Академический Документы
Профессиональный Документы
Культура Документы
BALOGUN
AfriHUB INTL ICT INSTITUTE DEPARTMENT OF NETWORK AND SYSTEM SECURITY FCT, ABUJA
JULY, 2011
Content
Table of Content .i Declaration .iii Abstract ..iv Acknowledgement ..v References ..vi 1. INTRODUCTION .....1 1.1 1.1.1 1.1.2 1.1.3 1.2 1.2.1 1.2.2 1.2.3 1.3 1.4 1.4 1.5 TDMA .....1 Advantages of TDMA ....2 Disadvantages of TDMA ...3 Features of TDMA .3 CDMA .4 Advantages of CDMA 4 Disadvantages of CDMA ...4 Features of CDMA .5 Differences between TDMA and CDMA .5 TDMA and CDMA Travel in Nigeria ..6 The Research Problem ..7 Research Objective ....7 TDMA Network Security .10 CDMA Network Security .19 How CDMA Works ..24 How TDMA Works ..26 TDMA Network ...26
2
Subscriber Identity Module 26 TDMA Technology ..27 Using A GSM Phone ...27 Sharing GSM Signals ..27
3. RESEARCH DESIGN AND METHODOLOGY/NATURE AND DESIGN OF THE STUDY ...29 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Research Design ...29 Population Sample ...29 Sources of Data .29 Methodology ..30 Validity of the Research Instrument ...30 Location of Data ...30 Statistical Analysis 31
4. RESULTS AND DISCUSSIONS ..33 4.1 Most Populous and Most Used Network in Wuse District by Percentage ...33 5. RECOMMENDATIONS AND CONCLUSION .26 Recommendation ...37 Conclusion ..40 REFERENCE .vi
Declaration
We declare that this report does not incorporate without acknowledgment any material previously submitted for a degree or diploma In any institution; and that to the best of our knowledge it does not contain any materials previously published or written by another person except where due reference is made in the text.
SIGNED:..................................
DATE : ........................................
Abstract
A comparative study of the two competing digital wireless technologies used in the telecommunication industry. The technologies are: Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA). TDMA which uses time sharing protocol technique is closely compared with CDMA which uses spread spectrum technique. The comparative study is done based on information obtained primarily from reports, research works, questioners and some data gotten from network providers: Visaphone (CDMA) and Airtel (TDMA). The results obtained from this comparative study, showed that the CDMA technology appears to be more suitable than the GSM (TDMA) for the Wuse (Nigeria) environment.
Acknowledgment
We gratefully acknowledge the assistance and support of our supervisor, Engr. Isaac Faroye, who have introduced us into the field of Technical Report Writing.
We would like to thank Professor Manny Aniebonam and Mr. Emeka for their invaluable discussions and suggestions, with respect to our simulation program and research.
Thanks to Globacom Nigeria Limited for maintaining the computer network very efficiently without which we would not have finished our report in the set time span and thanks to all our colleagues in AfriHUB Intl ICT Institute who have supported and encouraged us in all our endeavors.
Finally and most importantly, this report is dedicated to our parents who have inspired, motivated and financially supported our education. Their contribution is Unfathomable.
CHAPTER 1
INTRODUCTION
In Nigeria cell phone have become the single greatest tools in day to day life. It has become a necessity that business associates should be able to communicate on the go. That is why it has become so important to make choices in choosing which handheld device one should go for. A handheld device is selected according to its features and benefits, like does it provide access to internet and email or does it look slick and more.
An important question when designing and standardizing cellular systems is the selection of the multiple access schemes. There are two basic principles in multiple access, TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access). All the principles allow multiple users to share the same physical channel. But they differ in the way users share the common resource.
1.1
TDMA
In late1980s, as a search to convert the existing analog network to digital as a means to improve capacity, the cellular telecommunications industry association chose TDMA over FDMA.
TDMA, Short for Time Division Multiple Access, a technology for delivering digital wireless service using time-division multiplexing (TDM). TDMA works by dividing a radio frequency into time slots and then
7
allocating slots to multiple calls. In this way, a single frequency can support multiple, simultaneous data channels. TDMA is used by the GSM digital cellular system it allows the users to share the same frequency channel by dividing the signal into different time slots. Each user takes turn in a round robin fashion for transmitting and receiving over the channel. By Steve
Punter, 2006, CDMA vs. TDMA, <http://www.arcx.com/sites/CDMAvsTDMA.htm> 18 June, 2011.
