SlideShare a Scribd company logo
1 of 4
USE WALSH TABLE TO GENERATE CHIP SEQUENCE FOR EACH OF THE FOLLOWING
STATIONS WHICH WANT TO SEND DATABIT WRITTEN AGAINST EACH
Since there are 8 stations, so we need 8 x 8 walsh matrix each row of which represents
code for each station
𝑊1 = = [ +1 ]
𝑊2𝑁 = |
𝑊𝑁 𝑊𝑁
𝑊𝑁 𝑊 𝑁
|
𝑊2(1) = |
𝑊1 𝑊1
𝑊1 𝑊1
| = |
+1 +1
+1 −1
|
𝑊4 = 𝑊2(2) = |
𝑊2 𝑊2
𝑊2 𝑊2
| =
Similarly walsh matrix for 8 row and 8 columns can also be calculated
Here each row represents chip sequence for different stations on the channel
STATIONS DATA BIT
Station 1 1
Station 2 1
Station 3 1
Station 4 Silent
Station 5 1
Station 6 0
Station 7 1
Station 8 Silent
𝑊2 =
+1 +1
+1 -1
+1 +1 +1 +1
+1 -1 +1 -1
+1 +1 -1 -1
+1 -1 -1 -1
𝑊8 = 𝑊2(4)
+1 +1 +1 +1 +1 +1 +1 +1
+1 -1 +1 -1 +1 -1 +1 -1
+1 +1 -1 -1 +1 +1 -1 -1
+1 -1 -1 +1 +1 -1 -1 +1
+1 +1 +1 +1 -1 -1 -1 -1
+1 -1 +1 -1 -1 +1 -1 +1
+1 +1 -1 -1 -1 -1 +1 +1
+1 -1 -1 +1 -1 +1 +1 -1
Here data bits are encoded i-e if a station need to send a 0 bit, it encodes as -1 and if it needs to
send a 1 bit, it encodes it as +1. When a station is ide, it sends no signal, which is interpreted as 0.
Data bits Encoded in
0 -1
1 +1
Silent 0
Now, each station will multiply its chip sequence with data, if it wants to send data to
common channel
MUTIPLEXING:-
STATION CODE DATA RESULT CODE
Station 1  +1 +1 +1 +1 +1 +1 +1 +1
Station 2  +1 -1 +1 -1 +1 -1 +1 -1
Station 3  +1 +1 -1 -1 +1 +1 -1 -1
Station 4  +1 -1 -1 +1 +1 -1 -1 +1
Station 5  +1 +1 +1 +1 -1 -1 -1 -1
Station 6  +1 -1 +1 -1 -1 +1 -1 +1
Station 7  +1 +1 -1 -1 -1 -1 +1 +1
Station 8  +1 -1 -1 +1 -1 +1 +1 -1
STATIONS DATA BIT Code to be multiplied
with chip sequence
Station 1 1 +1
Station 2 1 +1
Station 3 1 +1
Station 4 Silent 0
Station 5 1 +1
Station 6 0 -1
Station 7 1 +1
Station 8 Silent 0
Station 1 [+1 +1 +1 +1 +1 +1 +1 +1] x +1 = [+1 +1 +1 +1 +1 +1 +1 +1]
Station 2 [+1 -1 +1 -1 +1 -1 +1 -1] x +1 = [+1 -1 +1 -1 +1 -1 +1 -1]
Station 3 [+1 +1 -1 -1 +1 +1 -1 -1] x +1 = [+1 +1 -1 -1 +1 +1 -1 -1]
Station 4 [+1 -1 -1 +1 +1 -1 -1 +1] x 0 = [0 0 0 0 0 0 0 0]
Station 5 [+1 +1 +1 +1 -1 -1 -1 -1] x +1 = [+1 +1 +1 +1 -1 -1 -1 -1]
Station 6 [+1 -1 +1 -1 -1 +1 -1 +1] x -1 = [-1 +1 -1 +1 +1 -1 +1 -1]
Station 7 [+1 +1 -1 -1 -1 -1 +1 +1] x +1 = [+1 +1 -1 -1 -1 -1 +1 +1]
Station 8 [+1 -1 -1 +1 -1 +1 +1 -1] x 0 = [0 0 0 0 0 0 0 0]
If all stations send data at the same time then data on the common channel will be sum of
all the corresponding elements of all result codes
After multiplexing we get data on channel i-e [4, 4, 0, 0, 2, -2, 2, -2]
***********
DEMULTIPLEXING:-
To demultiplex the code each station code will be multiplied to the data on
the common channel and then resultant code will be added up and divided by the total number of
stations.
Station 1
[+1 +1 +1 +1 +1 +1 +1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 4 0 0 2 −2 2 −2] / 8
= (4 + 4 + 0 + 0 + 2 -2 +2 -2) / 8 = 8/8 = +1 which is bit 1
Station 2
[+1 −1 +1 −1 +1 −1 +1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 −4 0 0 2 2 2 2] / 8
= (4 - 4 + 0 + 0 + 2 + 2 + 2 + 2) / 8 = 8/8 = +1 which is bit 1
Station 3
[+1 +1 −1 −1 +1 +1 −1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 4 0 0 2 −2 −2 2] / 8
= (4 + 4 + 0 + 0 + 2 - 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1
Station 4
[+1 −1 −1 +1 +1 −1 −1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 −4 0 0 2 2 −2 −2] / 8
= (4 - 4 + 0 + 0 + 2 + 2 -2 - 2) / 8 = 0/8 = 0 which is silent
Station 5
[+1 +1 +1 +1 −1 −1 −1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 4 0 0 −2 2 −2 2] / 8
= (4 +4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1
Station 6
[+1 −1 +1 −1 −1 +1 −1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 −4 0 0 −2 −2 −2 −2] / 8
= (4 -4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = -8/8 = -1 which is bit 0
Station 7
[+1 +1 −1 −1 −1 −1 +1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 4 0 0 −2 2 2 −2] / 8
= (4 + 4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1
Station 8
[+1 −1 −1 +1 −1 +1 +1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8
= [4 −4 0 0 −2 −2 2 2 ] / 8
= (4 -4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 0/8 = -1 which is silent
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE

