Вы находитесь на странице: 1из 47

SUBMITTED BY: D. J. AKAITO, E. E. NWOSU, I. TITUS N. DORCAS, A. SOLOMON, P.

BALOGUN
AfriHUB INTL ICT INSTITUTE DEPARTMENT OF NETWORK AND SYSTEM SECURITY FCT, ABUJA

SUBMITTED TO: MR. ISAAC FAOYE


AfriHUB INTL ICT INSTITUTE FCT, ABUJA

JULY, 2011

Content
Table of Content .i Declaration .iii Abstract ..iv Acknowledgement ..v References ..vi 1. INTRODUCTION .....1 1.1 1.1.1 1.1.2 1.1.3 1.2 1.2.1 1.2.2 1.2.3 1.3 1.4 1.4 1.5 TDMA .....1 Advantages of TDMA ....2 Disadvantages of TDMA ...3 Features of TDMA .3 CDMA .4 Advantages of CDMA 4 Disadvantages of CDMA ...4 Features of CDMA .5 Differences between TDMA and CDMA .5 TDMA and CDMA Travel in Nigeria ..6 The Research Problem ..7 Research Objective ....7 TDMA Network Security .10 CDMA Network Security .19 How CDMA Works ..24 How TDMA Works ..26 TDMA Network ...26
2

2. TDMA AND CDMA SECURITY.9 2.1 2.2 2.3 2.4 2.5

2.5.1 2.5.2 2.5.3 2.5.4

Subscriber Identity Module 26 TDMA Technology ..27 Using A GSM Phone ...27 Sharing GSM Signals ..27

3. RESEARCH DESIGN AND METHODOLOGY/NATURE AND DESIGN OF THE STUDY ...29 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Research Design ...29 Population Sample ...29 Sources of Data .29 Methodology ..30 Validity of the Research Instrument ...30 Location of Data ...30 Statistical Analysis 31

4. RESULTS AND DISCUSSIONS ..33 4.1 Most Populous and Most Used Network in Wuse District by Percentage ...33 5. RECOMMENDATIONS AND CONCLUSION .26 Recommendation ...37 Conclusion ..40 REFERENCE .vi

Declaration
We declare that this report does not incorporate without acknowledgment any material previously submitted for a degree or diploma In any institution; and that to the best of our knowledge it does not contain any materials previously published or written by another person except where due reference is made in the text.

SIGNED:..................................

DATE : ........................................

Abstract
A comparative study of the two competing digital wireless technologies used in the telecommunication industry. The technologies are: Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA). TDMA which uses time sharing protocol technique is closely compared with CDMA which uses spread spectrum technique. The comparative study is done based on information obtained primarily from reports, research works, questioners and some data gotten from network providers: Visaphone (CDMA) and Airtel (TDMA). The results obtained from this comparative study, showed that the CDMA technology appears to be more suitable than the GSM (TDMA) for the Wuse (Nigeria) environment.

Acknowledgment
We gratefully acknowledge the assistance and support of our supervisor, Engr. Isaac Faroye, who have introduced us into the field of Technical Report Writing.

We would like to thank Professor Manny Aniebonam and Mr. Emeka for their invaluable discussions and suggestions, with respect to our simulation program and research.

Thanks to Globacom Nigeria Limited for maintaining the computer network very efficiently without which we would not have finished our report in the set time span and thanks to all our colleagues in AfriHUB Intl ICT Institute who have supported and encouraged us in all our endeavors.

Finally and most importantly, this report is dedicated to our parents who have inspired, motivated and financially supported our education. Their contribution is Unfathomable.

CHAPTER 1
INTRODUCTION
In Nigeria cell phone have become the single greatest tools in day to day life. It has become a necessity that business associates should be able to communicate on the go. That is why it has become so important to make choices in choosing which handheld device one should go for. A handheld device is selected according to its features and benefits, like does it provide access to internet and email or does it look slick and more.

An important question when designing and standardizing cellular systems is the selection of the multiple access schemes. There are two basic principles in multiple access, TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access). All the principles allow multiple users to share the same physical channel. But they differ in the way users share the common resource.

1.1

TDMA
In late1980s, as a search to convert the existing analog network to digital as a means to improve capacity, the cellular telecommunications industry association chose TDMA over FDMA.

TDMA, Short for Time Division Multiple Access, a technology for delivering digital wireless service using time-division multiplexing (TDM). TDMA works by dividing a radio frequency into time slots and then
7

allocating slots to multiple calls. In this way, a single frequency can support multiple, simultaneous data channels. TDMA is used by the GSM digital cellular system it allows the users to share the same frequency channel by dividing the signal into different time slots. Each user takes turn in a round robin fashion for transmitting and receiving over the channel. By Steve
Punter, 2006, CDMA vs. TDMA, <http://www.arcx.com/sites/CDMAvsTDMA.htm> 18 June, 2011.

