Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Code Division Multiple Access

Published in: Technology


  1. 1. Code Division Multiple Access<br />Eng. MshariAlabdulkarim<br />
  2. 2. Code Division Multiple Access<br />Outline:<br /><ul><li> Introduction.
  3. 3. Spread Spectrum Methods.
  4. 4. Technologies based on CDMA.
  5. 5. Performance analysis of IEEE 802.11 protocol.
  6. 6. Major Development in CDMA.</li></li></ul><li>Code Division Multiple Access<br />Introduction:<br />Code division multiple access (CDMA) is a fixed assignment access technique that uses spread spectrum and a special kind of coding scheme to allow the transmitters to share the media at the same time.<br />Why it is considered as a form of spread spectrum technique?<br />It is considered as a form of the spread-spectrum techniques, because the modulated coded signal has a higher bandwidth than the data being transmitted.<br />
  7. 7. Code Division Multiple Access<br />Introduction (Cont.):<br />How does it support more than one group in the same channel?<br />It allows multiple groups to share the same channel at the same time by assigning each group to different code.<br />CDMA Modulation Steps:<br />Generate a local pseudo-random code with a higher rate than the data to be transmitted.<br />XOR the data which need to be transmitted with the generated code.<br />
  8. 8. Code Division Multiple Access<br />Introduction (Cont.):<br />Data Signal<br />Pseudo-random<br /> Code<br />Transmitted<br /> Signal <br />Time<br />
  9. 9. Code Division Multiple Access<br />Introduction (Cont.):<br />Input<br /> data<br />Output<br /> data<br />Channel <br />Encoder<br />Modulator<br />Channel <br />Demodulator<br />Channel <br />Decoder<br />Pseudo-noise<br />Generator<br />Pseudo-noise<br />Generator<br />General Model of Spread Spectrum Digital Communication System<br />
  10. 10. Code Division Multiple Access<br />Introduction (Cont.):<br />What can we gain from the spreading of the spectrum?<br /><ul><li>The immunity from the various types of noise.
  11. 11. The immunity from the multipath distortion.
  12. 12. It can be used as an encrypting technique.
  13. 13. Several users can use the same channel with little interference.</li></li></ul><li>Code Division Multiple Access<br />Introduction (Cont.):<br />Generating Pseudo-Random Codes:<br />The base station generates a unique pseudo-random code for every connection and these codes should have the following properties:<br /><ul><li>It should be deterministic.
  14. 14. It must appear random to a listener who does not have a prior knowledge of the code.
  15. 15. The cross-correlation between any two codes must be small.
  16. 16. The code should have a long period.</li></li></ul><li>Code Division Multiple Access<br />Introduction (Cont.):<br />Code Correlation:<br /><ul><li>Each user uses different code to modulate his signal.
  17. 17. The best performance will be when the users’ signals are separated as much as possible.
  18. 18. The separation can be done by correlating the received signal with the local generated code.
  19. 19. If the correlation was high, then we exclude this code and we search for another code with less correlation.</li></li></ul><li>Code Division Multiple Access<br />Introduction (Cont.):<br />Correlation Functions:<br />Cross-Correlation: The correlation of two different codes. “Used to separate the transmitters’ signals from each other”.<br />Auto-Correlation: The correlation of a code with a time-delayed version of itself. “Used to reject multipath interference”.<br />
  20. 20. Code Division Multiple Access<br />Spread Spectrum Methods:<br />Direct Sequence Spread Spectrum (DSSS):<br /><ul><li>Each bit from the data which need to be sent is represented by multiple bits in the transmitted data, by using the spreading code.
  21. 21. The original data is spread out across a wider frequency band by using the spreading code.
  22. 22. The spreading proportion depends on the number of bits used in the code.</li></li></ul><li>Code Division Multiple Access<br />Original Data<br />0<br />1<br />1<br />0<br />1<br />Pseudo-random<br /> Bit<br />0<br />1<br />1<br />1<br />1<br />1<br />1<br />1<br />0<br />0<br />0<br />0<br />0<br />0<br />0<br />1<br />1<br />1<br />1<br />1<br />Transmitted<br /> Data <br />1<br />1<br />0<br />1<br />0<br />0<br />0<br />0<br />0<br />0<br />0<br />1<br />1<br />0<br />1<br />1<br />1<br />0<br />0<br />0<br />Time<br />Example of Direct Sequence Spread Spectrum<br />
  23. 23. Code Division Multiple Access<br />Spread Spectrum Methods (Cont.):<br />Frequency Hopping Spread Spectrum (FHSS):<br /><ul><li>At the transmitter, the original signal is broadcasted over a series of radio frequencies, hopping from different frequencies in a fixed pattern.