More Related Content

What's hot

IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
digital electronics Design of 101 sequence detector without overlapping for...
digital  electronics Design of 101 sequence detector without  overlapping for...digital  electronics Design of 101 sequence detector without  overlapping for...
digital electronics Design of 101 sequence detector without overlapping for...sanjay kumar pediredla
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsTarek Nader
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesDhrumil Panchal
 
Combinational Circuits & Sequential Circuits
Combinational Circuits & Sequential CircuitsCombinational Circuits & Sequential Circuits
Combinational Circuits & Sequential Circuitsgourav kottawar
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptmali yogesh kumar
 
Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)Gourab Ghosh
 
Verilog coding of mux 8 x1
Verilog coding of mux  8 x1Verilog coding of mux  8 x1
Verilog coding of mux 8 x1Rakesh kumar jha
 
Sequence detector Verilog Code
Sequence detector Verilog CodeSequence detector Verilog Code
Sequence detector Verilog CodeBharti Airtel Ltd.
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communicationjadhavmanoj01
 
Signed Addition And Subtraction
Signed Addition And SubtractionSigned Addition And Subtraction
Signed Addition And SubtractionKeyur Vadodariya
 
Verilog coding of demux 8 x1
Verilog coding of demux  8 x1Verilog coding of demux  8 x1
Verilog coding of demux 8 x1Rakesh kumar jha
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing TechniquesA B Shinde
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity CheckerJignesh Navdiya
 

What's hot (20)

IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
digital electronics Design of 101 sequence detector without overlapping for...
digital  electronics Design of 101 sequence detector without  overlapping for...digital  electronics Design of 101 sequence detector without  overlapping for...
digital electronics Design of 101 sequence detector without overlapping for...
 
