SlideShare a Scribd company logo
1 of 28
Multiple access in wireless
communication
9/22/20172
What is Multiple access?
 Multiple access method allows several terminals connected
to the same multi-point transmission medium to transmit
over it. Examples of shared physical media are wireless
networks, bus networks, ring networks and half
duplex point-to-point links.
 Multiple access schemes to allow many users to share
simultaneously a finite amount of radio spectrum resources.
9/22/20173
Multiple Access Techniques
Frequency division multiple access
(FDMA)
Time division multiple access (TDMA)
Code division multiple access (CDMA)
Space division multiple access (SDMA)
9/22/2017
4
Frequency division multiple
access (FDMA)
 The frequency band is divided into channels of equal
bandwidth so that each conversation is carried on a
different frequency.
 A specific frequency band is given to one person, and it
will received by identifying each of the frequency on the
receiving end. It is often used in the first generation of
analog mobile phone.
 Each station assigned a fixed frequency.
9/22/20175
 In FDMA system signaling dimensions are divided along
the frequency axis into non overlapping channels and
each end users assigned a different frequency channel as
shown in fig.
9/22/20176
Time division multiple access
(TDMA)
 Time frame is divided into slots (channels). Each user is
allocated a particular time slot or channel.
 Time Division Multiple Access (TDMA) is a digital
cellular telephone communication technology. It facilitates
many users to share the same frequency without
interference. Its technology divides a signal into different
timeslots, and increases the data carrying capacity.
9/22/20177
 In TDMA system signaling dimensions are divided along
the Time axis into non overlapping channels and each
end users assigned a different timeslot channel as shown
in fig.
9/22/2017
9/22/2017
Space division multiple
access (SDMA)
 It control the energy radiated in space for every users.
 It offers service to different users by using different spot bean
antennas . These spot beans are satellite signals sent by a high
gain antenna which concentrate on power and covers service
to small geographical area.
 Highly directional antennas are use for frequency reuse at a
sufficiently large distance.
9/22/2017
 This figure shows a satellite system that uses space division multiple
access (SDMA) technology. In this example, a single satellite
contains several directional antennas. Some of these antennas use
the same frequency. This allows a single satellite to simultaneously
communicate to two different satellite receivers that operate on the
same frequency.
9/22/2017
Code division multiple
access (CDMA)
 In Code division multiple access (CDMA)
chipping codes/orthogonal codes /pseudorandom
codes are used shared between sender and the
receiver.
 When a user sent a message they encrypt it by
XOR-ing message with codes(unreadable form).
 On receiver side receiver can decrypt it using that
particular code only .hence it maintains
confidentiality.
9/22/2017
 It allows multiple access through a common channel
i.e. multiple users can share a common channel as
different codes are assign to them. .
 It is also not affected by noise and fading of
signal(reduce in strength) as it uses spread spectrum
technique.
 PROBLEM: Far-Near Problem.
9/22/2017
9/22/2017
Packet radio access
 Packet radio is a form of packet switching technology
used to transmit digital data via radio or wireless
communications links. It uses the same concepts of
data transmission via Datagram that are fundamental to
communications via the Internet.
 There are three medium access protocol appropriate for
packet radio networks: ALOHA, slotted ALOHA,
and Carrier Sense Multiple Access (CSMA).
9/22/2017
Pure aloha
 In pure ALOHA, the stations transmit frames whenever they
have data to send.
 When two or more stations transmit simultaneously, there is
collision and the frames are destroyed.
 In pure ALOHA, whenever any station transmits a frame, it
expects the acknowledgement from the receiver.
 If acknowledgement is not received within specified time, the
station assumes that the frame (or acknowledgement) has
been destroyed.
 If the frame is destroyed because of collision the station waits