  24. 24. The receiver should use the same hopping pattern simultaneously with the transmitter in order to receive the data correctly.
  25. 25. The spreading code specifies the sequence of channels and the receiver should use the same code to tune into the sequence of channels that are used by the sender.</li></li></ul><li>Code Division Multiple Access<br />Energy<br />Frequency<br />6<br />7<br />1<br />2<br />3<br />4<br />5<br />8<br />f8<br />2<br />f7<br />6<br />f6<br />4<br />f5<br />1<br />f4<br />7<br />f3<br />3<br />f2<br />8<br />f1<br />5<br />Frequency<br />Time<br />f1<br />f3<br />f4<br />f6<br />f7<br />f2<br />f5<br />f8<br />(a) Channel assignment<br />(b) Channel use<br />Example of Frequency Hoping Spread Spectrum<br />
  26. 26. Code Division Multiple Access<br />Spread Spectrum Methods (Cont.):<br />Chirp Spread Spectrum (CSS):<br /><ul><li>It is the first and simplest application of Multi Dimensional Multiple Access (MDMA) technology.
  27. 27. It encodes the information by using wideband linear frequency modulated chirp.
  28. 28. It uses the entire allocated bandwidth to broadcast the signal, which helps making it robust to channel noise.
  29. 29. Also, it is immunized from the multi-path fading, because it utilizes the spectrum broadband.
  30. 30. It finds the noise by relying on the linear nature of the chirp pulse.</li></li></ul><li>Code Division Multiple Access<br />Spread Spectrum Methods (Cont.):<br />Time Hopped Spread Spectrum (THSS):<br /><ul><li>The period and duty cycle of a pulsed radio frequency carrier are varied pseudo-randomly under the control of coded sequence similar to FHSS.
  31. 31. It consumes low power due to the very low duty cycles.
  32. 32. In THSS, the pseudo random number determines the sequence of how the burst will be transmitted.</li></li></ul><li>Code Division Multiple Access<br />Transmitted time slots (k bits)<br />Frame<br />Time<br />t<br />Time-Hopping Spread Spectrum<br />
  33. 33. Code Division Multiple Access<br />Technologies based on CDMA:<br />WiFi (IEEE 802.11):<br />802.11b and 802.11g working in the 2.4 frequency band (Industry, Science and Medicine band or ISM).<br />DSSS and FHSS physical layer options have been designed specifically to overcome the interfering with other devices in this band.<br />
  34. 34. Code Division Multiple Access<br />22 MHz<br />Channel 6<br />2.4370<br />Channel 11<br />2.4620<br />Channel 1<br />2.4120<br />2.4000<br />GHz<br />2.4835<br />GHz<br />Three Non-Overlapping DSSS Channels in the ISM Band<br />
  35. 35. Code Division Multiple Access<br />
  36. 36. Code Division Multiple Access<br />Technologies based on CDMA (Cont.):<br />Bluetooth:<br /><ul><li>It operates in the unlicensed ISM band and it can connect up to eight devices in the same time.
  37. 37. It uses Frequency Hoping Spread Spectrum (FHSS) to make it rare for more than one device to transmit on the same time using the same frequency and to avoid any interference.
  38. 38. Each device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis.</li></li></ul><li>Code Division Multiple Access<br />Technologies based on CDMA (Cont.):<br />Bluetooth (Cont.):<br /><ul><li>A Bluetooth channel is divided into time slots each has a length of 625 micro second and each channel has a wide of 1MHz.
  39. 39. The devices hop through the timeslots making 1600 hops per second. </li></li></ul><li>Code Division Multiple Access<br />Technologies based on CDMA (Cont.):<br />Global Positioning System (GPS):<br /><ul><li>All GPS satellites broadcast at two frequencies, 1.57542 GHz (L1 signal) and 1.2276 GHz (L2 signal).
  40. 40. The receiver can distinguish the source of the signal by using direct sequence spread spectrum (DSSS) modulation technique where the low-bit rate message data is encoded with a high-rate pseudo-random noise (PRN) sequence.</li></li></ul><li>Code Division Multiple Access<br />Technologies based on CDMA (Cont.):<br />Global Positioning System (GPS) (Cont.):<br /><ul><li>DSSS provides the structure for the transmission of ranging signal and essential data such as satellite co-ordinates and health.