Frequency
Synchronization intervals
...
Time Frame
during conversations. Since the cell size grows smaller, it proves to save base station equipment, space and maintenance. TDMA is the most cost effective technology to convert an analog system to digital.
Another problem in TDMA is that it is subjected to multipath distortion. To overcome this distortion, a time limit can be used on the system. Once the time limit is expired the signal is ignored.
1.2
CDMA
CDMA Stands for Code Division Multiple Accesses. It is a technique used for digital communication, and wireless technology in particular, that involves multiplexing. Whereas conventional communication systems use constant frequencies, CDMA uses multiple accesses, or multiplexing. Accomplished through the specific type known as spread spectrum in this case, multiplexing uses varied frequencies to transmit audio signals. This, coupled with code division, which requires a certain code to send and receive the frequency, further protects CDMA communications from interference.
By Steve Punter, 2006, CDMA vs. TDMA,
degrades. Another disadvantage in this technology when compared to GSM is the lack of international roaming capabilities. The ability to upgrade or change to another handset is not easy with this technology because the network service information for the phone is put in the actual phone unlike GSM which uses SIM card for this. One another disadvantage is the limited variety of the handset, because at present the major mobile companies use GSM technology.
1.3
CDMA because CDMA handsets transmit data all the time and TDMA does not require constant transmission. When it comes to international roaming TDMA is better than CDMA. CDMA is patented by Qualcomm, so an extra fee is paid to Qualcomm. Nationwide the market size for TDMA system is far bigger both in the number of subscribers and coverage, than CDMA system.
In TDMA users can only transmit in their respective time slot. Unlike TDMA, in CDMA several users can transmit over the channel at the same time.
1.4
can have this flexibility with their own service that stores data on the operators database. This service allows the user to swap datas between two handsets with a little trouble, but the advantage is it can be done when the handset is even lost but in TDMA technology, when a handset is lost, SIM card is also lost with it. When it comes for roaming handsets with TDMA is far better than CDMA handsets because TDMA is used in most of the markets across Nigeria. Users using tri-band or quad-band can travel to Enugu, Imo and most of Nigerian States and still can use their cell phone. CDMA does not have this multiband capability, thus cannot be used in multiple states with ease.
1.5
There has been a long and still ongoing (at the time of writing this report) debate, to decide the best system for the Wuse Market environment. Currently CDMA and TDMA mobiles cannot be operated in the same cell. The solution to the above problem would mean transportability of either mobile in any type of system thus providing global usage (given the two systems are available at that geographical location)
1.6
The objectives of this report are as follows: 1. 2. 3. To understand what CDMA and TDMA and how they work. To know the security of TDMA and CDMA networks. To determine the best network for Wuse District.
14
CHAPTER 2
TDMA AND CDMA NETWORK SECURITY
Since the birth of the cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. In 1996, fraudulent activities through cloning and other mean cost operators some US$750 million in lost revenues in the United States alone. Fraud is still a problem today. Technical fraud, such as cloning, is decreasing in Nigeria while subscription fraud is on the rise. In this report, we will limit our discussions to technical fraud only. With the advent of second-generation digital platforms like TDMA and CDMA-IS-41, operators were able to enhance their network security by using improved encryption algorithms and other means. The noise-like signature of a CDMA signal over the air interface makes eavesdropping very difficult. This is due to the CDMA Long Code, a 42-bit PN (Pseudo-Random Noise of Length 242-1) sequence, which is used to scramble voice and data transmissions. This paper discusses how CDMA and TDMA implement three major features of mobile security: Authentication, Data protection, and Anonymity.