Frequency

Synchronization intervals

...

Time Frame

Fig. 1.1 Time Division Multiple Access

1.1.1 Advantages of TDMA


There are lots of advantages of TDMA in cellular technologies. It can easily adapt to transmission of data as well as voice communication. It has an ability to carry 64 kbps to 120 Mbps of data rates. This allows the operator to do services like fax, voice band data, and SMS as well as bandwidthintensive application such as multimedia and videoconferencing. Since TDMA technology separates users according to time, it ensures that there will be no interference from simultaneous transmissions. It provides users with an extended battery life, since it transmits only portion of the time
8

during conversations. Since the cell size grows smaller, it proves to save base station equipment, space and maintenance. TDMA is the most cost effective technology to convert an analog system to digital.

1.1.2 Disadvantages of TDMA


One major disadvantage using TDMA technology is that the users has predefined time slot. When moving from one cell site to other, if all the time slots in this cell are full the user might be disconnected. Likewise, if all the time slots in the cell in which the user is currently in are already occupied, the user will not receive a dial tone.

Another problem in TDMA is that it is subjected to multipath distortion. To overcome this distortion, a time limit can be used on the system. Once the time limit is expired the signal is ignored.

1.1.3 Features of TDMA


i. ii. Shares single carrier frequency with multiple users. Non-continuous transmission makes handoff simpler (mobile assisted handoff possible). iii. iv. v. v. vi. vii. Slots can be assigned on demand (concatenation and reassignment): bandwidth supplied on demand. Less stringent power control due to reduced inter-user interference. Higher synchronization overhead. Equalization necessary for high data rates. Frequency/slot allocation complexity.
9

viii. Pulsating power envelop: interference with other devices

1.2

CDMA
CDMA Stands for Code Division Multiple Accesses. It is a technique used for digital communication, and wireless technology in particular, that involves multiplexing. Whereas conventional communication systems use constant frequencies, CDMA uses multiple accesses, or multiplexing. Accomplished through the specific type known as spread spectrum in this case, multiplexing uses varied frequencies to transmit audio signals. This, coupled with code division, which requires a certain code to send and receive the frequency, further protects CDMA communications from interference.
By Steve Punter, 2006, CDMA vs. TDMA,

<http://www.arcx.com/sites/CDMAvsTDMA.htm> 18 June, 2011.

1.2.1 Advantages of CDMA


One of the main advantages of CDMA is that dropouts occur only when the phone is at least twice as far from the base station. Thus it is used in the rural areas where GSM cannot cover. Another advantage is its capacity; it has a very high spectral capacity that it can accommodate more users per MHz of bandwidth. It uses a voice coder EVRC for noise reduction where the background noise is reduced. This is exclusively available in CDMA technology only.

1.2.2 Disadvantages of CDMA


One major problem in CDMA technology is channel pollution, where signals from too many cell sites are present in the subscribers phone but none of them is dominant. When this situation arises the quality of the audio
10

degrades. Another disadvantage in this technology when compared to GSM is the lack of international roaming capabilities. The ability to upgrade or change to another handset is not easy with this technology because the network service information for the phone is put in the actual phone unlike GSM which uses SIM card for this. One another disadvantage is the limited variety of the handset, because at present the major mobile companies use GSM technology.

1.2.3 Features of CDMA


i. Soft capacity limit: system performance degrades for all users as number of users increase. ii. iii. Wide frequency spectrum reduces fading. Rake receiver: Separate multipath signals of different delays by chip unit. iv. v. vi. vii. Cell frequency reuses 1: No frequency planning. Soft Handover increases capacity. Utilization of voice activity (talk spurts). Power control necessary for mitigating near-far problem.

viii. Tradeoff between precision of power control and capacity.

1.3

Differences between CDMA and TDMA


CDMA technology claims that its bandwidth is thirteen times efficient than TDMA and forty times efficient than analog systems. CDMA also have better security and higher data and voice transmission quality because of the spread spectrum technology it uses, which has increased resistance to multipath distortion. The battery life is higher in TDMA compared to
11

CDMA because CDMA handsets transmit data all the time and TDMA does not require constant transmission. When it comes to international roaming TDMA is better than CDMA. CDMA is patented by Qualcomm, so an extra fee is paid to Qualcomm. Nationwide the market size for TDMA system is far bigger both in the number of subscribers and coverage, than CDMA system.

In TDMA users can only transmit in their respective time slot. Unlike TDMA, in CDMA several users can transmit over the channel at the same time.

