SlideShare a Scribd company logo
1 of 10
Multiple
Access
Techniques
Submitted by: Yogendra Singh
Roll no. : 202010101150016
Course: B Tech. CS(DS +AI)
Multiple access means access to a given facility or a resource by multiple users. In the context of satellite
communication, the facility is the transponder and the multiple users are various terrestrial terminals under the
footprint of the satellite. The transponder provides the communication channel(s) that receives the signals
beamed at it via the uplink and then retransmits the same back to Earth for intended users via the downlink.
Multiple users are geographically dispersed and certain specific techniques, to be discussed in this chapter, are
used to allow them a simultaneous access to the satellite’s transponder. The text matter is suitably illustrated
with the help of a large number of problems.
What is Multiple Access?
► Multiple access is a technique whereby a variable number of users can access a common resource for the
purpose of communications.
► Multiple access is employed in most wireless systems, particularly in satellite systems and cellular systems.
► Objective is to achieve higher capacity through sharing of the limited radio spectrum while optimizing the
system performance.
► Similar to multiplexing in a wire-line system.
Multiple Access
Introduction to Multiple Access Techniques
Commonly used multiple access techniques include the following:
1. Frequency division multiple access (FDMA)
2. Time division multiple access (TDMA)
3. Code division multiple access (CDMA)
4. Space domain multiple access (SDMA)
Three primary methods:
► Use a unique frequency (FDMA).
► Use a unique time slot (TDMA).
► Use a unique code (CDMA).
Two other variants:
► Orthogonal frequency division multiplexing (OFDM).
► Space division multiple access (SDMA)
Frequency Division Multiple Access (FDMA)
► In the case of frequency division multiple access (FDMA), different Earth stations are able to access the total
available bandwidth in the satellite transponder(s) by virtue of their different carrier frequencies, thus
avoiding interference amongst multiple signals.
► The term should not be confused with frequency division multiplexing (FDM), which is the process of grouping
multiple base band signals into a single signal so that it could be transmitted over a single communication
channel without the multiple base band signals interfering with each other.
► Here, multiple base band signals modulate different carrier frequencies called subcarrier frequencies and the
multiplexed signal then modulates a common relatively higher frequency carrier, which then becomes the
signal to be transmitted from the Earth station.
► Similarly, other stations may also have similar frequency division multiplexed signals with a different final
carrier frequency.
► These multiplexed signals, by virtue of their different final carrier frequencies, are able to access the satellite
simultaneously.
► In this type of multiple access, we assign each signal a different type of frequency band (range). So, any two
signals should not have same type of frequency range. Hence, there won’t be any interference between them,
even if we send those signals in one channel.
► One perfect example of this type of access is our radio channels. We can see that each station has been
given a different frequency band in order to operate.
Time Division Multiple Access (TDMA)
► In the case of time division multiple access (TDMA), different Earth stations in the satellite’s footprint make use of the transponder by
using a single carrier on a time division basis. Again it should not be confused with time division multiplexing (TDM), which is the
technique used at a given Earth station to simultaneously transmit digitized versions of multiple base band signals over a common
communication channel by virtue of their separation on the timescale. The composite time multiplexed signal modulates a high
frequency carrier using any of the digital carrier modulation techniques. Multiple time multiplexed signals from other stations having the
same carrier frequency are then able to access the satellite by allowing each station to transmit during its allotted time slot.
► As the name suggests, TDMA is a time based access. Here, we give certain time frame to each channel. Within that time frame, the
channel can access the entire spectrum bandwidth.
► Each station got a fixed length or slot. The slots, which are unused will remain in idle stage.
► Suppose, we want to send five packets of data to a particular channel in TDMA technique. So, we should assign them certain time slots
or time frame within which it can access the entire bandwidth.
► In above figure, packets 1, 3 and 4 are active, which transmits data. Whereas, packets 2 and 5 are idle because of their non-
participation. This format gets repeated every time we assign bandwidth to that particular channel.
► Although, we have assigned certain time slots to a particular channel but it can also be changed depending upon the load bearing
capacity. That means, if a channel is transmitting heavier loads, then it can be assigned a bigger time slot than the channel which is
transmitting lighter loads. This is the biggest advantage of TDMA over FDMA. Another advantage of TDMA is that the power
consumption will be very low.
► As outlined earlier, time division multiple access (TDMA) is a technique in which different Earth stations in the satellite footprint
having a common satellite transponder use a single carrier on a time division basis.
► Different Earth stations transmit traffic bursts in a period time-frame called the TDMA frame.
► Over the length of a burst, each Earth station has the entire transponder
bandwidth at its disposal.
► The traffic bursts from different Earth stations are synchronized so that all bursts arriving at the transponder are closely
