LTE and UMTS | HSPA Location Based Services for E911 Training

LTE and UMTS | HSPA Location Based Services for E911 Training


LTE and UMTS | HSPA Location Based Services for E911 Training

This is an intermediate-level in-depth LTE and UMTS | HSPA Location Based Services for E911 Training course on CDMA/CDMA2000 (CDMAOne, 1xRTT, EVDO) and WCDMA (UMTS/HSPA as well as LTE) with a particular emphasis on the issues of security and vulnerability.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

LTE and UMTS | HSPA Location Based Services for E911 TrainingRelated Courses:

Duration: 5 days

Course Content:

Part 1: Introduction to Cellular Communications

Cellular phone concept
Base station
Mobile station
Mobile switching center

Uplink and downlink
Time division duplexing
Frequency division duplexing

Multiple access methods
Frequency division multiple access
Time division multiple access
Code division multiple access

Circuit and packet switching

History of cellular communications
1G to 4G
Phone comparisons

Part 2: Radio Wave Spectrum, Propagation, and Antennas

The electromagnetic spectrum
Types of radio services
Spectrum characteristics

Radio frequency (RF) system measurements
Power measurement using the decibel
Signal to noise and interference ratios

Gain and loss
Law of reciprocity
Base station antennas
Smart antennas

RF propagation in fixed and mobile environments
Propagation mechanisms
Path loss models
Maximum range calculations
Multipath and fading

Cell planning and frequency reuse
Frequency reuse calculations
Cell sectoring
Cell splitting
Antenna downtilt

Part 3: Modulation and Coding

Basic modulation methods
Modulated signal structure
Amplitude, frequency, and phase shift keying
Bit error rate performance in Gaussian noise

Advanced modulation methods
Gaussian filtered frequency shift keying (GFSK)
Quadrature phase shift keying (QPSK)
Quadrature amplitude modulation (QAM)
Orthogonal frequency division multiplexing (OFDM)

Spread spectrum systems
Frequency hop
Direct sequence
Multiple access methods

Error control
Error detection
Error correction
Automatic repeat request

Speech coding
Speech quality rating
Speech coding techniques
Speech coders in practice

Part 4: 3GPP, 3GPP2, and IEEE LAN/MAN Standardization

Motives behind 3G evolution
Driving forces
Radio access evolution
Core network evolution

Summary of 3GPP standards

Summary of 3GPP2 cellular standards

Summary of IEEE LAN/MAN standards

Market penetration and deployment status

Part 5: 3GPP2 CDMA: cdmaOne, cdma2000, and EVDO Operations

CDMA codes and sequences
Maximal length sequences
Walsh codes

Forward link channel
Pilot channel
Synchronization channel
Control channels
Paging channels
Traffic channels

Reverse link channels
Pilot channel
Access channel
Control channels
Traffic channels

Call processing
System access

Resource management
Power control

Evolution-Data Optimized (EVDO) operation
Reference model
Forward and reverse channels
Modulation and coding
Power control

Part 6: 3GPP CDMA: UMTS and HSPA Operations

UMTS architecture and protocols
UTRAN radio network controller and NodeB
Core network architecture and protocols

UMTS physical layer
WCDMA modulation and coding
Transport channels
User data transmission
Cell search and access

Radio interface protocols
Medium access control
Radio link control
Packet data convergence protocol
Radio resource control

Radio resource management
Power control
Admission control

High-speed packet access (HSPA) operation
HSDPA physical layer structure
HSDPA performance
Enhanced uplink

Part 7: CDMA System Security

Wireless security challenges
Threat categories and attack methods
General security setup process

Attacks in mobile environments
Spoofing and illicit use
Interception of data
Denial of service

Cryptography basics
Symmetric and asymmetr
ic cryptography
Public key infrastructure
Cryptographic attacks

Access control and authentication
Weak and strong authentication schemes
Attacks on authentication
Authorization and access control

Smart card security
Smart card basics
Smart card communication
Invasive and non-invasive attacks on smart cards

Legacy GSM security operation and weaknesses
GSM security model and encryption algorithms
Attacks on GSM

UMTS security
Improvements to GSM security
Confidentiality algorithm and extensions
Integrity algorithm
KASUMI kernel
Authentication and key agreement (AKA)

cdma2000 security
Air interface parameters for authentication
Secure parameters
Challenge-response authentication procedure
Authentication during MS registration
Authentication during MS call origination and termination
The CAVE algorithm for authentication and encryption

Part 8: Long-Term Evolution (LTE) Operations

General LTE operation
System architecture
Frequency bands
Downlink and uplink modulation and resource structure
Error control
Spatial multiplexing
Performance requirements

LTE downlink
User protocol architecture
Channel mapping
Logical, transport, and physical channel functions
Cell acquisition
IP packet processing and physical data mapping
Control and radio resource management

LTE uplink
UL/DL similarities and differences
Channel mapping
Random access
Data transfer
Power save methods
Link activity and capacity

Course Summary

Request More Information

Time Frame: 0-3 Months4-12 Months

Print Friendly, PDF & Email