15
2.1
signaling data
subscriber is uniquely
Identity (IMSI). This information, along with the individual subscriber authentication key (Ki), constitutes sensitive identification credentials
analogous to the Electronic Serial Number (ESN) in analog systems such as AMPS and TACS. The design of the TDMA authentication and encryption
schemes is such that this sensitive information is never transmitted over the radio channel. Rather, a challenge-response mechanism is used to perform authentication. The actual conversations are encrypted using a temporary, randomly generated ciphering key (Kc). The MS identifies itself by means of the Temporary Mobile Subscriber Identity (TMSI), which is issued by the network and may be changed periodically (i.e. during hand-offs) for additional security. The security mechanisms of TDMA are implemented in three different system elements; the Subscriber Identity Module (SIM), the TDMA handset or MS, and the TDMA network. The SIM contains the IMSI, the individual subscriber authentication key (Ki), the ciphering key generating algorithm
(A8), the authentication algorithm (A3), as well as a Personal Identification Number (PIN). The TDMA handset contains the ciphering algorithm (A5). The encryption algorithms (A3, A5, A8) are present in the TDMA network
16
as well. The Authentication Center (AUC), part of the Operation and Maintenance Subsystem (OMS) of the TDMA network, consists of a database of identification and authentication information for subscribers. This information consists of the IMSI, the TMSI, the Location Area Identity (LAI), and the individual subscriber authentication key (Ki) for each user. In order for the authentication and security mechanisms to function, all three elements (SIM, handset, and TDMA network) are required. This distribution of security credentials and encryption algorithms provides an additional measure of security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular telephone fraud. Figure 2.2 demonstrates the distribution of security information among the three system elements, the SIM, the MS, and the GSM network. Within the GSM network, the security information is further distributed among the authentication center (AUC), the home location register (HLR) and the ssss visitor location register (VLR). The AUC is responsible for generating the sets of RAND, SRES, and Kc which are stored in the HLR and VLR for subsequent use in the authentication and encryption processes.
17
18
i.
Authentication
The TDMA network authenticates the identity of the subscriber through the use of a challenge-response mechanism. A 128-bit random number (RAND) is sent to the MS. The MS computes the 32-bit signed response (SRES) based on the encryption of the random number (RAND) with the authentication algorithm (A3) using the individual subscriber authentication key (Ki). Upon receiving the signed response (SRES) from the subscriber, the TDMA network repeats the calculation to verify the identity of the subscriber. Note that the individual subscriber authentication key (Ki) is never transmitted over the radio channel. It is present in the subscriber's SIM, as well as the AUC, HLR, and VLR databases as previously described. If the received SRES agrees with the calculated value, the MS has been successfully authenticated and may continue. If the values do not match, the connection is terminated and an authentication failure indicated to the MS. Figure 2.3 shown below illustrates the authentication mechanism.
19
20
The calculation of the signed response is processed within the SIM. This provides enhanced security, because the confidential subscriber information such as the IMSI or the individual subscriber authentication key (Ki) is never released from the SIM during the authentication process.
ii.
21
22
In a similar manner to the authentication process, the computation of the ciphering key (Kc) takes place internally within the SIM. Therefore sensitive information such as the individual subscriber authentication key (Ki) is never revealed by the SIM. Encrypted voice and data communications between the MS and the network is accomplished through use of the ciphering algorithm A5. Encrypted communication is initiated by a ciphering mode request command from the TDMA network. Upon receipt of this command, the mobile station begins encryption and decryption of data using the ciphering algorithm (A5) and the ciphering key (Kc). Figure 2.5 below demonstrates the encryption mechanism.
23
24
iii.
2.2
Unique
to
CDMA
systems,
is
the
42-bit
PN
(pseudo-Random
Noise)Sequence called Long Code to scramble voice and data. On the forward link (network to mobile), data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
CDMA network security protocols rely on a 64-bit authentication key (AKey) and the Electronic Serial Number (ESN) of the mobile. A random binary number called RANDSSD, which is generated in the HLR/AC, also plays a role in the authentication procedures. The A-Key is programmed into the mobile and is stored in the Authentication Center (AC) of the network.
25
In addition to authentication, the A-Key is used to generate the sub-keys for voice privacy and message encryption.
CDMA uses the standardized CAVE (Cellular Authentication and Voice Encryption) algorithm to generate a 128-bit sub-key called the Shared Secret Data (SSD). The A-Key, the ESN and the network-supplied RANDSSD are the inputs to the CAVE that generates SSD. The SSD has two parts: SSD_A (64 bit), for creating authentication signatures and SSD_B (64 bit), for generating keys to encrypt voice and signaling messages. The SSD can be shared with roaming service providers to allow local authentication. A fresh SSD can be generated when mobile returns to the home network or roam to a different system.
i.