for a random amount of time and sends it again.
9/22/2017
 Therefore pure ALOHA dictates that when time-out period
passes, each station must wait for a random amount of time
before resending its frame. This randomness will help avoid more
collisions.
 Figure shows an example of frame collisions in pure ALOHA.
9/22/2017
Slotted aloha
 Slotted ALOHA was invented to improve the efficiency
of pure ALOHA as chances of collision in pure ALOHA
are very high.
 In slotted ALOHA, the time of the shared channel is
divided into discrete intervals called slots.
 The stations can send a frame only at the beginning of the
slot and only one frame is sent in each slot.
 In slotted ALOHA, if any station is not able to place the
frame onto the channel at the beginning of the slot i.e. it
misses the time slot then the station has to wait until the
beginning of the next time slot.
9/22/2017
 In slotted ALOHA, there is still a possibility of collision if
two stations try to send at the beginning of the same time
slot as shown in fig.
9/22/2017
PROBLEM
 Pure and slotted Aloha protocols do not
listen to the channels before transmitting
the data and hence they are unaware of
the information of other users in the
channel.
9/22/2017
CARRIER SENCE MULTIPLE
ACCESS CONTROL
 Carrier sense multiple access (CSMA) is based on a
protocol that each terminal in the network is able to
monitor the status of the channel before transmitting the
data.
 If the channel is ideal then the user is allowed to transmit
the data based on certain algorithm that is common to all
the transmitters on the network
 Here detection delay (time required to sense whether
the channel is ideal)and propagation delay (time
required to sent the data)are two important parameters.
9/22/2017
 Type of CSMA:
 1-Persistence CSMA ( continuous sensing of channel)
 Persistence CSMA( sense and if not ideal wait for
random
period of time and again start sensing)
 Non-persistence CSMA(combination of both)
9/22/2017
Multiple access collision
avoidance
 Multiple Access with Collision Avoidance (MACA) is a
protocol avoids the collision when simultaneous transmission
of data by more than one user(station) occurs that cannot sense
each other(HIDDEN STATION PROBLEM) .
 Also avoids Exposed node problem
9/22/2017
 Station A can communicate with Station B. Station C
can also communicate with Station B. However, Stations
A and C cannot communicate with each other since they
cannot sense each other on the network, because they are
out of range of each other.
9/22/2017
 The exposed node problem occurs when a node is
prevented from sending packets to other nodes because
of a neighbouring transmitter.
 EXAMPLE:
Consider an example of 4 nodes labeled R1, S1, S2, and R2,
where the two receivers (R1, R2) are out of range of each other,
yet the two transmitters (S1, S2) in the middle are in range of
each other. Here, if a transmission between S1 and R1 is taking
place, node S2 is prevented from transmitting to R2 as it will
interfere with the transmission by its neighbour S1. However
note that R2 could still receive the transmission of S2 without
interference because it is out of range of S1.
9/22/2017
 In MACA, a wireless network node announces that it is
going to send the data frame, informing the other nodes to
remain silent. When a node intends to transmit the data
frame, it communicates using a signal known as Request-
To-Send (RTS) that includes the length of the data frame
to transmit. If the recipient permits the transmission, it
responds back to the sender with a signal known as Clear-
To-Send (CTS), which includes the length of the data
frame that it is about to receive.
 In the meantime, the nodes that listen to the RTS signal
must remain silent until the data is fully transmitted in
order to avoid conflict with CTS.
 Nodes send acknowledgments after every successful
frame transmission.
9/22/2017
9/22/2017
REQUEST TO
SENT
CLEAR TO
SENT
OTHERS
NODE
REMAINS
SILENT
REFERENCES
 1. https://en.wikipedia.org/wiki/Exposed_node_proble
 2.
http://www.mosharaf.com/blog/2009/09/30/macaw-a-media-access-protocol
 3. www.powershow.com
 4. slideplayer.com/slide/5101644/
 Wireless Communications & Networks
Author : Pearson
Publisher : William Stallings
9/22/2017
28
9/22/2017