spaced but do not overlap.
► The transponder works on a single burst at a time and retransmits back to Earth a sequence of bursts.
► All Earth stations can receive the entire sequence and extract the signal of their
interest. Figure 6.5 illustrates the basic concept of TDMA.
► The disadvantages of TDMA include a requirement for complex and expensive Earth station equipment and stringent timing
and synchronization requirements.
► TDMA is suitable for digital transmission only.
► In preassigned TDMA systems, every Earth station is allotted a specific time slot.
► In a demand assigned TDMA system, the time slots are allotted to the Earth stations on request from the control station.
► In satellite switched TDMA systems, several antenna spot beams are utilized to provide services to different regions on the
Earths surface.
► Limited preassigned TDMA is a technique that allows the traffic to be handled during busy hours by demand.
Reference Burst
► The reference burst is usually a combination of two reference bursts (RB-1 and RB-2).
► The primary reference burst, which can be either RB-1 or RB-2, is transmitted by one of the stations, called the primary
reference station, in the network.
► The secondary reference burst, which is RB-1 if the primary reference burst is RB-2 and RB-2 if the primary reference burst is
RB-1, is transmitted by another station, called the secondary reference station, in the network.
► The reference burst automatically switches over to the secondary reference burst in the event of primary reference station’s
failure to provide reference burst to the TDMA network.
► The reference burst does not carry any traffic information and is used to provide timing references to various stations
accessing the TDMA transponder.
Traffic Burst
► Different stations accessing the satellite transponder may transmit one or more traffic bursts per TDMA frame and position
them anywhere in the frame according to a burst time plan that coordinates traffic between various stations.
► The timing reference for the location of the traffic burst is taken from the time of occurrence of the primary reference burst.
► With this reference, a station can locate and then extract the traffic burst or portions of traffic bursts intended for it.
► The reference burst also provides timing references to the stations for transmitting their traffic bursts so as to ensure that they
arrive at the satellite transponder within their designated positions in the TDMA frame.
Guard Time
► Different bursts are separated from each other by a short guard time, which ensures that the bursts from different stations
accessing the satellite transponder do not overlap.
► This guard time should be long enough to allow for differences in transmit timing inaccuracies and also for differences in range
rate variations of the satellite.
Code Division Multiple Access (CDMA)
► In the case of code division multiple access (CDMA), the entire bandwidth of the transponder is used
simultaneously by multiple Earth stations at all times. Each transmitter spreads its signal over the entire
bandwidth, which is much wider than that required by the signal otherwise. One of the ways of doing this is by
multiplying the information signal by a pseudorandom bit sequence. Interference is avoided as each transmitter
uses a unique code sequence. Receiving stations recover the desired information by using a matched decoder
that works on the same unique code sequence used during transmission.
► In CDMA technique, a unique code has been assigned to each channel to distinguish from each other. A
perfect example of this type of multiple access is our cellular system. We can see that no two persons’ mobile
number match with each other although they are same X or Y mobile service providing company’s customers
using the same bandwidth.
► In CDMA process, we do the decoding of inner product of the encoded signal and chipping sequence. Therefore,
mathematically it can be written as
► The basic advantage of this type of multiple access is that it allows all users to coexist and use the entire
bandwidth at the same time. Since each user has different code, there won’t be any interference.
► In this technique, a number of stations can have number of channels unlike FDMA and TDMA. The best part of
this technique is that each station can use the entire spectrum at all time.
Space Division Multiple Access (SDMA)
► Space domain multiple access (SDMA) uses spatial separation where different antenna beam polarizations can be used to avoid interference
between multiple transmissions. Beams with horizontal and vertical or right-hand circular and left- hand circular polarizations may be used for
the purpose. Use of the SDMA technique on board a single satellite platform to cover the same Earth surface area with multiple beams having
different polarizations allows for frequency re- use. In the overall satellite link, SDMA is usually achieved in conjunction with other types of
multiple access techniques such as FDMA, TDMA and CDMA.
► Omni-directional communication space is divided into spatially separable sectors.
► BS uses smart antennas, allowing multiple MSs to use the same channel simultaneously.
► The communication characterized by either time slot, carrier frequency or
spreading code can be used.
► Use of smart antenna maximizes the antenna gain in the desired direction and directing antenna gain in particular direction leads to range
extension, which reduces the number of cells required to cover a given area.
► Focused transmission (spot beams) reduces the interference from undesired directions by placing minimum radiation patterns in the direction of
interferers.
► Spot beams enhance the quality of the communication link significantly and
increase overall system capacity.
Comparison of Multiple Access Methods