1.4

CDMA Vs TDMA Travel In Nigeria


Both TDMA and CDMA can be found across Wuse District (Nigeria), which doesnt mean that it doesnt matter which technology we choose. When we travel domestically it is possible that we reach areas where digital service is not available. While traveling between places it is possible that we reach certain rural areas were only analog access is offered. CDMA handsets offer analog capabilities which the GSM dont offer. Another difference between TDMA and CDMA is in the data transfer methods. TDMAs highspeed wireless data technology, GPRS (General Packet Radio Service), usually offers a slower data bandwidth for wireless data connection than CDMAs high-speed technology, which has the capability of providing ISDN (Integrated Services Digital Network) with speeds as much as 144Kbps. TDMAs benefits over the CDMA in domestic purpose are that TDMA systems uses SIM card that identifies a user and stores the information in the handset. The SIM card can be swapped between handsets, which enable to move all the contacts to the new handset with ease. CDMA
12

can have this flexibility with their own service that stores data on the operators database. This service allows the user to swap datas between two handsets with a little trouble, but the advantage is it can be done when the handset is even lost but in TDMA technology, when a handset is lost, SIM card is also lost with it. When it comes for roaming handsets with TDMA is far better than CDMA handsets because TDMA is used in most of the markets across Nigeria. Users using tri-band or quad-band can travel to Enugu, Imo and most of Nigerian States and still can use their cell phone. CDMA does not have this multiband capability, thus cannot be used in multiple states with ease.

1.5

The Research Problems


Time Division Multiple Access system (TDMA) and Code Division Multiple Access system (CDMA), which is best for the Wuse Market (Nigeria) Environment?

There has been a long and still ongoing (at the time of writing this report) debate, to decide the best system for the Wuse Market environment. Currently CDMA and TDMA mobiles cannot be operated in the same cell. The solution to the above problem would mean transportability of either mobile in any type of system thus providing global usage (given the two systems are available at that geographical location)

1.6

The Research Objective


This report is aimed at carrying out a study to determine the performance of CDMA and TDMA networks.
13

The objectives of this report are as follows: 1. 2. 3. To understand what CDMA and TDMA and how they work. To know the security of TDMA and CDMA networks. To determine the best network for Wuse District.

14

CHAPTER 2
TDMA AND CDMA NETWORK SECURITY
Since the birth of the cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. In 1996, fraudulent activities through cloning and other mean cost operators some US$750 million in lost revenues in the United States alone. Fraud is still a problem today. Technical fraud, such as cloning, is decreasing in Nigeria while subscription fraud is on the rise. In this report, we will limit our discussions to technical fraud only. With the advent of second-generation digital platforms like TDMA and CDMA-IS-41, operators were able to enhance their network security by using improved encryption algorithms and other means. The noise-like signature of a CDMA signal over the air interface makes eavesdropping very difficult. This is due to the CDMA Long Code, a 42-bit PN (Pseudo-Random Noise of Length 242-1) sequence, which is used to scramble voice and data transmissions. This paper discusses how CDMA and TDMA implement three major features of mobile security: Authentication, Data protection, and Anonymity.

15

2.1

TDMA Network Security


The security aspects of TDMA are detailed in GSM Recommendations 02.09, "Security Aspects," 02.17, "Subscriber Identity Modules," 03.20, "Security Related Network Functions," and 03.21, "Security Related Algorithms". Security in TDMA consists of the following aspects: subscriber identity authentication, subscriber identity confidentiality, confidentiality, and user data confidentiality. The identified by the International Mobile Subscriber

signaling data

subscriber is uniquely

Identity (IMSI). This information, along with the individual subscriber authentication key (Ki), constitutes sensitive identification credentials

analogous to the Electronic Serial Number (ESN) in analog systems such as AMPS and TACS. The design of the TDMA authentication and encryption

schemes is such that this sensitive information is never transmitted over the radio channel. Rather, a challenge-response mechanism is used to perform authentication. The actual conversations are encrypted using a temporary, randomly generated ciphering key (Kc). The MS identifies itself by means of the Temporary Mobile Subscriber Identity (TMSI), which is issued by the network and may be changed periodically (i.e. during hand-offs) for additional security. The security mechanisms of TDMA are implemented in three different system elements; the Subscriber Identity Module (SIM), the TDMA handset or MS, and the TDMA network. The SIM contains the IMSI, the individual subscriber authentication key (Ki), the ciphering key generating algorithm

