SlideShare a Scribd company logo
1 of 37
Code Division Multiple Access Eng. MshariAlabdulkarim
Code Division Multiple Access Outline: ,[object Object]
Spread Spectrum Methods.
Technologies based on CDMA.
Performance analysis of IEEE 802.11 protocol.
Major Development in CDMA.,[object Object]
Code Division Multiple Access Introduction (Cont.): How does it support more than one group in the same channel? It allows multiple groups to share the same channel at the same time by assigning each group to different code. CDMA Modulation Steps: Generate a local pseudo-random code with a higher rate than the data to be transmitted. XOR the data which need to be transmitted with the generated code.
Code Division Multiple Access Introduction (Cont.): Data Signal Pseudo-random  Code Transmitted  Signal  Time
Code Division Multiple Access Introduction (Cont.): Input  data Output  data Channel  Encoder Modulator Channel  Demodulator Channel  Decoder Pseudo-noise Generator Pseudo-noise Generator General Model of Spread Spectrum Digital Communication System
Code Division Multiple Access Introduction (Cont.): What can we gain from the spreading of the spectrum? ,[object Object]
The immunity from the multipath distortion.
It can be used as an encrypting technique.
Several users can use the same channel with little interference.,[object Object]
It must appear random to a listener who does not have a prior knowledge of the code.
The cross-correlation between any two codes must be small.
The code should have a long period.,[object Object]
The best performance will be when the users’ signals are separated as much as possible.
The separation can be done by correlating the received signal with the local generated code.
If the correlation was high, then we exclude this code and we search for another code with less correlation.,[object Object]
Code Division Multiple Access Spread Spectrum Methods: Direct Sequence Spread Spectrum (DSSS): ,[object Object]
The original data is spread out across a wider frequency band by using the spreading code.
The spreading proportion depends on the number of bits used in the code.,[object Object]
Code Division Multiple Access Spread Spectrum Methods (Cont.): Frequency Hopping Spread Spectrum (FHSS): ,[object Object]
The receiver should use the same hopping pattern simultaneously with the transmitter in order to receive the data correctly.
The spreading code specifies the sequence of channels and the receiver should use the same code to tune into the sequence of channels that are used by the sender.,[object Object]
Code Division Multiple Access Spread Spectrum Methods (Cont.): Chirp Spread Spectrum (CSS): ,[object Object]
It encodes the information by using wideband linear frequency modulated chirp.
It uses the entire allocated bandwidth to broadcast the signal, which helps making it robust to channel noise.
Also, it is immunized from the multi-path fading, because it utilizes the spectrum broadband.
It finds the noise by relying on the linear nature of the chirp pulse.,[object Object]
It consumes low power due to the very low duty cycles.
In THSS, the pseudo random number determines the sequence of how the burst will be transmitted.,[object Object]
Code Division Multiple Access Technologies based on CDMA: WiFi (IEEE 802.11): 802.11b and 802.11g working in the 2.4 frequency band (Industry, Science and Medicine band or ISM). DSSS and FHSS physical layer options have been designed specifically to overcome the interfering with other devices in this band.
Code Division Multiple Access 22 MHz Channel 6 2.4370 Channel 11 2.4620 Channel 1 2.4120 2.4000 GHz 2.4835 GHz Three Non-Overlapping DSSS Channels in the ISM Band
Code Division Multiple Access
Code Division Multiple Access Technologies based on CDMA (Cont.): Bluetooth: ,[object Object]
It uses Frequency Hoping Spread Spectrum (FHSS) to make it rare for more than one device to transmit on the same time using the same frequency and to avoid any interference.