  41. 41. The satellite carrier frequencies are modulated using the ranging signal which is PRN code which is different between satellites.
  42. 42. The receiver uses the satellite PRN code to reconstruct the actual message data.
  43. 43. The data is transmitted at rate of 50 bits per second.</li></li></ul><li>Code Division Multiple Access<br />Technologies based on CDMA (Cont.):<br />Global Positioning System (GPS) (Cont.):<br />There are two types of PRN ranging distinct codes used: <br />The short coarse/acquisition (C/A) code (also called Gold code) at 1.023 million chips per second.<br />The long precise (P) code at 10.23 million chips per second. <br />
  44. 44. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol:<br />There are several assumptions have been considered in presenting this analytical framework:<br />The effect of bit errors introduced by channel noise has been ignored. The only considered errors are the one which caused by collisions due to other simultaneous transmissions.<br />There are no hidden stations.<br />The propagation delays are not considered.<br />There are n stations in the network.<br />
  45. 45. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />Every station always has a packet to send (saturated conditions).<br />The collision probability of a transmitted frame is constant and independent of the number of retransmissions that this frame has experienced in the past.<br />RTS/CTS access mechanism.<br />
  46. 46. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />The sequence of events in a successful frame transmission using the RTS/CTS access method will be like the following:<br />RTS: Request To Send.<br />SIFS: Short Inter-Frame Space.<br />CTS: Clear To Send.<br />DIFS: Distributed Coordination Function.<br />
  47. 47. Code Division Multiple Access<br />t0<br />DATA<br />RTS<br />Source<br />Destination<br />SIFS<br />CTS<br />SIFS<br />SIFS<br />ACK<br />Other<br />NAV (RTS)<br />DIFS<br />NAV (CTS)<br />NAV (DATA)<br />Defer Access<br />Back-off<br />RTS: Request To Send.<br />SIFS: Short Inter-Frame Space.<br />CTS: Clear To Send.<br />DIFS: Distributed Coordination Function.<br />
  48. 48. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />Abbreviations:<br />
  49. 49. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />For simplicity, I assumed that the value of τ will be known and we will start by calculating the value of p:<br />Because we have n stations and all of them will transmit with a probability of τ , then the value of will be:<br />
  50. 50. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />The probability of successful transmission will be equal to the probability that one station is transmitting while the remaining stations stay silent:<br />If is the frame header, the average time delays <br /> for RTS/CTS will be:<br />
  51. 51. Code Division Multiple Access<br />Performance analysis of IEEE 802.11 protocol (Cont.):<br />The throughput will be equal to the time needed to transmit the payload information divided by the average length of slot time:<br />
  52. 52. Code Division Multiple Access<br />Major Development in CDMA:<br /> Wideband Code Division Multiple Access (W-CDMA):<br /><ul><li>It has a radio channel of 5 MHz wide and a chip rate of 3.84 Mcps.
  53. 53. It supports frequency division (FDD) and inter-cell asynchronous operation.
  54. 54. It employs coherent detection on both the uplink and downlink.
  55. 55. It has a Variable mission on a 10 ms frame basis.
  56. 56. It supports Multi-code transmission.
  57. 57. It uses a direct sequence CDMA transmission technique.</li></li></ul><li>Code Division Multiple Access<br />Major Development in CDMA (Cont.):<br />Time-division – CDMA (TD-CDMA):<br /><ul><li>It uses a combined time division and code division multiple access scheme.
  58. 58. The signals from different users are separated in both time and code domain.
  59. 59. It has a frame length of 10 ms and it is divided into 15 time slots.
  60. 60. Each slot has duration of 666 micro second and length of 2560 chips.
  61. 61. It uses Quadrature Phase Shift Keying (QPSK) to modulate the data.</li></li></ul><li>Code Division Multiple Access<br />Major Development in CDMA (Cont.):<br />Time Division Synchronous Code Division Multiple Access (TD-SCDMA):<br /><ul><li>It is an alternative to W-CDMA in the mobile telecommunications networks.
  62. 62. It is better suited for densely populated areas.
  63. 63. It uses time-division duplexing (TDD).
  64. 64. It can accommodate asymmetric traffic with different data rates on downlink and uplink.
  65. 65. It uses both TDMA and CDMA.</li></li></ul><li>Code Division Multiple Access<br />Thank you for listening<br />