Authentication
In CDMA networks, the mobile uses the SSD_A and the broadcast RAND as inputs to the CAVE algorithm to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station. This signature is then used by the base station to verify that the subscriber is legitimate. Both Global Challenge (where all mobiles are challenged with same random number) and Unique Challenge (where a specific RAND is used for each requesting mobile) procedures are available to the operators for authentication. The Global Challenge method allows very rapid authentication. Also, both the mobile and the network track the Call History Count (a 6-bit counter). This provides a way to detect cloning, as the operator gets alerted if there is a mismatch. The A-Key is re-programmable, but both the mobile and the network Authentication Center must be updated. A-Keys may be programmed by one of the following:
26
a) The factory b).The dealer at the point of sale c) Subscribers via telephone d) OTASP (over the air service provisioning).
OTASP transactions utilize a 512-bit Diffie-Hellman key agreement algorithm, making them well suited for this function. The A-Key in the mobile can be changed via OTASP, providing an easy way to quickly cut off service to a cloned mobile or initiate new services to a legitimate subscriber. Security of the A-Key is the most important component of CDMA system.
ii.
27
Additionally, the mobile and the network use the CMEA key with the Enhanced CMEA (ECMEA) algorithm to encrypt signaling messages sent over the air and to decrypt the information received. A separate data key, and an encryption algorithm called ORYX, is used by the mobile and the network to encrypt and decrypt data traffic on the CDMA channels. The Figure below illustrates the CDMA authentication and encryption mechanism.
28
29
By design, all CDMA phones use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
iii.
Anonymity
CDMA systems support the assignment of a Temporary Mobile Station Identifier (TMSI) to a mobile to represent communications to and from a certain mobile in over the air transmissions. This feature makes it more difficult to correlate a mobile users transmission to a mobile user.
2.3
looks for that bit pattern. So even if there are ten conversations in a particular channel at the particular instant of time, no calls interferes with another. As long as the receiving device has the right code, it can pick up its conversation but from all the others. Since CDMA spreads multiple conversations across a wide segment of spectrum, it is known as a Spread Spectrum Technology. The Spread Spectrum uses two types of modulation
30
and
Data
i.
ii.
iv. CDMA phones due to their low-power requirements can do with smaller-sized batteries, which decrease the overall weight of a CDMA phone. v. Calling capacity is superior due to better spectral efficiency.
2.4
2.5
TDMA Network
The TDMA network is a cellular network. Cellular networks are radio networks that consist of cells. Each cell is a cell site that consists of an elevated tower that contains transceivers (transmitters and receivers), signal processors, a timing receiver and electrical power sources. The TDMA network refers to these towers as base stations or Base Transceiver Stations (BTS). The size of each cell refers to the coverage area it's designed for. There are five different cell sizes. The cell size, called a macro, is the size used in TDMA mobile phone systems.
Although the SIM card contains account information that prevents or enables certain services, the handset (cell phone) is the device that locks the user into a specific phone. The phone can be locked from accepting any other SIM card or multiple SIM cards.
mechanism. When a GSM cell phone moves toward a tower or mast, it checks for the strongest signal available and connects. Simultaneously, the weaker mast signal is released and becomes available for the next user.
34
CHAPTER 3
RESEARCH DESIGN AND METHODOLOGY/NATURE AND DESIGN OF THE STUDY
3.1
Research Design
This study is designed to investigate the performance of TDMA and CDMA in Wuse District of the FCT.
3.2
3.3
Sources of Data
On sources of data for this research work, dependence was placed on both the primary and secondary data. That is those data that were in existence before the need to conduct this research was conceived and which related to the research topic is makeup of the secondary data. Secondary data is of great importance to the researchers in that it gave them the knowledge in carrying out this work and enhanced the gathering of information and also helped them generate primary data in their effort.
35
All the data used were taken from unpublished term paper, the internet and questioners.
3.4
Methodology
The researchers in their effort to carry out this study of work used both primary and secondary data.
No textbooks were used in the process of gathering the information in this report work because most information that was needed to carry out this work was gotten from the internet, questioners and interviews conducted so the use of textbooks were completely avoided and ignored.
Meanwhile, questioners were administered due to the level at which the study was carried out require the question method of getting information while the use of the internet was consulted in order to get a sound knowledge of the said topic of study.