Dif fft
Dif fftDif fft
Dif fft
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systems
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Combinational Circuits & Sequential Circuits
Combinational Circuits & Sequential CircuitsCombinational Circuits & Sequential Circuits
Combinational Circuits & Sequential Circuits
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
 
Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)
 
Verilog coding of mux 8 x1
Verilog coding of mux  8 x1Verilog coding of mux  8 x1
Verilog coding of mux 8 x1
 
Sequence detector Verilog Code
Sequence detector Verilog CodeSequence detector Verilog Code
Sequence detector Verilog Code
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Signed Addition And Subtraction
Signed Addition And SubtractionSigned Addition And Subtraction
Signed Addition And Subtraction
 
8 bit full adder
8 bit full adder8 bit full adder
8 bit full adder
 
Verilog coding of demux 8 x1
Verilog coding of demux  8 x1Verilog coding of demux  8 x1
Verilog coding of demux 8 x1
 
WCDMA
WCDMAWCDMA
WCDMA
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing Techniques
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 

Similar to CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE

Scala kansai summit-2016
Scala kansai summit-2016Scala kansai summit-2016
Scala kansai summit-2016Naoki Kitora
 
1) C++ Program to Implement Singly Linked List #inclu.pdf
1)  C++ Program to Implement Singly Linked List  #inclu.pdf1)  C++ Program to Implement Singly Linked List  #inclu.pdf
1) C++ Program to Implement Singly Linked List #inclu.pdfankitmobileshop235
 
Number system
Number system Number system
Number system BPGCW
 
Please follow the data 1) For Line 23 In the IF - Condition yo.pdf
Please follow the data 1) For Line 23 In the IF - Condition yo.pdfPlease follow the data 1) For Line 23 In the IF - Condition yo.pdf
Please follow the data 1) For Line 23 In the IF - Condition yo.pdfinfo382133
 
Ncp computer appls num sys1 pramod
Ncp computer appls  num sys1 pramodNcp computer appls  num sys1 pramod
Ncp computer appls num sys1 pramodNCP
 
Pertemuan 2 - Sistem Bilangan
Pertemuan 2 - Sistem BilanganPertemuan 2 - Sistem Bilangan
Pertemuan 2 - Sistem Bilanganahmad haidaroh
 
Fishers linear discriminant for dimensionality reduction.
Fishers linear discriminant for dimensionality reduction.Fishers linear discriminant for dimensionality reduction.
Fishers linear discriminant for dimensionality reduction.Nurul Amin Choudhury
 
CASIO Fx 115 es-570es appendix
CASIO Fx 115 es-570es appendix CASIO Fx 115 es-570es appendix
CASIO Fx 115 es-570es appendix JeanCarlos Chen
 
Oct8 - 131 slid
Oct8 - 131 slidOct8 - 131 slid
Oct8 - 131 slidTak Lee
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2Umang Gupta
 
Unit 1 PDF.pptx
Unit 1 PDF.pptxUnit 1 PDF.pptx
Unit 1 PDF.pptxChandraV13
 
関数プログラミングことはじめ revival
関数プログラミングことはじめ revival関数プログラミングことはじめ revival
関数プログラミングことはじめ revivalNaoki Kitora
 
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)Maho Nakata
 
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...Chanwoo Choi
 

Similar to CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE (20)

Scala kansai summit-2016
Scala kansai summit-2016Scala kansai summit-2016
Scala kansai summit-2016
 
1) C++ Program to Implement Singly Linked List #inclu.pdf
1)  C++ Program to Implement Singly Linked List  #inclu.pdf1)  C++ Program to Implement Singly Linked List  #inclu.pdf
1) C++ Program to Implement Singly Linked List #inclu.pdf
 
Number system
Number system Number system
Number system
 
3288940.ppt
3288940.ppt3288940.ppt
3288940.ppt
 
Please follow the data 1) For Line 23 In the IF - Condition yo.pdf
Please follow the data 1) For Line 23 In the IF - Condition yo.pdfPlease follow the data 1) For Line 23 In the IF - Condition yo.pdf
Please follow the data 1) For Line 23 In the IF - Condition yo.pdf
 