More Related Content

What's hot

Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniquesJAIGANESH SEKAR
 
cell splitting and sectoring
cell splitting and sectoringcell splitting and sectoring
cell splitting and sectoringShwetanshu Gupta
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fadingAJAL A J
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdmaJAIGANESH SEKAR
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA ViVek Patel
 
Parameters of multipath channel
Parameters of multipath channelParameters of multipath channel
Parameters of multipath channelNaveen Kumar
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Accessguest734441
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Cdma system
Cdma systemCdma system
Cdma systemtrimba
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4JAIGANESH SEKAR
 
Radar Systems- Unit-II : CW and Frequency Modulated Radar
Radar Systems- Unit-II : CW and Frequency Modulated RadarRadar Systems- Unit-II : CW and Frequency Modulated Radar
Radar Systems- Unit-II : CW and Frequency Modulated RadarVenkataRatnam14
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...Nidhi Baranwal
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 

What's hot (20)

Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
OFDM
OFDMOFDM
OFDM
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
cell splitting and sectoring
cell splitting and sectoringcell splitting and sectoring
cell splitting and sectoring
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Parameters of multipath channel
Parameters of multipath channelParameters of multipath channel
Parameters of multipath channel
 
TDMA
TDMATDMA
TDMA
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Access
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Cdma system
Cdma systemCdma system
Cdma system
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
 
Radar Systems- Unit-II : CW and Frequency Modulated Radar
Radar Systems- Unit-II : CW and Frequency Modulated RadarRadar Systems- Unit-II : CW and Frequency Modulated Radar
Radar Systems- Unit-II : CW and Frequency Modulated Radar
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 

Viewers also liked

Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
Presentation1
Presentation1Presentation1
Presentation1tapubhai
 
Interferences
InterferencesInterferences
InterferencesAJAL A J
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Point to point.48
Point to point.48Point to point.48
Point to point.48myrajendra
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation finalAmit Gaikwad
 
Antenna basics
Antenna basicsAntenna basics
Antenna basicsjpratt59
 
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagationIsha Negi
 
Point to point microwave
Point to point microwavePoint to point microwave
Point to point microwavenandkishorsuman
 

Viewers also liked (17)

Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Presentation1
Presentation1Presentation1
Presentation1
 
Interferences
InterferencesInterferences
Interferences
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
Antenna types
Antenna typesAntenna types
Antenna types
 
Antenna basics
Antenna basicsAntenna basics
Antenna basics
 
Introduction to mapinfo
Introduction to mapinfoIntroduction to mapinfo
Introduction to mapinfo
 
Gsm
GsmGsm
Gsm
 
CDMA
CDMACDMA
CDMA
 
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagation
 
Point to point microwave
Point to point microwavePoint to point microwave
Point to point microwave
 
Microwave Antenna
Microwave AntennaMicrowave Antenna
Microwave Antenna
 

Similar to CDMA

Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsIOSR Journals
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overviewsureshkumarmss
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...IJNSA Journal
 

Similar to CDMA (20)

Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
Wcdma
WcdmaWcdma
Wcdma
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
Relay lte
Relay lteRelay lte
Relay lte
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Pulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMAPulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMA
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overview
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
 

More from Mshari Alabdulkarim

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbersMshari Alabdulkarim
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Mshari Alabdulkarim
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 

More from Mshari Alabdulkarim (6)