3.5
3.6
Location of Data
In carrying out this research, the use of a modem was made to access the internet in order to get valuable information and materials that really helped the researchers carry out their research work successfully.
36
This information was located from: AfriHUB Digital Library. StylMAX Cyber Caf.
3.7
Statistical Analysis
Simple percentage method was used to analyze the data collected. For the purpose of this study, a total of one hundred questionnaires were distributed to the following categories of personnel connected with the Business centres and Offices. i. ii. iii. iv. Bankers IT Consultants Students Business men/women etc.
Section A was for personal data while section B showed the statement to which the subject will respond.
The purpose of the questionnaire was to elicit the opinions of the personnel concerned on the feasibility study of the performance of TDMA and CDMA in Wuse District in the FCT.
a) Sex of Respondents In this study, both male and female personnel were given questionnaires. The findings revealed that 45% of the respondents are males while 45% are females. b) Ages of Respondents Majority of the respondents that were under study fall between the ages of 18-30 years. This indicates that mobile phones are commonly used by the youths found in Wuse District of the FCT.
c) Occupation of Respondents 17% of the respondents are self employed, 28% are students, 19% are civil savants, and 25% are into business, while the remaining 11% fell under others.
38
CHAPTER 4
RESULTS AND DISCUSSIONS
As earlier stated, the major sources of data for this work are the internet, questionnaires distributed, and interviews from individuals.
4.1
Table 4.1 Shows the Most Used CDMA/TDMA Networks in Wuse District TDMA CDMA NETWORK BRAND MTN GLO ETISALAT AIRTEL % 40 15 10 5 NETWORK BRAND VISAFONE STARCOMS MULTILINKS ZOOM % 20 7.5 5 2.5
The above table shows that the TDMA network is the most popular and most used network in the Wuse District compared to the CDMA.
39
From the questionnaires and interviews conducted, it shows that the TDMA network if most used for the following reasons:
1. It supports application such as multimedia and videoconferencing. 2. It is the most populous in Nigeria 3. It services are reliable 4. Quick response to customers. 5. It covers a wider area compared to TDMA. In the course of carrying out this research, many challenges were faced by the researchers. The sum of 1,000 Naira was contributed by each of the six members of the group to enhance the result of the work. The work was divided into sections where every member was entitled to a task. These sections include: i. ii. iii. Distribution of questionnaires and conduction of interviews. Typing. On line research
The researchers meet four times in a week in five weeks giving a total of eighteen meetings except for the fifth week that the researchers meet six times. All members were present in all meetings except for some members who absented themselves for reasons best known to them. The table below shows the record of meetings held by the researchers for the purpose of compiling this research work.
40
Table 4.2 showing meeting days and days members were present
S/N 1. NAME AKAITO David 1st week 2nd week 3rd week 4th week 2. NOAH Dorcas 1st week 2nd week 3rd week 4th week 3. ISHOWUA Titus 1st week 2nd week 3rd week 4th week 4. NWOSU Ezenna 1st week 2nd week 3rd week 4th week 5. ABANG Solomon 1st week 2nd week 3rd week 4th week 6. BALOGUN Promise 1st week 2nd week 3rd week 4th week
41
DAY OF MEETING PRESENT 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 and11 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, and 8 June, 2011 28, 29, and 1June/July. 2011 4, 6, 7, and 8 July, 2011 18, 20 and 21 of May, 2011 7, 8, and 10 June, 2011 27, 28, and 1June/July. 2011 4, 5, 6, 7, 8 and 11 July, 2011
NAME
AKAITO David NOAH Dorcas ISHOWUA Titus NWOSU Ezenna ABANG Solomon BALOGUN Promise TOTAL
ITEMS PURCHASED
Photocopy/Printing Binding Printing of questionnaires Buying of CD Buying of files Transportation TOTAL
AMOUNT (N)
42
CHAPTER 5
RECOMMENDATIONS
Before deciding which technology is superior, let's talk a little more about these two technologies again:
CDMA:
voice are separated from signals using codes and then transmitted using a wide frequency range. Because of this, there are more space left for data transfer (this was one of the reasons why CDMA is the preferred technology for the 3G generation, which is broadband access and the use of big multimedia messages). 14% of the worldwide market goes to CDMA. For the 3G generation CDMA uses 1x EV-DO and EV-DV. It has a lot of users in Asia, especially in South Korea.
