Saturday, June 1, 2013

Frequency Hopping (FH) in GSM

Frequency Hopping (FH) is widely used for example in GSM Networks, so let's understand a little more about it today.

First, a Brief History

But before we talk about FH: does who invented it?
Several people competes for this title, as the German Johannes Zenneck in 1908 through his company: Telefunken. He shares the title with a Polish inventor, who also exposed the idea.
But particularly, I like the exotic version, where a beautiful actress (yes) Hedy Lamar, along with her neighbor George Antheil were also responsible, in the Second World War time.
Hedy was married to a German arms manufacturer. Issues like security, especially how to send text messages using a signal that could not be interfered with by the enemy naturally came to mind.
If you send a torpedo controlled by a continuous signal, the signal can be identified by the enemy, which in turn can insert a high noise and shoot it down.
Once at the piano the composer George played a note, and Hedy repeated on another scale. It was then that she realized it was possible to establish a communication by changing the communication channel, just for this, they should make the change at the same time, ie, following a pattern known to both.
Bringing this idea to the torpedo, it sufficed for the transmitter in the vessel and receiver in the torpedo altered (or jumped) from one frequency to another in a synchronized manner. That is, just that the receiver at the torpedo know what are the positions where the transmitter frequency will jump!
And if any of these frequencies are suffering interference? Well, we still have other channels in the sequence of jumps, from where information can be retrieved!
Like any great invention, note that the idea is simple.

Definition

Well, after a brief history, I hope you have understood the idea behind FH.
After the initial contribution of inventors, the idea was perfected, and is now used in various systems such as GSM, as already mentioned.
FH has mainly the purpose of avoiding interference, and we'll see how he gets it.
In FH, the information is spread over a bandwidth much larger than is required for its transmission. For this, it is divided into several channels of lower bandwidth.
Knowing the sequence of jumps that must be followed, the receiver and transmitter jump through these channels.

This is a pseudo-random sequence, and that's what makes the FH also secure, since unwanted receivers can not intercept the signal because they do not know the sequence. The only thing they see are noises of short duration.
For each application with its full range of frequency, it is defined as bandwidth, hop number, and maximum average time that each frequency must be busy.
We should also stress that in FH do not need continuous bands. In scenarios where the available bandwidth is limited and not contiguous, the spectrum can be better used (Actually, this is more a feature comparison between narrowband x broadband systems ).


FH in GSM

Speaking specifically about the GSM now, we'll finally understand how the interference is avoid.
To do so, as always, let us take an example of a network with 10 MHz bandwidth. As the channel of GSM is 200 kHz, we have 50 channels available. Remember that each GSM channel has 8 time slots, and considering Full Rate we have 8 users.
It may seem to many channels, but believe me, a major planning challenge is to spread these channels in a GSM network avoiding interference problems. To illustrate, suppose a network with 100 sectors each BTS 3: we have 300 sectors, and only 50 frequencies. Naturally, the channels must be reused, which inevitably result in the same channels used in different sectors.
And there we have the co-channel interference, a major problem to be solved, especially in dense GSM networks.
Not only the problem of co-channels, we also have the problem of multipath, compounded by the fact that GSM band is narrow. A signal can leave the transmitter, and due to obstacles, be reflected in a way that will eventually interfere with the original signal that arrives at the receiver, since this signal is out of phase, because it had to 'travel' more.
And it is especially in these cases that FH helps us.
For clarity, consider an sector with channels A and B. Hardly all slots of all channels are in use all the time. Even if a particular slot of channel A is also in use in another sector - co-channel interference, chances are that another slot of channel B are not! That's what FH does: changes the frequencies and slots of the call!

Thus, each user runs a much lower risk of suffering co-channel interference.
In other words, a channel can be suffering interference, but we have other channels in the sequence of jumps that may be no interference! When the network uses FH, and moves our call slot to slot, and frequency to frequency, the interference is turns into a random effect.
We still, as we speak, the problems of multipath. And the idea is basically the same. By jumping from one frequency to another, the user suffers the effects of multipath problem by a very small periods of time. (Remember we use narrow bands!)
In both cases, whether co-channel interference or multipath fading, there are the error correction algorithms, which achieve the most efficient way to clean and recover the original signal.

FH Basic Algorithm

Finally, we see a simplified diagram showing the steps involved in establishing a communication using FH.

First, the transmitter sends a request (1) to start the FH through the control channel. The receiver, after receiving this request sends a base number (2) back. The transmitter then uses that number, calculates and sends the series of frequencies (3) to be used. With this list of frequencies, the receiver returns a synchronization signal (4) in the first frequency of the list. Thus, communication between the two is established (5).