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
 
WPA2
WPA2WPA2
WPA2
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

CDMA

  • 1. Code Division Multiple Access Eng. MshariAlabdulkarim
  • 2.
  • 5. Performance analysis of IEEE 802.11 protocol.
  • 6.
  • 7. Code Division Multiple Access Introduction (Cont.): How does it support more than one group in the same channel? It allows multiple groups to share the same channel at the same time by assigning each group to different code. CDMA Modulation Steps: Generate a local pseudo-random code with a higher rate than the data to be transmitted. XOR the data which need to be transmitted with the generated code.
  • 8. Code Division Multiple Access Introduction (Cont.): Data Signal Pseudo-random Code Transmitted Signal Time
  • 9. Code Division Multiple Access Introduction (Cont.): Input data Output data Channel Encoder Modulator Channel Demodulator Channel Decoder Pseudo-noise Generator Pseudo-noise Generator General Model of Spread Spectrum Digital Communication System
  • 10.
  • 11. The immunity from the multipath distortion.
  • 12. It can be used as an encrypting technique.
  • 13.
  • 14. It must appear random to a listener who does not have a prior knowledge of the code.
  • 15. The cross-correlation between any two codes must be small.
  • 16.
  • 17. The best performance will be when the users’ signals are separated as much as possible.
  • 18. The separation can be done by correlating the received signal with the local generated code.
  • 19.
  • 20.
  • 21. The original data is spread out across a wider frequency band by using the spreading code.
  • 22.
  • 23.
  • 24. The receiver should use the same hopping pattern simultaneously with the transmitter in order to receive the data correctly.
  • 25.
  • 26.
  • 27. It encodes the information by using wideband linear frequency modulated chirp.
  • 28. It uses the entire allocated bandwidth to broadcast the signal, which helps making it robust to channel noise.
  • 29. Also, it is immunized from the multi-path fading, because it utilizes the spectrum broadband.
  • 30.
  • 31. It consumes low power due to the very low duty cycles.
  • 32.
  • 33. Code Division Multiple Access Technologies based on CDMA: WiFi (IEEE 802.11): 802.11b and 802.11g working in the 2.4 frequency band (Industry, Science and Medicine band or ISM). DSSS and FHSS physical layer options have been designed specifically to overcome the interfering with other devices in this band.
  • 34. Code Division Multiple Access 22 MHz Channel 6 2.4370 Channel 11 2.4620 Channel 1 2.4120 2.4000 GHz 2.4835 GHz Three Non-Overlapping DSSS Channels in the ISM Band
  • 36.
  • 37. It uses Frequency Hoping Spread Spectrum (FHSS) to make it rare for more than one device to transmit on the same time using the same frequency and to avoid any interference.
  • 38.
  • 39.
  • 40.
  • 41. The satellite carrier frequencies are modulated using the ranging signal which is PRN code which is different between satellites.
  • 42. The receiver uses the satellite PRN code to reconstruct the actual message data.
  • 43.
  • 44. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol: There are several assumptions have been considered in presenting this analytical framework: The effect of bit errors introduced by channel noise has been ignored. The only considered errors are the one which caused by collisions due to other simultaneous transmissions. There are no hidden stations. The propagation delays are not considered. There are n stations in the network.
  • 45. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): Every station always has a packet to send (saturated conditions). The collision probability of a transmitted frame is constant and independent of the number of retransmissions that this frame has experienced in the past. RTS/CTS access mechanism.
  • 46. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The sequence of events in a successful frame transmission using the RTS/CTS access method will be like the following: RTS: Request To Send. SIFS: Short Inter-Frame Space. CTS: Clear To Send. DIFS: Distributed Coordination Function.
  • 47. Code Division Multiple Access t0 DATA RTS Source Destination SIFS CTS SIFS SIFS ACK Other NAV (RTS) DIFS NAV (CTS) NAV (DATA) Defer Access Back-off RTS: Request To Send. SIFS: Short Inter-Frame Space. CTS: Clear To Send. DIFS: Distributed Coordination Function.
  • 48. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): Abbreviations:
  • 49. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): For simplicity, I assumed that the value of τ will be known and we will start by calculating the value of p: Because we have n stations and all of them will transmit with a probability of τ , then the value of will be:
  • 50. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The probability of successful transmission will be equal to the probability that one station is transmitting while the remaining stations stay silent: If is the frame header, the average time delays for RTS/CTS will be:
  • 51. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The throughput will be equal to the time needed to transmit the payload information divided by the average length of slot time:
  • 52.
  • 53. It supports frequency division (FDD) and inter-cell asynchronous operation.
  • 54. It employs coherent detection on both the uplink and downlink.
  • 55. It has a Variable mission on a 10 ms frame basis.
  • 56. It supports Multi-code transmission.
  • 57.
  • 58. The signals from different users are separated in both time and code domain.
  • 59. It has a frame length of 10 ms and it is divided into 15 time slots.
  • 60. Each slot has duration of 666 micro second and length of 2560 chips.
  • 61.
  • 62. It is better suited for densely populated areas.
  • 63. It uses time-division duplexing (TDD).
  • 64. It can accommodate asymmetric traffic with different data rates on downlink and uplink.
  • 65.