More Related Content

Similar to Yogendra Singh_16_TA2.pptx

scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxAnishkumar343890
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...IJTET Journal
 
Multiplexing and spreading
Multiplexing and spreadingMultiplexing and spreading
Multiplexing and spreadingShankar Gangaju
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
UNIT III_DCN.pdf
UNIT III_DCN.pdfUNIT III_DCN.pdf
UNIT III_DCN.pdfBhuvanaR13
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfianeroman
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...Bharat Bhushan
 
Lecture 07
Lecture 07Lecture 07
Lecture 07Chyon Ju
 
Introduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptxIntroduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptxnamrata110808
 
Unit 3 CND_Physical Layer_Multiplexing_Pranoti Doke
Unit 3  CND_Physical Layer_Multiplexing_Pranoti DokeUnit 3  CND_Physical Layer_Multiplexing_Pranoti Doke
Unit 3 CND_Physical Layer_Multiplexing_Pranoti DokePranoti Doke
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.pptshloksharma1315
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesBibhu Prasad
 
Multiplexing FDM and TDM
Multiplexing FDM and TDMMultiplexing FDM and TDM
Multiplexing FDM and TDMaliahmadfarooq
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access proceduresabishajesus
 

Similar to Yogendra Singh_16_TA2.pptx (20)

scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...
 
Multiplexing and spreading
Multiplexing and spreadingMultiplexing and spreading
Multiplexing and spreading
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
UNIT III_DCN.pdf
UNIT III_DCN.pdfUNIT III_DCN.pdf
UNIT III_DCN.pdf
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
 
satellite communication- UNIT-III.pptx
satellite communication- UNIT-III.pptxsatellite communication- UNIT-III.pptx
satellite communication- UNIT-III.pptx
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Introduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptxIntroduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptx
 
Unit 3 CND_Physical Layer_Multiplexing_Pranoti Doke
Unit 3  CND_Physical Layer_Multiplexing_Pranoti DokeUnit 3  CND_Physical Layer_Multiplexing_Pranoti Doke
Unit 3 CND_Physical Layer_Multiplexing_Pranoti Doke
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.ppt
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
three
threethree
three
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Multiplexing FDM and TDM
Multiplexing FDM and TDMMultiplexing FDM and TDM
Multiplexing FDM and TDM
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Yogendra Singh_16_TA2.pptx

