Part 1: Introduction to Cellular Communications
- Cellular phone concept
- Base station
- Mobile station
- Mobile switching center
 
- Uplink and downlink
- Time division duplexing
- Frequency division duplexing
- Comparisons
 
- Multiple access methods
- Frequency division multiple access
- Time division multiple access
- Code division multiple access
 
- Networking
- Circuit and packet switching
 
- History of cellular communications
- 1G to 4G
- Phone comparisons
 
Part 2: Radio Wave Spectrum, Propagation, and Antennas
- The electromagnetic spectrum
- Types of radio services
- Spectrum characteristics
 
- Radio frequency (RF) system measurements
- Power measurement using the decibel
- Signal to noise and interference ratios
 
- Antennas
- Terminology
- Gain and loss
- Law of reciprocity
- Base station antennas
- Smart antennas
 
- RF propagation in fixed and mobile environments
- Propagation mechanisms
- Path loss models
- Maximum range calculations
- Multipath and fading
 
- Cell planning and frequency reuse
- Frequency reuse calculations
- Cell sectoring
- Cell splitting
- Antenna downtilt
 
Part 3: Modulation and Coding
- Basic modulation methods
- Modulated signal structure
- Amplitude, frequency, and phase shift keying
- Bit error rate performance in Gaussian noise
 
- Advanced modulation methods
- Gaussian filtered frequency shift keying (GFSK)
- Quadrature phase shift keying (QPSK)
- Quadrature amplitude modulation (QAM)
- Orthogonal frequency division multiplexing (OFDM)
 
- Spread spectrum systems
- Frequency hop
- Direct sequence
- Multiple access methods
 
- Error control
- Error detection
- Error correction
- Automatic repeat request
 
- Speech coding
- Speech quality rating
- Speech coding techniques
- Speech coders in practice
 
Part 4: 3GPP, 3GPP2, and IEEE LAN/MAN Standardization
- Motives behind 3G evolution
- Driving forces
- Radio access evolution
- Core network evolution
 
- Summary of 3GPP standards
- GSM, GPRS, and EDGE
- UMTS/WCDMA and HSPA
- LTE
 
- Summary of 3GPP2 cellular standards
- cdmaOne
- cdma2000
- EVDO
 
- Summary of IEEE LAN/MAN standards
- Wi-Fi
- Bluetooth
- WiMAX
 
- Market penetration and deployment status
Part 5: 3GPP2 CDMA: cdmaOne, cdma2000, and EVDO Operations
- CDMA codes and sequences
- Maximal length sequences
- Walsh codes
 
- Forward link channel
- Modulation
- Pilot channel
- Synchronization channel
- Control channels
- Paging channels
- Traffic channels
 
- Reverse link channels
- Pilot channel
- Access channel
- Control channels
- Traffic channels
 
- Call processing
- Initialization
- System access
- Authentication
 
- Resource management
- Power control
- Handoff
 
- Evolution-Data Optimized (EVDO) operation
- Requirements
- Reference model
- Forward and reverse channels
- Modulation and coding
- Power control
- Scheduling
 
Part 6: 3GPP CDMA: UMTS and HSPA Operations
- UMTS architecture and protocols
- UTRAN radio network controller and NodeB
- Core network architecture and protocols
 
- UMTS physical layer
- WCDMA modulation and coding
- Transport channels
- User data transmission
- Signaling
- Cell search and access
 
- Radio interface protocols
- Medium access control
- Radio link control
- Packet data convergence protocol
- Radio resource control
 
- Radio resource management
- Power control
- Handovers
- Admission control
 
- High-speed packet access (HSPA) operation
- HSDPA physical layer structure
- HSDPA performance
- Enhanced uplink
 
Part 7: CDMA System Security
- Wireless security challenges
- Threat categories and attack methods
- General security setup process
 
- Attacks in mobile environments
- Spoofing and illicit use
- Man-in-the-middle
- Interception of data
- Denial of service
 
- Cryptography basics
- Symmetric and asymmetric cryptography
- Public key infrastructure
- Cryptographic attacks
 
- Access control and authentication
- Weak and strong authentication schemes
- Attacks on authentication
- Authorization and access control
 
- Smart card security
- Smart card basics
- Smart card communication
- Invasive and non-invasive attacks on smart cards
 
- Legacy GSM security operation and weaknesses
- GSM security model and encryption algorithms
- Attacks on GSM
 
- UMTS security
- Improvements to GSM security
- Confidentiality algorithm and extensions
- Integrity algorithm
- KASUMI kernel
- Authentication and key agreement (AKA)
 
- cdma2000 security
- Air interface parameters for authentication
- Secure parameters
- Challenge-response authentication procedure
- Authentication during MS registration
- Authentication during MS call origination and termination
- The CAVE algorithm for authentication and encryption
 
Part 8: Long-Term Evolution (LTE) Operations
- General LTE operation
- System architecture
- Frequency bands
- Downlink and uplink modulation and resource structure
- Error control
- Spatial multiplexing
- Performance requirements
 
- LTE downlink
- User protocol architecture
- Channel mapping
- Logical, transport, and physical channel functions
- Cell acquisition
- IP packet processing and physical data mapping
- Control and radio resource management
 
- LTE uplink
- UL/DL similarities and differences
- Channel mapping
- Random access
- Data transfer
- Power save methods
- Link activity and capacity
 
- Wrap-up
- Course Recap and Q/A
- Evaluations
 