(A8), the authentication algorithm (A3), as well as a Personal Identification Number (PIN). The TDMA handset contains the ciphering algorithm (A5). The encryption algorithms (A3, A5, A8) are present in the TDMA network
16

as well. The Authentication Center (AUC), part of the Operation and Maintenance Subsystem (OMS) of the TDMA network, consists of a database of identification and authentication information for subscribers. This information consists of the IMSI, the TMSI, the Location Area Identity (LAI), and the individual subscriber authentication key (Ki) for each user. In order for the authentication and security mechanisms to function, all three elements (SIM, handset, and TDMA network) are required. This distribution of security credentials and encryption algorithms provides an additional measure of security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular telephone fraud. Figure 2.2 demonstrates the distribution of security information among the three system elements, the SIM, the MS, and the GSM network. Within the GSM network, the security information is further distributed among the authentication center (AUC), the home location register (HLR) and the ssss visitor location register (VLR). The AUC is responsible for generating the sets of RAND, SRES, and Kc which are stored in the HLR and VLR for subsequent use in the authentication and encryption processes.

17

Figure 2.2 Distributions of Security Features in the GSM Network


European Telecommunications Standards Institute, Recommendation GSM 02.09, "Security Aspects".
<http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html>

18

i.

Authentication
The TDMA network authenticates the identity of the subscriber through the use of a challenge-response mechanism. A 128-bit random number (RAND) is sent to the MS. The MS computes the 32-bit signed response (SRES) based on the encryption of the random number (RAND) with the authentication algorithm (A3) using the individual subscriber authentication key (Ki). Upon receiving the signed response (SRES) from the subscriber, the TDMA network repeats the calculation to verify the identity of the subscriber. Note that the individual subscriber authentication key (Ki) is never transmitted over the radio channel. It is present in the subscriber's SIM, as well as the AUC, HLR, and VLR databases as previously described. If the received SRES agrees with the calculated value, the MS has been successfully authenticated and may continue. If the values do not match, the connection is terminated and an authentication failure indicated to the MS. Figure 2.3 shown below illustrates the authentication mechanism.

19

Fig. 2.3: GSM Authentication Mechanisms


European Telecommunications Standards Institute, Recommendation GSM 02.09, "Security Aspects".
<http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html>

20

The calculation of the signed response is processed within the SIM. This provides enhanced security, because the confidential subscriber information such as the IMSI or the individual subscriber authentication key (Ki) is never released from the SIM during the authentication process.

ii.

Signaling and Data Confidentiality


The SIM contains the ciphering key generating algorithm (A8) which is used to produce the 64-bit ciphering key (Kc). The ciphering key is computed by applying the same random number (RAND) used in the authentication process to the ciphering key generating algorithm (A8) with the individual subscriber authentication key (Ki). As will be shown in later sections, the ciphering key (Kc) is used to encrypt and decrypt the data between the MS and BS. An additional level of security is provided by having the means to change the ciphering key, making the system more resistant to eavesdropping. The ciphering key may be changed at regular intervals as required by network design and security considerations. Figure 2.4 below shows the calculation of the ciphering key (Kc).

21

Fig.2.4 Ciphering Key Generation Mechanism


European Telecommunications Standards Institute, Recommendation GSM 02.09, "Security Aspects".
<http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html>

22

In a similar manner to the authentication process, the computation of the ciphering key (Kc) takes place internally within the SIM. Therefore sensitive information such as the individual subscriber authentication key (Ki) is never revealed by the SIM. Encrypted voice and data communications between the MS and the network is accomplished through use of the ciphering algorithm A5. Encrypted communication is initiated by a ciphering mode request command from the TDMA network. Upon receipt of this command, the mobile station begins encryption and decryption of data using the ciphering algorithm (A5) and the ciphering key (Kc). Figure 2.5 below demonstrates the encryption mechanism.

23

Fig 2.5: Ciphering Mode Initiation Mechanism


European Telecommunications Standards Institute, Recommendation GSM 02.09, "Security Aspects".
<http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html>

24

iii.

Subscriber Identity Confidentiality


To ensure subscriber identity confidentiality, the Temporary Mobile Subscriber Identity (TMSI) is used. The TMSI is sent to the mobile station after the authentication and encryption procedures have taken place. The mobile station responds by confirming reception of the TMSI. The TMSI is valid in the location area in which it was issued. For communications outside the location area, the Location Area Identification (LAI) is necessary in addition to the TMSI.

2.2

CDMA Network Security


The security protocols with CDMA networks are the best in the industry. By design, CDMA technology makes eavesdropping very intentional or accidental. difficult, whether

Unique

to

CDMA

systems,

is

the

42-bit

PN

(pseudo-Random

Noise)Sequence called Long Code to scramble voice and data. On the forward link (network to mobile), data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).

CDMA network security protocols rely on a 64-bit authentication key (AKey) and the Electronic Serial Number (ESN) of the mobile. A random binary number called RANDSSD, which is generated in the HLR/AC, also plays a role in the authentication procedures. The A-Key is programmed into the mobile and is stored in the Authentication Center (AC) of the network.

