Welcome!

Machine Learning Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan

Related Topics: Machine Learning

Machine Learning : Article

Cellular AJAX Data Transmission Techniques

There are two main techniques for cellular data transmission, TDMA and CDMA

This content is reprinted from Real-World AJAX: Secrets of the Masters published by SYS-CON Books. To order the entire book now along with companion DVDs for the special pre-order price, click here for more information. Aimed at everyone from enterprise developers to self-taught scripters, Real-World AJAX: Secrets of the Masters is the perfect book for anyone who wants to start developing AJAX applications.

Cellular Data Transmission Techniques
There are two main techniques for cellular data transmission, TDMA (Time Division Multiple Access) and CDMA (Code Division Multiple Access).

The objective of both techniques is to support multiple simultaneous data channels. TDMA achieves this objective by dividing the radio frequency into time slots. TDMA is used by the GSM cellular system. CDMA comes from a military/defense background and is currently used by major cellular carriers in the United States. QUALCOMM has patented large parts of CDMA (www.QUALCOMM.com). CDMA uses a more complex mechanism to support simultaneous data channels, which is outside our scope.

Note: There are other techniques to distinguish data channels. For simplicity's sake, we've chosen to discuss only TDMA and CDMA since they're used in cellular systems worldwide. Other methods of cellular data transmission include FDMA (Frequency Division Multiple Access) and PDMA (Polarization Division Multiple Access). For more information on cellular data transmission techniques, see http://en.wikipedia.org/wiki/Cellular_network.

The Historical Evolution of Data Transmission Techniques

In addition to different types of data transmission techniques, cellular systems can be viewed as the more familiar generations of systems as they evolved over time (2G, 2.5G, and 3G). The main difference between generations is support for greater bandwidth. Obviously as you go towards 3G and beyond, the bandwidth increases and the applications supported become richer.

First-generation (1G) systems were analog systems. From 2G (second generation) onwards, cellular systems have been digital. We won't discuss analog systems so we'll start our discussion at 2G systems.

2G Systems
GSM (Global System for Mobile) is the most popular 2G system. GSM originated in Europe and is the dominant mobile system across the world. In some form, it's present on all continents including North America. GSM (based on TDMA) is a digital system with a relatively long history (the study group was founded in 1982) and is governed by the GSM Association (www.gsmworld.com/index.shtml). The GSM Association provides functional and interface specifications for functional entities in the system but not the actual implementation. Besides GSM, other examples of 2G systems are cdmaOne (mainly in the USA) and PDC (Personal Data Cellular) in Japan.

2G technologies are typically capable of supporting up to 14.4Kbps of data. 2G systems are circuit-switched (i.e., a circuit is first established between the sender and receiver before sending the information and is maintained for the duration of the session). The next evolutionary step (2.5G) is packet-switched (the data is broken into packets and no connection is maintained for the duration of the communication).

2.5G Systems
2.5G networks are an intermediate step undertaken by most mobile operators in their evolution from 2G to 3G. The main functional leap between 2G and 2.5G networks is the adoption of packetswitched technologies (in 2.5G networks) as opposed to circuit-switched technologies (in 2G networks). 2.5G networks are capable of theoretically supporting bandwidth up to 144Kbps but typically support 64Kbps. GPRS (General Packet Radio Service) in Europe and CDMA2000 1X in North America are examples of 2.5G networks. Applications such as sending still images are possible over 2.5G networks.

3G Systems
Most people have heard about 3G and have an opinion about it. If nothing else, they know about 3G in terms of the high prices paid by mobile operators for 3G licenses.

However, from a mobile operator's perspective there's a clear business case for investing in 3G because existing 2G networks are congested and 2.5G solutions are a halfway house and won't cope with the increasing demand (i.e., both the number of consumers and the richer application types).

From an application development perspective, 3G technologies are differentiated from 2.5G technologies by a greater bandwidth (theoretically 2Mbps but typically 384Kbps). Possible 3G applications include video streaming.

From the user point-of-view, the move from 2.5G networks to 3G networks is more evolutionary than revolutionary except for devices. 3G devices are significantly more complex because they have to support complex data types like video, provide more storage, and support multiple modes.

UMTS (Universal Mobile Telecommunications System) in Europe and CDMA2000 in the North America are examples of 3G systems. Note that 3G systems are all based on CDMA technologies.

The entire relationship between the various players in the mobile data industry can be shown by the mobile value chain.

This content is reprinted from Real-World AJAX: Secrets of the Masters published by SYS-CON Books. To order the entire book now along with companion DVDs, click here to order.

More Stories By Ajit Jaokar

Ajit Jaokar is the author of the book 'Mobile Web 2.0' and is also a member of the Web2.0 workgroup. Currently, he plays an advisory role to a number of mobile start-ups in the UK and Scandinavia. He also works with the government and trade missions of a number of countries including South Korea and Ireland. He is a regular speaker at SYS-CON events including AJAXWorld Conference & Expo.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.