More Related Content

What's hot

Evolution of mobile communication
Evolution of mobile communicationEvolution of mobile communication
Evolution of mobile communication
Mohamed Reda
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
asadkhan1327
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
Diwaker Pant
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
Miles Kevin Galario
 

What's hot (20)

Mimo in Wireless Communication
Mimo in Wireless CommunicationMimo in Wireless Communication
Mimo in Wireless Communication
 
Mimo
MimoMimo
Mimo
 
MIMO.ppt (2) 2
MIMO.ppt (2) 2MIMO.ppt (2) 2
MIMO.ppt (2) 2
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Ofdm
OfdmOfdm
Ofdm
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Evolution of mobile communication
Evolution of mobile communicationEvolution of mobile communication
Evolution of mobile communication
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).
 
Ofdm for wireless
Ofdm for wirelessOfdm for wireless
Ofdm for wireless
 
OFDM
OFDMOFDM
OFDM
 

Similar to MULTIPLE ACCESS IN WIRELESS COMMUNICATION

Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
bwire sedrick
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
bheemsain
 
Rate-splitting multiple access for downlink communication systems: bridging, ...
Rate-splitting multiple access for downlink communication systems: bridging, ...Rate-splitting multiple access for downlink communication systems: bridging, ...
Rate-splitting multiple access for downlink communication systems: bridging, ...
HongTrnMnh1
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
msohail37
 

Similar to MULTIPLE ACCESS IN WIRELESS COMMUNICATION (20)

multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
tow
towtow
tow
 
It6601 mc - qb - part a (2) (1)
It6601   mc - qb - part a (2) (1)It6601   mc - qb - part a (2) (1)
It6601 mc - qb - part a (2) (1)
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
Mac
MacMac
Mac
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Hp3414121418
Hp3414121418Hp3414121418
Hp3414121418
 
Rate-splitting multiple access for downlink communication systems: bridging, ...
Rate-splitting multiple access for downlink communication systems: bridging, ...Rate-splitting multiple access for downlink communication systems: bridging, ...
Rate-splitting multiple access for downlink communication systems: bridging, ...
 
Ed36788792
Ed36788792Ed36788792
Ed36788792
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
Unit 1 part 2
Unit 1 part 2Unit 1 part 2
Unit 1 part 2
 