25

In addition to authentication, the A-Key is used to generate the sub-keys for voice privacy and message encryption.

CDMA uses the standardized CAVE (Cellular Authentication and Voice Encryption) algorithm to generate a 128-bit sub-key called the Shared Secret Data (SSD). The A-Key, the ESN and the network-supplied RANDSSD are the inputs to the CAVE that generates SSD. The SSD has two parts: SSD_A (64 bit), for creating authentication signatures and SSD_B (64 bit), for generating keys to encrypt voice and signaling messages. The SSD can be shared with roaming service providers to allow local authentication. A fresh SSD can be generated when mobile returns to the home network or roam to a different system.

i.

Authentication
In CDMA networks, the mobile uses the SSD_A and the broadcast RAND as inputs to the CAVE algorithm to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station. This signature is then used by the base station to verify that the subscriber is legitimate. Both Global Challenge (where all mobiles are challenged with same random number) and Unique Challenge (where a specific RAND is used for each requesting mobile) procedures are available to the operators for authentication. The Global Challenge method allows very rapid authentication. Also, both the mobile and the network track the Call History Count (a 6-bit counter). This provides a way to detect cloning, as the operator gets alerted if there is a mismatch. The A-Key is re-programmable, but both the mobile and the network Authentication Center must be updated. A-Keys may be programmed by one of the following:
26

a) The factory b).The dealer at the point of sale c) Subscribers via telephone d) OTASP (over the air service provisioning).

OTASP transactions utilize a 512-bit Diffie-Hellman key agreement algorithm, making them well suited for this function. The A-Key in the mobile can be changed via OTASP, providing an easy way to quickly cut off service to a cloned mobile or initiate new services to a legitimate subscriber. Security of the A-Key is the most important component of CDMA system.

ii.

Voice, Signaling, and Data Privacy


The mobile uses the SSD_B and the CAVE algorithm to generate a Private Long Code Mask (derived from an intermediate value called Voice Privacy Mask, which was used in legacy TDMA systems), a Cellular Message Encryption Algorithm (CMEA) key (64 bits), and a Data Key (32 bits). The Private Long Code Mask is utilized in both the mobile and the network to change the characteristics of a Long code. This modified Long code is used for voice scrambling, which adds an extra level of privacy over the CDMA air interface. The Private Long Code Mask doesnt encrypt information, it simply replaces the well-known value used in the encoding of a CDMA signal with a private value known only to both the mobile and the network. It is therefore extremely difficult to eavesdrop on conversations without knowing the Private Long Code Mask.

27

Additionally, the mobile and the network use the CMEA key with the Enhanced CMEA (ECMEA) algorithm to encrypt signaling messages sent over the air and to decrypt the information received. A separate data key, and an encryption algorithm called ORYX, is used by the mobile and the network to encrypt and decrypt data traffic on the CDMA channels. The Figure below illustrates the CDMA authentication and encryption mechanism.

28

Fig. 2.1 showing the security performance in a CDMA Network


Security in CDMA Wireless Systems by Frank Quick, Qualcomm Inc., February 1997

29

By design, all CDMA phones use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.

iii.

Anonymity
CDMA systems support the assignment of a Temporary Mobile Station Identifier (TMSI) to a mobile to represent communications to and from a certain mobile in over the air transmissions. This feature makes it more difficult to correlate a mobile users transmission to a mobile user.

2.3

How CDMA Works


CDMA works on the principle called interference averaging. Signals are spread uniformly over the entire available bandwidth. Different calls are assigned different codes. Together, they appear as noise-like interference to each other. During the receiving stage, when a particular call is decoded, this noise becomes suppressed. In other words, the interference is one of the limiting factors, its averaging results in increased capacity. CDMA makes full use of the processing power of the modern computers CDMA allows a channel to carry multiple conversations at the same time by assigning each conversation at different code. A code is a pattern of bits. The receive

looks for that bit pattern. So even if there are ten conversations in a particular channel at the particular instant of time, no calls interferes with another. As long as the receiving device has the right code, it can pick up its conversation but from all the others. Since CDMA spreads multiple conversations across a wide segment of spectrum, it is known as a Spread Spectrum Technology. The Spread Spectrum uses two types of modulation
30

schemes. These include Frequency Hoping Modulation sequencing modulation.

and

Data

i.

Frequency Hopping Modulation


Frequency hopping rapidly switch among several predetermined nearly

frequencies. For this work, the transmission and receiver must be in

perfect synchronization. Bandwidth can increase by simultaneously transmitting on several frequencies.

ii.