  • 1. Multiple Access Techniques Submitted by: Yogendra Singh Roll no. : 202010101150016 Course: B Tech. CS(DS +AI)
  • 2. Multiple access means access to a given facility or a resource by multiple users. In the context of satellite communication, the facility is the transponder and the multiple users are various terrestrial terminals under the footprint of the satellite. The transponder provides the communication channel(s) that receives the signals beamed at it via the uplink and then retransmits the same back to Earth for intended users via the downlink. Multiple users are geographically dispersed and certain specific techniques, to be discussed in this chapter, are used to allow them a simultaneous access to the satellite’s transponder. The text matter is suitably illustrated with the help of a large number of problems. What is Multiple Access? ► Multiple access is a technique whereby a variable number of users can access a common resource for the purpose of communications. ► Multiple access is employed in most wireless systems, particularly in satellite systems and cellular systems. ► Objective is to achieve higher capacity through sharing of the limited radio spectrum while optimizing the system performance. ► Similar to multiplexing in a wire-line system. Multiple Access
  • 3. Introduction to Multiple Access Techniques Commonly used multiple access techniques include the following: 1. Frequency division multiple access (FDMA) 2. Time division multiple access (TDMA) 3. Code division multiple access (CDMA) 4. Space domain multiple access (SDMA) Three primary methods: ► Use a unique frequency (FDMA). ► Use a unique time slot (TDMA). ► Use a unique code (CDMA). Two other variants: ► Orthogonal frequency division multiplexing (OFDM). ► Space division multiple access (SDMA)
  • 4. Frequency Division Multiple Access (FDMA) ► In the case of frequency division multiple access (FDMA), different Earth stations are able to access the total available bandwidth in the satellite transponder(s) by virtue of their different carrier frequencies, thus avoiding interference amongst multiple signals. ► The term should not be confused with frequency division multiplexing (FDM), which is the process of grouping multiple base band signals into a single signal so that it could be transmitted over a single communication channel without the multiple base band signals interfering with each other. ► Here, multiple base band signals modulate different carrier frequencies called subcarrier frequencies and the multiplexed signal then modulates a common relatively higher frequency carrier, which then becomes the signal to be transmitted from the Earth station. ► Similarly, other stations may also have similar frequency division multiplexed signals with a different final carrier frequency. ► These multiplexed signals, by virtue of their different final carrier frequencies, are able to access the satellite simultaneously. ► In this type of multiple access, we assign each signal a different type of frequency band (range). So, any two signals should not have same type of frequency range. Hence, there won’t be any interference between them, even if we send those signals in one channel. ► One perfect example of this type of access is our radio channels. We can see that each station has been given a different frequency band in order to operate.
  • 5. Time Division Multiple Access (TDMA) ► In the case of time division multiple access (TDMA), different Earth stations in the satellite’s footprint make use of the transponder by using a single carrier on a time division basis. Again it should not be confused with time division multiplexing (TDM), which is the technique used at a given Earth station to simultaneously transmit digitized versions of multiple base band signals over a common communication channel by virtue of their separation on the timescale. The composite time multiplexed signal modulates a high frequency carrier using any of the digital carrier modulation techniques. Multiple time multiplexed signals from other stations having the same carrier frequency are then able to access the satellite by allowing each station to transmit during its allotted time slot. ► As the name suggests, TDMA is a time based access. Here, we give certain time frame to each channel. Within that time frame, the channel can access the entire spectrum bandwidth. ► Each station got a fixed length or slot. The slots, which are unused will remain in idle stage. ► Suppose, we want to send five packets of data to a particular channel in TDMA technique. So, we should assign them certain time slots or time frame within which it can access the entire bandwidth. ► In above figure, packets 1, 3 and 4 are active, which transmits data. Whereas, packets 2 and 5 are idle because of their non- participation. This format gets repeated every time we assign bandwidth to that particular channel. ► Although, we have assigned certain time slots to a particular channel but it can also be changed depending upon the load bearing capacity. That means, if a channel is transmitting heavier loads, then it can be assigned a bigger time slot than the channel which is transmitting lighter loads. This is the biggest advantage of TDMA over FDMA. Another advantage of TDMA is that the power consumption will be very low.