Binary
BinaryBinary
Binary
 
Ncp computer appls num sys1 pramod
Ncp computer appls  num sys1 pramodNcp computer appls  num sys1 pramod
Ncp computer appls num sys1 pramod
 
Pertemuan 2 - Sistem Bilangan
Pertemuan 2 - Sistem BilanganPertemuan 2 - Sistem Bilangan
Pertemuan 2 - Sistem Bilangan
 
Fishers linear discriminant for dimensionality reduction.
Fishers linear discriminant for dimensionality reduction.Fishers linear discriminant for dimensionality reduction.
Fishers linear discriminant for dimensionality reduction.
 
CASIO Fx 115 es-570es appendix
CASIO Fx 115 es-570es appendix CASIO Fx 115 es-570es appendix
CASIO Fx 115 es-570es appendix
 
Oct8 - 131 slid
Oct8 - 131 slidOct8 - 131 slid
Oct8 - 131 slid
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Sort presentation
Sort presentationSort presentation
Sort presentation
 
Numbering Systems
Numbering SystemsNumbering Systems
Numbering Systems
 
Computer organiztion2
Computer organiztion2Computer organiztion2
Computer organiztion2
 
Mona cheatsheet
Mona cheatsheetMona cheatsheet
Mona cheatsheet
 
Unit 1 PDF.pptx
Unit 1 PDF.pptxUnit 1 PDF.pptx
Unit 1 PDF.pptx
 
関数プログラミングことはじめ revival
関数プログラミングことはじめ revival関数プログラミングことはじめ revival
関数プログラミングことはじめ revival
 
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)
quantum chemistry on quantum computer handson by Q# (2019/8/4@MDR Hongo, Tokyo)
 