Data Sequencing Modulation


It works by breaking the original data into parts (called chips), which are then transmitted on separate frequencies. The receiver can then isolate the chip and reassemble the data while ignoring the decory information. The chipping code used in transmission is known only to the sending and receiving stations, making it difficult for intruder to intercept and decipher wireless data encoded in this manner. Thus it provides following benefits: i. CDMA reduce background noise and cross talk, ensuring better voice quality, which is further enhanced by the microprocessor inside the phones. CDMA provides capacity for voice and data communications, allowing more subscribers to connect at any given time and makes it capable for multimedia task. ii. CDMA provides better spectral efficiency and consumes very little power leading to enhanced battery life and longer talk time. iii. Due to its design, it is more secure against eavesdropping.
31

iv. CDMA phones due to their low-power requirements can do with smaller-sized batteries, which decrease the overall weight of a CDMA phone. v. Calling capacity is superior due to better spectral efficiency.

2.4

How TDMA Works


Global System for Mobile communications (GSM) is the most widely used standard for cell phones in the world. The GSM Association promotes its use and claims that 80 percent of all mobile phones are using the GSM standard. GSM is the network these cell phones use. This means each of these phones search for a cell in the area in which they're being used. This means there must be a GSM network to handle all GSM-based phone calls.

2.5

TDMA Network
The TDMA network is a cellular network. Cellular networks are radio networks that consist of cells. Each cell is a cell site that consists of an elevated tower that contains transceivers (transmitters and receivers), signal processors, a timing receiver and electrical power sources. The TDMA network refers to these towers as base stations or Base Transceiver Stations (BTS). The size of each cell refers to the coverage area it's designed for. There are five different cell sizes. The cell size, called a macro, is the size used in TDMA mobile phone systems.

2.5.1 Subscriber Identity Module


The subscriber identity module (or SIM card) is a key feature of a GSM cell phone. The SIM contains the subscription profile and address book.
32

Although the SIM card contains account information that prevents or enables certain services, the handset (cell phone) is the device that locks the user into a specific phone. The phone can be locked from accepting any other SIM card or multiple SIM cards.

2.5.2 TDMA Technology


Time division multiple access (TDMA) is the access method GSM uses for shared networks. In the GSM network, more than one cell phone user can use the same frequency channel. This can occur because the signal is divided into time slots. A cell phone user in this system uses only a small portion of the base station channel capacity. Each TDMA frame contains eight time slots. GSM uses TDMA to raise the efficiency of the network.

2.5.3 Using A GSM Phone


Just because a cell phone can be turned on doesn't mean it can be used to make a phone call. A GSM phone must connect to a base station via a signal. When a phone is turned on, the phone searches for a signal to connect with. GSM technology assigns a maximum range for its macro base stations of about 25 miles. In highly populated areas, base stations are grouped and even overlapped so that their phones are never without an available signal.

2.5.4 Sharing GSM Signals


Behind the scenes, a cell phone is in constant contact with the available base station, moving in and out of range of one and into the range of the next one. This connecting and reconnecting happens through the relationship of a GSM controller, located on the base station, and a GSM phone's inner
33

mechanism. When a GSM cell phone moves toward a tower or mast, it checks for the strongest signal available and connects. Simultaneously, the weaker mast signal is released and becomes available for the next user.

34

CHAPTER 3
RESEARCH DESIGN AND METHODOLOGY/NATURE AND DESIGN OF THE STUDY

3.1

Research Design
This study is designed to investigate the performance of TDMA and CDMA in Wuse District of the FCT.

3.2

Population and Sample


The study was carried out in Wuse District, FCT-Abuja. The research work took the researchers to some selected Business centres and Offices. The population for the research included Business centre and office attendants and passersby in Wuse District, FCT-Abuja.

3.3

Sources of Data
On sources of data for this research work, dependence was placed on both the primary and secondary data. That is those data that were in existence before the need to conduct this research was conceived and which related to the research topic is makeup of the secondary data. Secondary data is of great importance to the researchers in that it gave them the knowledge in carrying out this work and enhanced the gathering of information and also helped them generate primary data in their effort.

35

All the data used were taken from unpublished term paper, the internet and questioners.

3.4

Methodology
The researchers in their effort to carry out this study of work used both primary and secondary data.

No textbooks were used in the process of gathering the information in this report work because most information that was needed to carry out this work was gotten from the internet, questioners and interviews conducted so the use of textbooks were completely avoided and ignored.

Meanwhile, questioners were administered due to the level at which the study was carried out require the question method of getting information while the use of the internet was consulted in order to get a sound knowledge of the said topic of study.

3.5

Validity of the Research Instrument


The questionnaire constructed was given to our Supervisor who went through before it was administered.

3.6

Location of Data
In carrying out this research, the use of a modem was made to access the internet in order to get valuable information and materials that really helped the researchers carry out their research work successfully.