  • 6. ► As outlined earlier, time division multiple access (TDMA) is a technique in which different Earth stations in the satellite footprint having a common satellite transponder use a single carrier on a time division basis. ► Different Earth stations transmit traffic bursts in a period time-frame called the TDMA frame. ► Over the length of a burst, each Earth station has the entire transponder bandwidth at its disposal. ► The traffic bursts from different Earth stations are synchronized so that all bursts arriving at the transponder are closely spaced but do not overlap. ► The transponder works on a single burst at a time and retransmits back to Earth a sequence of bursts. ► All Earth stations can receive the entire sequence and extract the signal of their interest. Figure 6.5 illustrates the basic concept of TDMA. ► The disadvantages of TDMA include a requirement for complex and expensive Earth station equipment and stringent timing and synchronization requirements. ► TDMA is suitable for digital transmission only. ► In preassigned TDMA systems, every Earth station is allotted a specific time slot. ► In a demand assigned TDMA system, the time slots are allotted to the Earth stations on request from the control station. ► In satellite switched TDMA systems, several antenna spot beams are utilized to provide services to different regions on the Earths surface. ► Limited preassigned TDMA is a technique that allows the traffic to be handled during busy hours by demand.
  • 7. Reference Burst ► The reference burst is usually a combination of two reference bursts (RB-1 and RB-2). ► The primary reference burst, which can be either RB-1 or RB-2, is transmitted by one of the stations, called the primary reference station, in the network. ► The secondary reference burst, which is RB-1 if the primary reference burst is RB-2 and RB-2 if the primary reference burst is RB-1, is transmitted by another station, called the secondary reference station, in the network. ► The reference burst automatically switches over to the secondary reference burst in the event of primary reference station’s failure to provide reference burst to the TDMA network. ► The reference burst does not carry any traffic information and is used to provide timing references to various stations accessing the TDMA transponder. Traffic Burst ► Different stations accessing the satellite transponder may transmit one or more traffic bursts per TDMA frame and position them anywhere in the frame according to a burst time plan that coordinates traffic between various stations. ► The timing reference for the location of the traffic burst is taken from the time of occurrence of the primary reference burst. ► With this reference, a station can locate and then extract the traffic burst or portions of traffic bursts intended for it. ► The reference burst also provides timing references to the stations for transmitting their traffic bursts so as to ensure that they arrive at the satellite transponder within their designated positions in the TDMA frame. Guard Time ► Different bursts are separated from each other by a short guard time, which ensures that the bursts from different stations accessing the satellite transponder do not overlap. ► This guard time should be long enough to allow for differences in transmit timing inaccuracies and also for differences in range rate variations of the satellite.
  • 8. Code Division Multiple Access (CDMA) ► In the case of code division multiple access (CDMA), the entire bandwidth of the transponder is used simultaneously by multiple Earth stations at all times. Each transmitter spreads its signal over the entire bandwidth, which is much wider than that required by the signal otherwise. One of the ways of doing this is by multiplying the information signal by a pseudorandom bit sequence. Interference is avoided as each transmitter uses a unique code sequence. Receiving stations recover the desired information by using a matched decoder that works on the same unique code sequence used during transmission. ► In CDMA technique, a unique code has been assigned to each channel to distinguish from each other. A perfect example of this type of multiple access is our cellular system. We can see that no two persons’ mobile number match with each other although they are same X or Y mobile service providing company’s customers using the same bandwidth. ► In CDMA process, we do the decoding of inner product of the encoded signal and chipping sequence. Therefore, mathematically it can be written as ► The basic advantage of this type of multiple access is that it allows all users to coexist and use the entire bandwidth at the same time. Since each user has different code, there won’t be any interference. ► In this technique, a number of stations can have number of channels unlike FDMA and TDMA. The best part of this technique is that each station can use the entire spectrum at all time.
  • 9. Space Division Multiple Access (SDMA) ► Space domain multiple access (SDMA) uses spatial separation where different antenna beam polarizations can be used to avoid interference between multiple transmissions. Beams with horizontal and vertical or right-hand circular and left- hand circular polarizations may be used for the purpose. Use of the SDMA technique on board a single satellite platform to cover the same Earth surface area with multiple beams having different polarizations allows for frequency re- use. In the overall satellite link, SDMA is usually achieved in conjunction with other types of multiple access techniques such as FDMA, TDMA and CDMA. ► Omni-directional communication space is divided into spatially separable sectors. ► BS uses smart antennas, allowing multiple MSs to use the same channel simultaneously. ► The communication characterized by either time slot, carrier frequency or spreading code can be used. ► Use of smart antenna maximizes the antenna gain in the desired direction and directing antenna gain in particular direction leads to range extension, which reduces the number of cells required to cover a given area. ► Focused transmission (spot beams) reduces the interference from undesired directions by placing minimum radiation patterns in the direction of interferers. ► Spot beams enhance the quality of the communication link significantly and increase overall system capacity.
  • 10. Comparison of Multiple Access Methods