Disadvantages

And what are the disadvantages of FH?
Like any spread spectrum communication, we need a bigger band than would be necessary if it were used only a single frequency to carry the signal.
Furthermore, whenever a communication is established, it takes a significant time, to establish sync between the receiver and transmitter.
Anyway, the advantages outweigh these points.

Conclusion

We now know the simple idea of frequency hopping, a spread-spectrum modulation scheme, where it is possible to establish a communication over a single logical channel, based upon the timing of changes (jumps) in frequency among them, following a pseudo-random sequence known by both.
As a result, using the FH have a signal more robust - interference resistant, and secure - to be very difficult to intercept.

OSI BEST METHOD TO UNDERSTAND

Layering

Okay, so here we go: layers. Why this division?
Stages of communication occur in layers. The division - standardization - was made thinking about it, mainly to facilitate the developments. A person can develop technologies to any layer, without having to worry about the others. Interesting, no?
To begin to familiarize ourselves with them, following its listing: Physical (1), Link (2), Network (3), Transportation (4), Session (5), Presentation (6) and Application (7).
But to explain further, it is easier to first make an analogy.
Imagine the following situation, where William, NY - United States sends a letter to Manuel, in Lisbon, Portugal's capital.

Let's start from the transmitter point: William. The first thing that William needs to do is write the letter, along with the Manuel address [7-Application].
William is with his injured hand, and can not write. Then he dictates the contents of the letter to his wife Rose, who writes a letter to Manuel [6-Presentation].
William's wife then put the letter in an envelope, goes to the post, put the letter [Session 5].
Then the postal worker in the United States decides to outsource the service. He asks a third party logistics - Fedex - to carry the envelope, which in turn puts everything in an secure envelope of his Company. [4-Transportation]
The dispatch of the envelope is now on the Logistics company, who decides that the quickest route is to Lisbon Airport - using air. So put the letter in another envelope with your address information, and they take the airline. [3-Network]
Officials of the airline put the envelope in it's company's box on the plane, adding a label with the destination address. [2-Link]
The box with the envelope follows our trip on the plane to Portugal [1-Physics].
Arriving in Portugal, we start the reverse process, ie the reception.
The box is then unloaded from the plane, the envelope is removed from within the same and delivered to an officer who is in charge of directing the envelope to its destination, which is the company Fedex in Lisbon [2-Link].
The delivery of the envelope as we know is with the company Fedex, which verifies that the same should follow for the post office in Lisbon. [3-Network]
An official of the Post Office in Portugal receives the company's FedEx envelope, the envelope of removing it, then deliver to the address of Manuel in Lisbon [4-Transportation].
Mary, the wife of Manuel checks the local post office, and receives the original envelope with the letter. [5-Session].
She then read the contents to him [6-Presentation].
Finally, Manuel learns the news of Willian [7-Application].

This was a very simplified example. We do not talk for example of the routers that may occur, eg if you plane scales, being necessary to add and remove new mailing labels. However, I believe it has served to demonstrate the idea.
Also, remember that all analogy is not always perfect, but helps us understand the idea.
Now that we have done our analogy, we will bring the side a bit more technical, and talk a little about each layer.
We will not follow the entire process - starting from seventh to first, and then the other way. Let's talk at once, taking the road of first layer to last - the seventh.
Note: This description is a long subject, as the description of devices, protocols and aplicatiovs used. Anyway, let's try to keep a simplified line to describe the layers.

Wednesday, May 29, 2013

Speech Coding

Speech coding is the process of obtaining a compact representation of voice signals for efficient transmission over band-limited wired and wireless channels and/or storage.

Today, speech coders have become essential components in telecommunications and in the multimedia infrastructure. Commercial systems that rely on efficient speech coding include cellular communication, voice over internet protocol (VOIP), videoconferencing, electronic toys, archiving, and digital simultaneous voice and data (DSVD), as well as numerous PC-based games and multimedia applications.

Speech coding is the art of creating a minimally redundant representation of the speech signal that can be efficiently transmitted or stored in digital media, and decoding the signal with the best possible perceptual quality. Like any other continuous-time signal, speech may be represented digitally through the processes of sampling and quantization; speech is typically quantized using either 16-bit uniform or 8-bit companded quantization.

Like many other signals, however, a sampled speech signal contains a great deal of information that is either redundant (nonzero mutual information between successive samples in the signal) or perceptually irrelevant (information that is not perceived by human listeners).
Most telecommunications coders are lossy, meaning that the synthesized speech is perceptually similar to the original but may be physically dissimilar.

A speech coder converts a digitized speech signal into a coded representation, which is usually transmitted in frames. A speech decoder receives coded frames and syn- thesizes reconstructed speech. Standards typically dictate the input–output relationships of both coder and decoder.



Source: From Google