36

This information was located from: AfriHUB Digital Library. StylMAX Cyber Caf.

3.7

Statistical Analysis
Simple percentage method was used to analyze the data collected. For the purpose of this study, a total of one hundred questionnaires were distributed to the following categories of personnel connected with the Business centres and Offices. i. ii. iii. iv. Bankers IT Consultants Students Business men/women etc.

Each questionnaire was divided into two parts.

Section A was for personal data while section B showed the statement to which the subject will respond.

The purpose of the questionnaire was to elicit the opinions of the personnel concerned on the feasibility study of the performance of TDMA and CDMA in Wuse District in the FCT.

The results gotten from the questionnaire revealed a lot of things.


37

a) Sex of Respondents In this study, both male and female personnel were given questionnaires. The findings revealed that 45% of the respondents are males while 45% are females. b) Ages of Respondents Majority of the respondents that were under study fall between the ages of 18-30 years. This indicates that mobile phones are commonly used by the youths found in Wuse District of the FCT.

c) Occupation of Respondents 17% of the respondents are self employed, 28% are students, 19% are civil savants, and 25% are into business, while the remaining 11% fell under others.

38

CHAPTER 4
RESULTS AND DISCUSSIONS
As earlier stated, the major sources of data for this work are the internet, questionnaires distributed, and interviews from individuals.

4.1

Most Populous and Most Used Network in Wuse District by Percentage


The table below shows the popularity and most used network in Wuse District of Abuja.

Table 4.1 Shows the Most Used CDMA/TDMA Networks in Wuse District TDMA CDMA NETWORK BRAND MTN GLO ETISALAT AIRTEL % 40 15 10 5 NETWORK BRAND VISAFONE STARCOMS MULTILINKS ZOOM % 20 7.5 5 2.5

The above table shows that the TDMA network is the most popular and most used network in the Wuse District compared to the CDMA.

39

From the questionnaires and interviews conducted, it shows that the TDMA network if most used for the following reasons:
1. It supports application such as multimedia and videoconferencing. 2. It is the most populous in Nigeria 3. It services are reliable 4. Quick response to customers. 5. It covers a wider area compared to TDMA. In the course of carrying out this research, many challenges were faced by the researchers. The sum of 1,000 Naira was contributed by each of the six members of the group to enhance the result of the work. The work was divided into sections where every member was entitled to a task. These sections include: i. ii. iii. Distribution of questionnaires and conduction of interviews. Typing. On line research

The researchers meet four times in a week in five weeks giving a total of eighteen meetings except for the fifth week that the researchers meet six times. All members were present in all meetings except for some members who absented themselves for reasons best known to them. The table below shows the record of meetings held by the researchers for the purpose of compiling this research work.

40

Table 4.2 showing meeting days and days members were present
S/N 1. NAME AKAITO David 1st week 2nd week 3rd week 4th week 2. NOAH Dorcas 1st week 2nd week 3rd week 4th week 3. ISHOWUA Titus 1st week 2nd week 3rd week 4th week 4. NWOSU Ezenna 1st week 2nd week 3rd week 4th week 5. ABANG Solomon 1st week 2nd week 3rd week 4th week 6. BALOGUN Promise 1st week 2nd week 3rd week 4th week
41

DAY OF MEETING PRESENT 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 and11 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 18, 20 and 21 of May, 2011 6, 7, 8, and 10 June, 2011 27, 28, 29, and 1June/July. 2011 4, 5, 6, 7, 8 11 and 12 July, 2011 17, 18, 20 and 21 of May, 2011 6, 7, and 8 June, 2011 28, 29, and 1June/July. 2011 4, 6, 7, and 8 July, 2011 18, 20 and 21 of May, 2011 7, 8, and 10 June, 2011 27, 28, and 1June/July. 2011 4, 5, 6, 7, 8 and 11 July, 2011

Table 4.3 showing the contributions made by the researchers S/N


1. 2. 3. 4. 5. 6.

NAME
AKAITO David NOAH Dorcas ISHOWUA Titus NWOSU Ezenna ABANG Solomon BALOGUN Promise TOTAL

CONTRIBUTION (N) 500 1,000 1,000 500 1,000 1,000 5,000

Table 4.4 showing the expenditure made by the researchers


S/N
1. 2. 3. 4. 5. 6.

