WCDMA | UMTS | CDMA2000 Technology and Security Training

WCDMA | UMTS | CDMA2000 Technology and Security Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

WCDMA | UMTS | CDMA2000 Technology and Security Training. Intermediate Level Course

This is an intermediate-level in-depth WCDMA | UMTS | CDMA2000 Technology and Security Training course on CDMA/CDMA2000 (CDMAOne, 1xRTT, EVDO) and WCDMA (UMTS/HSPA as well as LTE) with a particular emphasis on the issues of security and vulnerability.

Customize It:

● If you are familiar with some aspects of this WCDMA | UMTS | CDMA2000 Technology and Security Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the WCDMA | UMTS | CDMA2000 Technology and Security Training course in manner understandable to lay audiences.

Related Courses:

WCDMA | GSM Interoperability Tuning Training
WCDMA | HSPA Planning and Dimensioning Training

WCDMA | UMTS | CDMA2000 Technology and Security Training – Course Syllabus:

Part 1: Introduction to Cellular Communications

Cellular phone concept

Base station
Mobile station
Mobile switching center

Uplink and downlink

Time division duplexing
Frequency division duplexing

Multiple access methods

Frequency division multiple access
Time division multiple access
Code division multiple access


Circuit and packet switching

History of cellular communications

1G to 4G
Phone comparisons

Part 2: Radio Wave Spectrum, Propagation, and Antennas

The electromagnetic spectrum

Types of radio services
Spectrum characteristics

Radio frequency (RF) system measurements

Power measurement using the decibel
Signal to noise and interference ratios


Gain and loss
Law of reciprocity
Base station antennas
Smart antennas

RF propagation in fixed and mobile environments

Propagation mechanisms
Path loss models
Maximum range calculations
Multipath and fading

Cell planning and frequency reuse

Frequency reuse calculations
Cell sectoring
Cell splitting
Antenna downtilt

Part 3: Modulation and Coding

Basic modulation methods

Modulated signal structure
Amplitude, frequency, and phase shift keying
Bit error rate performance in Gaussian noise

Advanced modulation methods

Gaussian filtered frequency shift keying (GFSK)
Quadrature phase shift keying (QPSK)
Quadrature amplitude modulation (QAM)
Orthogonal frequency division multiplexing (OFDM)

Spread spectrum systems

Frequency hop
Direct sequence
Multiple access methods

Error control

Error detection
Error correction
Automatic repeat request

Speech coding

Speech quality rating
Speech coding techniques
Speech coders in practice

Part 4: 3GPP, 3GPP2, and IEEE LAN/MAN Standardization

Motives behind 3G evolution

Driving forces
Radio access evolution
Core network evolution

Summary of 3GPP standards


Summary of 3GPP2 cellular standards


Summary of IEEE LAN/MAN standards


Market penetration and deployment status

Part 5: 3GPP2 CDMA: cdmaOne, cdma2000, and EVDO Operations

CDMA codes and sequences

Maximal length sequences
Walsh codes

Forward link channel

Pilot channel
Synchronization channel
Control channels
Paging channels
Traffic channels

Reverse link channels

Pilot channel
Access channel
Control channels
Traffic channels

Call processing

System access

Resource management

Power control

Evolution-Data Optimized (EVDO) operation

Reference model
Forward and reverse channels
Modulation and coding
Power control

Part 6: 3GPP CDMA: UMTS and HSPA Operations

UMTS architecture and protocols

UTRAN radio network controller and NodeB
Core network architecture and protocols

UMTS physical layer

WCDMA modulation and coding
Transport channels
User data transmission
Cell search and access

Radio interface protocols

Medium access control
Radio link control
Packet data convergence protocol
Radio resource control

Radio resource management

Power control
Admission control

High-speed packet access (HSPA) operation

HSDPA physical layer structure
HSDPA performance
Enhanced uplink

Part 7: CDMA System Security

Wireless security challenges

Threat categories and attack methods
General security setup process

Attacks in mobile environments

Spoofing and illicit use
Interception of data
Denial of service

Cryptography basics

Symmetric and asymmetric cryptography
Public key infrastructure
Cryptographic attacks

Access control and authentication

Weak and strong authentication schemes
Attacks on authentication
Authorization and access control

Smart card security

Smart card basics
Smart card communication
Invasive and non-invasive attacks on smart cards

Legacy GSM security operation and weaknesses

GSM security model and encryption algorithms
Attacks on GSM

UMTS security

Improvements to GSM security
Confidentiality algorithm and extensions
Integrity algorithm
KASUMI kernel
Authentication and key agreement (AKA)

cdma2000 security

Air interface parameters for authentication
Secure parameters
Challenge-response authentication procedure
Authentication during MS registration
Authentication during MS call origination and termination
The CAVE algorithm for authentication and encryption

Part 8: Long-Term Evolution (LTE) Operations

General LTE operation

System architecture
Frequency bands
Downlink and uplink modulation and resource structure
Error control
Spatial multiplexing
Performance requirements

LTE downlink

User protocol architecture
Channel mapping
Logical, transport, and physical channel functions
Cell acquisition
IP packet processing and physical data mapping
Control and radio resource management

LTE uplink

UL/DL similarities and differences
Channel mapping
Random access
Data transfer
Power save methods
Link activity and capacity

Course Summary

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email