CDMA2000 Training Fundamentals

CDMA2000 Training Fundamentals


CDMA2000 Training Fundamentals Course delivered at your location Worldwide

This CDMA2000 Training course provides the student an in-depth description of the functioning of a cdma2000 system according to the key CDMA standards (TIA/EIA/IS2000-A) and the rationale behind the specifications. Course discussions provide a point by point description of key processes including power control, spread spectrum signal generation, hand-off techniques, call processing, registration, authentication, encryption. Emphasis is placed on new features and capabilities introduced in cdma2000.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

CDMA2000 Training FundamentalsRelated Courses:

Duration: 3-4 days


Upon completing this course the participant will be able to define CDMA2000 in a 3G context, understand how CDMA2000 (1x, 1xEV-DO and 1xEV-DV) enhances IS-95 networks, list its new services, explain its key aspects and capabilities as an access network, find information in appropriate documents, and suggest its likely evolution into the 3G world.

The detailed descriptions of the radio interface as an elaborate extension of the IS-95 Access Network, the MAC, LAC, and RLP sub-layers, and the behavior of the system offered in the course should allow the participant to, for example, understand dimensioning procedures and predict the consequences of various configurations.

Course Content:

Migration Path from 2G to 2.5G to 3G
◾Review of 3G Evolution
◾CDMA2000 vs.IS-95A/B
◾IS-95 Access and Core Network
◾Spreading and Modulation
◾Link Structures
◾High Data Rate Capabilities
◾Migration Scenarios
◾Packet-switched networks
◾Network Architecture
◾Call Processing
◾IS-2000, IS-2001, IS-707, IS-835, and IS-856
◾Overview of CDMA2000 1x, 1xEV-DO and 1xEV-DV

Mobile Radio Environment
◾Propagation Loss
◾Propagation Models
◾Multipath and Delay Spread
◾Rake Receiver
◾Orthogonal Transmit Diversity
◾Space Time Spreading
◾Smart Antenna Applications

CDMA2000 Layers and Protocols
◾Key Features of CDMA2000:
◾CDMA2000 network architecture
◾Interfaces of a CDMA2000 Network
◾Air Interface Enhancements and Capabilities
◾Physical layer
◾MAC, LAC, and RLP layers
◾Upper layers
◾Orthogonal and PN sequence
◾PN and Walsh Codes in CDMA2000
◾PN Code Planning At Higher Code Speeds
◾Walsh Code Length and Channel Speed
◾Complex Walsh Code Use
◾Complex or Quadrature PN Spreading
◾The Requirement for Complex Modulators
◾IS-95 vs, CDMA2000 states
◾The Protocol Stack
◾MAC Architecture and duties
◾LAC Architecture and duties
◾RLP behavior
◾TCP/IP and mobile IP
◾QoS Issues
◾Security an Authentication Procedures
◾Link Budgets Analysis
◾System Capacity

CDMA2000 Spreading Rates, Radio Configurations, and Data Rates
◾SR1: RC1, RC2, RC3, RC4, RC5
◾SR3: RC6, RC7, RC8, RC9
◾Multi-Carrier overlay mode

Signaling, Voice and Data Integration
◾MAC/LAC Structure and Layering
◾Mapping of Logical Channels
◾Common Traffic Channels
◾Common Signaling Channels
◾Common MAC Channels
◾Dedicated MAC Channels
◾Dedicated Traffic Channels
◾Details of the Physical Layer
◾Physical and Logical channels
◾Radio Configurations (RC)
◾Forward and Reverse links
◾Power control
◾Traffic Channel Profiles
◾Physical layer functions
◾Variable length Walsh codes
◾CDMA2000 Enhancements
◾Forward and Reverse Link Channel

CDMA2000 Layer 2 and Layer 3 Protocols
◾MAC/LAC Layers (Layer 2)
◾Multiplexing and QoS
◾Radio Link Protocol (RLP)
◾Upper Layer (Layer 3) Layer 3
◾Voice and packet data call setup
◾Bandwidth on demand
◾Support for packet data
◾Concurrent services
◾Handoffs and Power control

The Channels of CDMA2000
◾Physical and Logical Channels, Naming Conventions
◾SR1 Forward Channels, Functions and Data Rates
◾Walsh Codes: Trees, data rate considerations
◾Power Control and Open Loop Offsets
◾HPSK Modulation and its benefits

The Forward Link
◾Common Forward Channels
◾Forward Pilot Channel
◾Forward Transmit Diversity Pilot Channel
◾Forward Auxiliary Pilot Channel
◾Forward Transmit Diversity Auxiliary Pilot Channel
◾Forward Sync Channel
◾Forward Paging Channel
◾Forward Quick Paging Channels
◾Forward Common Control Channels
◾Forward Broadcast Channel
◾Forward Common Assignment Channels
◾Forward Common Power Control Channel
◾Dedicated Forward Channels
◾Forward Fundamental Channel
◾Forward Supplemental Channel
◾Forward Supplemental Code Channels
◾Forward Dedicated Control Channel

The Reverse Link
◾Common Reverse Channels
◾Reverse Access Channel
◾Reverse Enhanced Access Channel
◾Reverse Common Control Channel
◾Dedicated Reverse Channel
◾Reverse Pilot Channel
◾Reverse Supplemental Channels
◾Reverse Supplemental Code Channels
◾Reverse Dedicated Control Channel
◾Reverse Fundamental Channel

Power Control
◾Open Loop Power Control
◾Forward Link Closed Loop Power Control
◾Forward Link Outer Loop Power Control
◾Reverse Link Closed Loop Power Control
◾Reverse Link Outer Loop Power Control
◾Power Control of MS Packet Channels

◾Call Details
◾Soft & Softer Handoffs
◾Hard Handoffs
◾Inter-Frequency Handoff

Packet Switched Core Network
◾The New Packet Data Network
◾Network Elements: PDSNs, HA, FA, AAA, OSSN
◾Simple IP and Mobile IP
◾PDSN and AAA functions
◾CDMA2000 Wireless Data Requirements for AAA (RFC3141)
◾Security and Authentication Details
◾Mobility in packet data network
◾Quality of Service (QoS)
◾Migration Plans
◾Products and Paltforms

Authentication Enhancements
◾Registration Call Tasks
◾Autonomous or Power-On Registration
◾Power-Off Deregistration
◾Origination Call Tasks
◾Idle MS Origination
◾Terminating Call Tasks
◾Page an MS Procedure
◾Authorize MS Termination Attempt
◾MS Termination Alerting
◾Authentication Directive
◾AC Initiation of an Authentication Directive
◾Role of HLR, VLR and MSC
◾Authentication Directive Forward
◾Base Station Challenge

1x, 1xEV-DO and 1xEV-DV
◾Asymmetric services
◾Time multiplexed CDMA
◾Forward and Reverse link structures
◾Network architecture
◾Protocol layers
◾Physical layer
◾Capacity Planning

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment