Part 1: Introduction to Cellular Communications
- Cellular phone concept
- Base station
- Mobile station
- Mobile switching center
- Uplink and downlink
- Time division duplexing
- Frequency division duplexing
- Comparisons
- Multiple access methods
- Frequency division multiple access
- Time division multiple access
- Code division multiple access
- Networking
- Circuit and packet switching
- History of cellular communications
- 1G to 4G
- Phone comparisons
Part 2: Radio Wave Spectrum, Propagation, and Antennas
- The electromagnetic spectrum
- Types of radio services
- Spectrum characteristics
- Radio frequency (RF) system measurements
- Power measurement using the decibel
- Signal to noise and interference ratios
- Antennas
- Terminology
- Gain and loss
- Law of reciprocity
- Base station antennas
- Smart antennas
- RF propagation in fixed and mobile environments
- Propagation mechanisms
- Path loss models
- Maximum range calculations
- Multipath and fading
- Cell planning and frequency reuse
- Frequency reuse calculations
- Cell sectoring
- Cell splitting
- Antenna downtilt
Part 3: Modulation and Coding
- Basic modulation methods
- Modulated signal structure
- Amplitude, frequency, and phase shift keying
- Bit error rate performance in Gaussian noise
- Advanced modulation methods
- Gaussian filtered frequency shift keying (GFSK)
- Quadrature phase shift keying (QPSK)
- Quadrature amplitude modulation (QAM)
- Orthogonal frequency division multiplexing (OFDM)
- Spread spectrum systems
- Frequency hop
- Direct sequence
- Multiple access methods
- Error control
- Error detection
- Error correction
- Automatic repeat request
- Speech coding
- Speech quality rating
- Speech coding techniques
- Speech coders in practice
Part 4: 3GPP, 3GPP2, and IEEE LAN/MAN Standardization
- Motives behind 3G evolution
- Driving forces
- Radio access evolution
- Core network evolution
- Summary of 3GPP standards
- GSM, GPRS, and EDGE
- UMTS/WCDMA and HSPA
- LTE
- Summary of 3GPP2 cellular standards
- cdmaOne
- cdma2000
- EVDO
- Summary of IEEE LAN/MAN standards
- Wi-Fi
- Bluetooth
- WiMAX
- Market penetration and deployment status
Part 5: 3GPP2 CDMA: cdmaOne, cdma2000, and EVDO Operations
- CDMA codes and sequences
- Maximal length sequences
- Walsh codes
- Forward link channel
- Modulation
- Pilot channel
- Synchronization channel
- Control channels
- Paging channels
- Traffic channels
- Reverse link channels
- Pilot channel
- Access channel
- Control channels
- Traffic channels
- Call processing
- Initialization
- System access
- Authentication
- Resource management
- Power control
- Handoff
- Evolution-Data Optimized (EVDO) operation
- Requirements
- Reference model
- Forward and reverse channels
- Modulation and coding
- Power control
- Scheduling
Part 6: 3GPP CDMA: UMTS and HSPA Operations
- UMTS architecture and protocols
- UTRAN radio network controller and NodeB
- Core network architecture and protocols
- UMTS physical layer
- WCDMA modulation and coding
- Transport channels
- User data transmission
- Signaling
- Cell search and access
- Radio interface protocols
- Medium access control
- Radio link control
- Packet data convergence protocol
- Radio resource control
- Radio resource management
- Power control
- Handovers
- Admission control
- High-speed packet access (HSPA) operation
- HSDPA physical layer structure
- HSDPA performance
- Enhanced uplink
Part 7: CDMA System Security
- Wireless security challenges
- Threat categories and attack methods
- General security setup process
- Attacks in mobile environments
- Spoofing and illicit use
- Man-in-the-middle
- Interception of data
- Denial of service
- Cryptography basics
- Symmetric and asymmetric cryptography
- Public key infrastructure
- Cryptographic attacks
- Access control and authentication
- Weak and strong authentication schemes
- Attacks on authentication
- Authorization and access control
- Smart card security
- Smart card basics
- Smart card communication
- Invasive and non-invasive attacks on smart cards
- Legacy GSM security operation and weaknesses
- GSM security model and encryption algorithms
- Attacks on GSM
- UMTS security
- Improvements to GSM security
- Confidentiality algorithm and extensions
- Integrity algorithm
- KASUMI kernel
- Authentication and key agreement (AKA)
- cdma2000 security
- Air interface parameters for authentication
- Secure parameters
- Challenge-response authentication procedure
- Authentication during MS registration
- Authentication during MS call origination and termination
- The CAVE algorithm for authentication and encryption
Part 8: Long-Term Evolution (LTE) Operations
- General LTE operation
- System architecture
- Frequency bands
- Downlink and uplink modulation and resource structure
- Error control
- Spatial multiplexing
- Performance requirements
- LTE downlink
- User protocol architecture
- Channel mapping
- Logical, transport, and physical channel functions
- Cell acquisition
- IP packet processing and physical data mapping
- Control and radio resource management
- LTE uplink
- UL/DL similarities and differences
- Channel mapping
- Random access
- Data transfer
- Power save methods
- Link activity and capacity
- Wrap-up
- Course Recap and Q/A
- Evaluations