ITEMS PURCHASED
Photocopy/Printing Binding Printing of questionnaires Buying of CD Buying of files Transportation TOTAL

AMOUNT (N)

1,900 500 550 100 100 1,250 4,400

42

CHAPTER 5
RECOMMENDATIONS
Before deciding which technology is superior, let's talk a little more about these two technologies again:

CDMA:

Stands for Code Division Multiple Accesses. Both data and

voice are separated from signals using codes and then transmitted using a wide frequency range. Because of this, there are more space left for data transfer (this was one of the reasons why CDMA is the preferred technology for the 3G generation, which is broadband access and the use of big multimedia messages). 14% of the worldwide market goes to CDMA. For the 3G generation CDMA uses 1x EV-DO and EV-DV. It has a lot of users in Asia, especially in South Korea.

TDMA:

Even though it is sold as "the latest technology" in several

countries, this technology is older than CDMA. But keep in mind that this doesn't mean that CDMA is inferior or worse than TDMA. Roaming readiness and fraud prevention are two major advantages from this technology. TDMA is the most used cell phone technology in the world, with 73% of the worldwide market. It has a very strong presence in Africa. But which one of these statements is correct? Accordingly to Nokia, "this discussion is not about technology anymore, but about market". We think this is the best way to describe the war between these two cell phone technologies.
43

In the beginning, TDMA was in fact superior. It had more services and allowed more data transfer. But CDMA, facing the advantages of the competitor standard, soon delivered the same features found on TDMA. Nowadays, it is not possible to say that TDMA services are better than CDMA. Multimedia messages, video, high-speed Internet access, digital camera and even PDA function are some of the features we can find on both technologies. The new CDMA 1XRTT technology, which previews what G3 cell phones will bring, is more advanced than EDGE, technology from the beginning of 3G generation, allowing higher transfer rates. Even the TDMA SIM card advantage, that allows you to change your cell phone and keep your phone list, is being offered by some CDMA operators in developed countries with a service that allows you to store your phone book on the operator's database, allowing you to recover your phone book even if your cell phone is stolen (which is not possible with TDMA, since if your cell phone is stolen, your SIM card will be stolen together). Notice that recently a new accessory called SIM backup was released, which allows you to backup the data stored in your SIM card. Also some TDMA operators are offering a similar backup service. So, nowadays both technologies are equipped rated in technology, but this picture won't be like that in the future. After all, CDMA evolution ground is wider and in a few years it will be superior to TDMA. Does this means that TDMA operators will disappear? Not at all, they will migrate over CDMA and the war will continue, because the existing CDMA operators chose to use 1xEV-DO and1XEV-DV technologies for their 3G network and the existing TDMA operators have opted for a different technology, called WCDMA. Also, even though the current GSM operators will migrate to
44

WCDMA, they still can use their existing TDMA network. So users won't feel anything special when the operators shift to the new cell generation (3G), independently from the technology they choose.

45

CONCLUSION
In conclusion, we cannot say that TDMA is better than CDMA or vice

versa. The main advantage of the CDMA is that, in the single

detection is said

method it is more flexible than TDMA or joint detection. CDMA

to have higher capacity than TDMA. But in the future TDMA can be extended by an optional CDMA component in order to further increase the capacity. Finally, it does not matter whether which one is better CDMA or TDMA right now. It can be only found out with the evolution of these technologies. When going for a cell phone the user should choose the technology according to where they use it. For users who travel abroad it is better to go with TDMA handsets. For the users in United States CDMA is better than TDMA because of the coverage we can get at rural areas where digital signals cannot be transmitted.

46

REFEREENCE
1. CDMA or TDMA? CDMA for GSM? by Paul Walter Baier. http://ieeexplore.ieee.org/iel2/4069/11648/00529459.pdf?isnumber=1 1648&arnumber=529459 2. CDMA vs. TDMA by Steve Punter. http://www.arcx.com/sites/CDMAvsTDMA.htm 3. A comparison of CDMA and TDMA systems by Bjbrn Gugmundmn, Johan Skbld and John K. Ugland.

http://ieeexplore.ieee.org/iel2/657/6293/00245471.pdf?isnumber=&ar number=245471 4. Analysis of CDMA and TDMA for 3rd generation mobile radio systems by Tero Ojanpera, Pekka A. Ranta, Seppo Hamalainen and Antti Lappetelainen. http://ieeexplore.ieee.org/iel3/4664/13227/00600447.pdf?isnumber=1 3227&arnumber=600447 5. Potential capacity of TDMA and CDMA cellular telephone systems by wolfgang granzow and Wolfgang Koch. http://ieeexplore.ieee.org/iel4/5396/14591/00665692.pdf?isnumber=& arnumber=665692 6. Cell phone technologies GSM(TDMA) vs. CDMA. http://www.menasoft.com/blog/?p=22 7. Voice encoding methods for digital wireless communications systems by Bryan Douglas. http://www.palowireless.com/bluetooth/docs/BDouglas.pdf 8. CDMA Overview from http://www.umtsworld.com/technology/cdmabasics.htm
47

Вам также может понравиться