TDMA:
countries, this technology is older than CDMA. But keep in mind that this doesn't mean that CDMA is inferior or worse than TDMA. Roaming readiness and fraud prevention are two major advantages from this technology. TDMA is the most used cell phone technology in the world, with 73% of the worldwide market. It has a very strong presence in Africa. But which one of these statements is correct? Accordingly to Nokia, "this discussion is not about technology anymore, but about market". We think this is the best way to describe the war between these two cell phone technologies.
43
In the beginning, TDMA was in fact superior. It had more services and allowed more data transfer. But CDMA, facing the advantages of the competitor standard, soon delivered the same features found on TDMA. Nowadays, it is not possible to say that TDMA services are better than CDMA. Multimedia messages, video, high-speed Internet access, digital camera and even PDA function are some of the features we can find on both technologies. The new CDMA 1XRTT technology, which previews what G3 cell phones will bring, is more advanced than EDGE, technology from the beginning of 3G generation, allowing higher transfer rates. Even the TDMA SIM card advantage, that allows you to change your cell phone and keep your phone list, is being offered by some CDMA operators in developed countries with a service that allows you to store your phone book on the operator's database, allowing you to recover your phone book even if your cell phone is stolen (which is not possible with TDMA, since if your cell phone is stolen, your SIM card will be stolen together). Notice that recently a new accessory called SIM backup was released, which allows you to backup the data stored in your SIM card. Also some TDMA operators are offering a similar backup service. So, nowadays both technologies are equipped rated in technology, but this picture won't be like that in the future. After all, CDMA evolution ground is wider and in a few years it will be superior to TDMA. Does this means that TDMA operators will disappear? Not at all, they will migrate over CDMA and the war will continue, because the existing CDMA operators chose to use 1xEV-DO and1XEV-DV technologies for their 3G network and the existing TDMA operators have opted for a different technology, called WCDMA. Also, even though the current GSM operators will migrate to
44
WCDMA, they still can use their existing TDMA network. So users won't feel anything special when the operators shift to the new cell generation (3G), independently from the technology they choose.
45
CONCLUSION
In conclusion, we cannot say that TDMA is better than CDMA or vice
detection is said
to have higher capacity than TDMA. But in the future TDMA can be extended by an optional CDMA component in order to further increase the capacity. Finally, it does not matter whether which one is better CDMA or TDMA right now. It can be only found out with the evolution of these technologies. When going for a cell phone the user should choose the technology according to where they use it. For users who travel abroad it is better to go with TDMA handsets. For the users in United States CDMA is better than TDMA because of the coverage we can get at rural areas where digital signals cannot be transmitted.
46
REFEREENCE
1. CDMA or TDMA? CDMA for GSM? by Paul Walter Baier. http://ieeexplore.ieee.org/iel2/4069/11648/00529459.pdf?isnumber=1 1648&arnumber=529459 2. CDMA vs. TDMA by Steve Punter. http://www.arcx.com/sites/CDMAvsTDMA.htm 3. A comparison of CDMA and TDMA systems by Bjbrn Gugmundmn, Johan Skbld and John K. Ugland.
http://ieeexplore.ieee.org/iel2/657/6293/00245471.pdf?isnumber=&ar number=245471 4. Analysis of CDMA and TDMA for 3rd generation mobile radio systems by Tero Ojanpera, Pekka A. Ranta, Seppo Hamalainen and Antti Lappetelainen. http://ieeexplore.ieee.org/iel3/4664/13227/00600447.pdf?isnumber=1 3227&arnumber=600447 5. Potential capacity of TDMA and CDMA cellular telephone systems by wolfgang granzow and Wolfgang Koch. http://ieeexplore.ieee.org/iel4/5396/14591/00665692.pdf?isnumber=& arnumber=665692 6. Cell phone technologies GSM(TDMA) vs. CDMA. http://www.menasoft.com/blog/?p=22 7. Voice encoding methods for digital wireless communications systems by Bryan Douglas. http://www.palowireless.com/bluetooth/docs/BDouglas.pdf 8. CDMA Overview from http://www.umtsworld.com/technology/cdmabasics.htm
47