Integer type value of used memory locations
<Total> Integer type value of total memory locations

AT +CPBR
This command is used to read a special entry or range of entries from phone book
memory storage.

Command syntax
AT +CPBR = <index1> [,<index2>]
<index1>,<index2>: Integer type values in the range of location numbers of
Phone book memory.
Note: This command is used only after AT +CPBS command.
For example:

A AT+CPBR=? phone book details

A AT+CPBR= 5, 15 D Display phone numbers from 5 to


1 15 records

AT +CPBF
This command is used to find a phone book entry using a search string.
Command syntax:
AT +CPBF = <find text>
For example:
AT+CPBF AT+CPBF=? AT+CPBF=”Anant”

AT +CPBW

Page | 59
This command is used to write a phone book entry to a special place in the phone book
memory storage.

Command syntax:

AT +CPBW = [<indeX> [,<number> [,<type> [,<text>]]]

A AT+CPBW write the S see this lcon using


B Phone book
A AT+CPBR– Command
AT+CPBW=? tr entry

AAT+CPBW=5,”9480452631”,161,”Anant”

Conclusion:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________

Page | 60
3171004 Wireless Communication

EXPERIMENT NO: 11 DATE: / /

Aim:
To observe and understand the process of call connection and call release of
mobile system.

Proposition: Making a call from landline phone to mobile unit. The call can
be made from landline phone to mobile unit as below:

Lift up the receiver or put the phone in speaker mode and dial the number after
you hear the dial tone.

Hear the ring tone.


Call is connected when you hear "hello" from opposite end.
The concept structure shows the signal flow from landline phone to mobile unit.

ATD
This command is used to establish a voice call
ATD9986708608; Call any number (Dial
Number
Directly)

Command

AT D< nu mb e r>;

Response

OK / BUSY / NO ANSWER

• AT DL
This command is used to redial the last dialed number.
ATDL; Redials the last dialed
number

• AT A
This command is used to accept an incoming call.

Page | 61
3171004 Wireless Communication

Response
OK if voice Call / ERROR

• ATH
This command is used to end the call

• AT+CCFC
This command is used to set the call forwarding service.

• AT +CLlP
This command is used to set and request the status of calling line identification
service .

• AT+ CL CK
This command is used to set network facilities. Special calls could be barred
and passwords could be changed.

• AT+CPAS
This command is used to request the phone activity status.

Conclusion:

________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

Page | 62

You might also like