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE

  • 1. USE WALSH TABLE TO GENERATE CHIP SEQUENCE FOR EACH OF THE FOLLOWING STATIONS WHICH WANT TO SEND DATABIT WRITTEN AGAINST EACH Since there are 8 stations, so we need 8 x 8 walsh matrix each row of which represents code for each station 𝑊1 = = [ +1 ] 𝑊2𝑁 = | 𝑊𝑁 𝑊𝑁 𝑊𝑁 𝑊 𝑁 | 𝑊2(1) = | 𝑊1 𝑊1 𝑊1 𝑊1 | = | +1 +1 +1 −1 | 𝑊4 = 𝑊2(2) = | 𝑊2 𝑊2 𝑊2 𝑊2 | = Similarly walsh matrix for 8 row and 8 columns can also be calculated Here each row represents chip sequence for different stations on the channel STATIONS DATA BIT Station 1 1 Station 2 1 Station 3 1 Station 4 Silent Station 5 1 Station 6 0 Station 7 1 Station 8 Silent 𝑊2 = +1 +1 +1 -1 +1 +1 +1 +1 +1 -1 +1 -1 +1 +1 -1 -1 +1 -1 -1 -1 𝑊8 = 𝑊2(4) +1 +1 +1 +1 +1 +1 +1 +1 +1 -1 +1 -1 +1 -1 +1 -1 +1 +1 -1 -1 +1 +1 -1 -1 +1 -1 -1 +1 +1 -1 -1 +1 +1 +1 +1 +1 -1 -1 -1 -1 +1 -1 +1 -1 -1 +1 -1 +1 +1 +1 -1 -1 -1 -1 +1 +1 +1 -1 -1 +1 -1 +1 +1 -1
  • 2. Here data bits are encoded i-e if a station need to send a 0 bit, it encodes as -1 and if it needs to send a 1 bit, it encodes it as +1. When a station is ide, it sends no signal, which is interpreted as 0. Data bits Encoded in 0 -1 1 +1 Silent 0 Now, each station will multiply its chip sequence with data, if it wants to send data to common channel MUTIPLEXING:- STATION CODE DATA RESULT CODE Station 1  +1 +1 +1 +1 +1 +1 +1 +1 Station 2  +1 -1 +1 -1 +1 -1 +1 -1 Station 3  +1 +1 -1 -1 +1 +1 -1 -1 Station 4  +1 -1 -1 +1 +1 -1 -1 +1 Station 5  +1 +1 +1 +1 -1 -1 -1 -1 Station 6  +1 -1 +1 -1 -1 +1 -1 +1 Station 7  +1 +1 -1 -1 -1 -1 +1 +1 Station 8  +1 -1 -1 +1 -1 +1 +1 -1 STATIONS DATA BIT Code to be multiplied with chip sequence Station 1 1 +1 Station 2 1 +1 Station 3 1 +1 Station 4 Silent 0 Station 5 1 +1 Station 6 0 -1 Station 7 1 +1 Station 8 Silent 0 Station 1 [+1 +1 +1 +1 +1 +1 +1 +1] x +1 = [+1 +1 +1 +1 +1 +1 +1 +1] Station 2 [+1 -1 +1 -1 +1 -1 +1 -1] x +1 = [+1 -1 +1 -1 +1 -1 +1 -1] Station 3 [+1 +1 -1 -1 +1 +1 -1 -1] x +1 = [+1 +1 -1 -1 +1 +1 -1 -1] Station 4 [+1 -1 -1 +1 +1 -1 -1 +1] x 0 = [0 0 0 0 0 0 0 0] Station 5 [+1 +1 +1 +1 -1 -1 -1 -1] x +1 = [+1 +1 +1 +1 -1 -1 -1 -1] Station 6 [+1 -1 +1 -1 -1 +1 -1 +1] x -1 = [-1 +1 -1 +1 +1 -1 +1 -1] Station 7 [+1 +1 -1 -1 -1 -1 +1 +1] x +1 = [+1 +1 -1 -1 -1 -1 +1 +1] Station 8 [+1 -1 -1 +1 -1 +1 +1 -1] x 0 = [0 0 0 0 0 0 0 0]
  • 3. If all stations send data at the same time then data on the common channel will be sum of all the corresponding elements of all result codes After multiplexing we get data on channel i-e [4, 4, 0, 0, 2, -2, 2, -2] *********** DEMULTIPLEXING:- To demultiplex the code each station code will be multiplied to the data on the common channel and then resultant code will be added up and divided by the total number of stations. Station 1 [+1 +1 +1 +1 +1 +1 +1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 4 0 0 2 −2 2 −2] / 8 = (4 + 4 + 0 + 0 + 2 -2 +2 -2) / 8 = 8/8 = +1 which is bit 1 Station 2 [+1 −1 +1 −1 +1 −1 +1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 −4 0 0 2 2 2 2] / 8 = (4 - 4 + 0 + 0 + 2 + 2 + 2 + 2) / 8 = 8/8 = +1 which is bit 1 Station 3 [+1 +1 −1 −1 +1 +1 −1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 4 0 0 2 −2 −2 2] / 8 = (4 + 4 + 0 + 0 + 2 - 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1 Station 4 [+1 −1 −1 +1 +1 −1 −1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 −4 0 0 2 2 −2 −2] / 8 = (4 - 4 + 0 + 0 + 2 + 2 -2 - 2) / 8 = 0/8 = 0 which is silent Station 5 [+1 +1 +1 +1 −1 −1 −1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 4 0 0 −2 2 −2 2] / 8 = (4 +4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1 Station 6 [+1 −1 +1 −1 −1 +1 −1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 −4 0 0 −2 −2 −2 −2] / 8 = (4 -4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = -8/8 = -1 which is bit 0 Station 7 [+1 +1 −1 −1 −1 −1 +1 +1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 4 0 0 −2 2 2 −2] / 8 = (4 + 4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 8/8 = +1 which is bit 1 Station 8 [+1 −1 −1 +1 −1 +1 +1 −1 ] x [4 4 0 0 2 −2 2 −2] / 8 = [4 −4 0 0 −2 −2 2 2 ] / 8 = (4 -4 + 0 + 0 - 2 + 2 -2 + 2) / 8 = 0/8 = -1 which is silent