Cdma
CdmaCdma
Cdma
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 

MULTIPLE ACCESS IN WIRELESS COMMUNICATION

  • 1. Multiple access in wireless communication 9/22/20172
  • 2. What is Multiple access?  Multiple access method allows several terminals connected to the same multi-point transmission medium to transmit over it. Examples of shared physical media are wireless networks, bus networks, ring networks and half duplex point-to-point links.  Multiple access schemes to allow many users to share simultaneously a finite amount of radio spectrum resources. 9/22/20173
  • 3. Multiple Access Techniques Frequency division multiple access (FDMA) Time division multiple access (TDMA) Code division multiple access (CDMA) Space division multiple access (SDMA) 9/22/2017 4
  • 4. Frequency division multiple access (FDMA)  The frequency band is divided into channels of equal bandwidth so that each conversation is carried on a different frequency.  A specific frequency band is given to one person, and it will received by identifying each of the frequency on the receiving end. It is often used in the first generation of analog mobile phone.  Each station assigned a fixed frequency. 9/22/20175
  • 5.  In FDMA system signaling dimensions are divided along the frequency axis into non overlapping channels and each end users assigned a different frequency channel as shown in fig. 9/22/20176
  • 6. Time division multiple access (TDMA)  Time frame is divided into slots (channels). Each user is allocated a particular time slot or channel.  Time Division Multiple Access (TDMA) is a digital cellular telephone communication technology. It facilitates many users to share the same frequency without interference. Its technology divides a signal into different timeslots, and increases the data carrying capacity. 9/22/20177
  • 7.  In TDMA system signaling dimensions are divided along the Time axis into non overlapping channels and each end users assigned a different timeslot channel as shown in fig. 9/22/2017
  • 9. Space division multiple access (SDMA)  It control the energy radiated in space for every users.  It offers service to different users by using different spot bean antennas . These spot beans are satellite signals sent by a high gain antenna which concentrate on power and covers service to small geographical area.  Highly directional antennas are use for frequency reuse at a sufficiently large distance. 9/22/2017
  • 10.  This figure shows a satellite system that uses space division multiple access (SDMA) technology. In this example, a single satellite contains several directional antennas. Some of these antennas use the same frequency. This allows a single satellite to simultaneously communicate to two different satellite receivers that operate on the same frequency. 9/22/2017
  • 11. Code division multiple access (CDMA)  In Code division multiple access (CDMA) chipping codes/orthogonal codes /pseudorandom codes are used shared between sender and the receiver.  When a user sent a message they encrypt it by XOR-ing message with codes(unreadable form).  On receiver side receiver can decrypt it using that particular code only .hence it maintains confidentiality. 9/22/2017
  • 12.  It allows multiple access through a common channel i.e. multiple users can share a common channel as different codes are assign to them. .  It is also not affected by noise and fading of signal(reduce in strength) as it uses spread spectrum technique.  PROBLEM: Far-Near Problem. 9/22/2017
  • 14. Packet radio access  Packet radio is a form of packet switching technology used to transmit digital data via radio or wireless communications links. It uses the same concepts of data transmission via Datagram that are fundamental to communications via the Internet.  There are three medium access protocol appropriate for packet radio networks: ALOHA, slotted ALOHA, and Carrier Sense Multiple Access (CSMA). 9/22/2017
  • 15. Pure aloha  In pure ALOHA, the stations transmit frames whenever they have data to send.  When two or more stations transmit simultaneously, there is collision and the frames are destroyed.  In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver.  If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed.  If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. 9/22/2017
  • 16.  Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions.  Figure shows an example of frame collisions in pure ALOHA. 9/22/2017
  • 17. Slotted aloha  Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high.  In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots.  The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.  In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. 9/22/2017
  • 18.  In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. 9/22/2017
  • 19. PROBLEM  Pure and slotted Aloha protocols do not listen to the channels before transmitting the data and hence they are unaware of the information of other users in the channel. 9/22/2017
  • 20. CARRIER SENCE MULTIPLE ACCESS CONTROL  Carrier sense multiple access (CSMA) is based on a protocol that each terminal in the network is able to monitor the status of the channel before transmitting the data.  If the channel is ideal then the user is allowed to transmit the data based on certain algorithm that is common to all the transmitters on the network  Here detection delay (time required to sense whether the channel is ideal)and propagation delay (time required to sent the data)are two important parameters. 9/22/2017
  • 21.  Type of CSMA:  1-Persistence CSMA ( continuous sensing of channel)  Persistence CSMA( sense and if not ideal wait for random period of time and again start sensing)  Non-persistence CSMA(combination of both) 9/22/2017
  • 22. Multiple access collision avoidance  Multiple Access with Collision Avoidance (MACA) is a protocol avoids the collision when simultaneous transmission of data by more than one user(station) occurs that cannot sense each other(HIDDEN STATION PROBLEM) .  Also avoids Exposed node problem 9/22/2017
  • 23.  Station A can communicate with Station B. Station C can also communicate with Station B. However, Stations A and C cannot communicate with each other since they cannot sense each other on the network, because they are out of range of each other. 9/22/2017
  • 24.  The exposed node problem occurs when a node is prevented from sending packets to other nodes because of a neighbouring transmitter.  EXAMPLE: Consider an example of 4 nodes labeled R1, S1, S2, and R2, where the two receivers (R1, R2) are out of range of each other, yet the two transmitters (S1, S2) in the middle are in range of each other. Here, if a transmission between S1 and R1 is taking place, node S2 is prevented from transmitting to R2 as it will interfere with the transmission by its neighbour S1. However note that R2 could still receive the transmission of S2 without interference because it is out of range of S1. 9/22/2017
  • 25.  In MACA, a wireless network node announces that it is going to send the data frame, informing the other nodes to remain silent. When a node intends to transmit the data frame, it communicates using a signal known as Request- To-Send (RTS) that includes the length of the data frame to transmit. If the recipient permits the transmission, it responds back to the sender with a signal known as Clear- To-Send (CTS), which includes the length of the data frame that it is about to receive.  In the meantime, the nodes that listen to the RTS signal must remain silent until the data is fully transmitted in order to avoid conflict with CTS.  Nodes send acknowledgments after every successful frame transmission. 9/22/2017
  • 27. REFERENCES  1. https://en.wikipedia.org/wiki/Exposed_node_proble  2. http://www.mosharaf.com/blog/2009/09/30/macaw-a-media-access-protocol  3. www.powershow.com  4. slideplayer.com/slide/5101644/  Wireless Communications & Networks Author : Pearson Publisher : William Stallings 9/22/2017