SlideShare a Scribd company logo
TIME
DIVISION
MULTIPLE
ACCESS
Lecture Videos are available for this slides
at
www.youtube.com/gurukula
Support by Subscribing to my
Channel
Frequency Division Multiple Access - FDMA
USER 1
USER 3
USER 2
GUARD BANDS
To avoid interference
Time Division Multiple Access - TDMA
USER 1
USER 3
USER 2
Time Division Multiple Access - TDMA
TDMA divides the entire radio spectrum in to time slots, and in each slot only one user
is allowed to either transmit or receive.
Each user occupies a cyclically repeating time slot
TDMA System transmits data in Buffer and Burst method, This makes the
transmission a discontinuous one.
Hence this makes the TDMA Systems more suitable for Digital Systems.
Systems use TDMA/TDD or TDMA/FDD methods for Duplexing and Multiple
Accessing.
In TDMA/TDD – The Single Frame will be used as forward link for half of the
duration and as reverse link on another half period.
In TDMA/FDD – 2 Different Frames will be used for Forward and Reverse Link
but the carrier frequency will be different.
Understanding TDMA Frame Structure
Time Division Multiple Access - TDMA
 Preamble:
 Consists of Address and
Synchronisation bits which is
used by base stations
subscribers to identify each
others.
 Information Message:
 Contains multiple slots of user
information
 Each slot will have
 Trail Bits
 Sync Bits
 Information
 Guard Bits
 Trail Bits
Features of TDMA
1.In case of TDMA a single carrier frequency is shared among several users. The time
slots used by the users depends on several factors such as modulation techniques and
the available bandwidth.
2.The Handoff process is much simpler in the case of TDMA because of its discontinuity
and it is able to listen to the other base stations during its idle slot time.
3.The Transmission rates are very high in the case of TDMA as compared to the FDMA
because of the Adaptive Equalization which is necessary in the case of TDMA.
4.The guard time present in the case of TDMA should be minimum.
5.The main advantage of TDMA is that it is very cost-effective.
6.TDMA technology is used to separate users in time and ensure that there will not be
any interference which is presented from any other simultaneous transmissions.
Efficiency in TDMA
• Calculation of Efficiency becomes trivial as TDMA uses high Overhead than
compared to FDMA.
• The efficiency of TDMA System is a measure of the percentage of transmitted
data that contains information as opposed to providing overhead for the scheme.
Frame Efficiency (η 𝑓
) is calculated by
η 𝑓 = 1 −
𝑏 𝑂𝐻
𝑏 𝑇
X 100%
𝑏 𝑂𝐻 = Nr Br + Nt Bp + Nt Bg + Nr Bg
Nr – Number of reference burst per frame
Br – Number of overhead bits per reference burst
Nt – Number of Traffic Burst per Frame
Bp – Number of Overhead bits per Preamble in each slot
Bg – Number of Equalent bits in each guard time interval
𝑏 𝑇 = Tf R
Tf – Frame Duration
R – Channel Bit Rate
𝑏 𝑂𝐻 - Number of overhead bits per frame
𝑏𝑇 – Total Number of Bits per Frame
Number of Channels in TDMA Systems
• The number of TDMA Channels slots that can be provided in a TDMA system is
found by multiplying the number of TDMA slots per channel by the number of
channels available.
𝑵 =
𝒎(𝑩 𝒕𝒐𝒕 − 𝟐𝑩 𝒈𝒖𝒂𝒓𝒅)
𝑩 𝒄
m – maximum number of TDMA users supported in channel
It is also important to note that the 2 Guard Bands , one at the lower end and other
at the higher end of the allotted frequency are required to ensure the users at the
edge do not “bleed over” into an adjacent radio channels
Summary
• Recap of FDMA
• Concepts and Working of TDMA
• Frame Structure of TDMA
• Features of TDMA
• Efficiency of TDMA Systems
• Capacity of TDMA Systems
***---***

More Related Content

What's hot

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
3. free space path loss model part 1
3. free space path loss model   part 13. free space path loss model   part 1
3. free space path loss model part 1
JAIGANESH SEKAR
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
ZunAib Ali
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
RAVIKIRAN ANANDE
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
Shuvangkar Dhar
 
Mimo
MimoMimo
Mimo
Virak Sou
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
JAIGANESH SEKAR
 
Two cavity klystron
Two cavity klystronTwo cavity klystron
Two cavity klystron
abhikalmegh
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
AJAL A J
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channels
JAIGANESH SEKAR
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
Rajan Kumar
 
FDMA & TDMA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
MD. ABU TALHA
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
JAIGANESH SEKAR
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
AJAL A J
 
Handoff
HandoffHandoff
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
Sahar Foroughi
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
CKSunith1
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
RCC Institute of Information Technology
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
AJAL A J
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
asadkhan1327
 

What's hot (20)

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
3. free space path loss model part 1
3. free space path loss model   part 13. free space path loss model   part 1
3. free space path loss model part 1
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Mimo
MimoMimo
Mimo
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
 
Two cavity klystron
Two cavity klystronTwo cavity klystron
Two cavity klystron
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channels
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
FDMA & TDMA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Handoff
HandoffHandoff
Handoff
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 

Similar to 2.3 time division multiple access

v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
Sambasiva62
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
Ritika Khanna
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 
3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx
ShashankMishra393695
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
ArunangshuChetia1
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
Dileep Kadavarath
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
multiple access for wireless mobile communications
multiple access for wireless mobile communicationsmultiple access for wireless mobile communications
multiple access for wireless mobile communications
METHODIST COLLEGE OF ENGG & TECH
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
Kaushal Kabra
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
Bharat Bhushan
 
schaeffner.ppt
schaeffner.pptschaeffner.ppt
schaeffner.ppt
Anuradha Shukla
 
Multiplexing and Multiple access
Multiplexing and Multiple accessMultiplexing and Multiple access
Multiplexing and Multiple access
Dr. Ghanshyam Singh
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptx
SaemaAzim
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
NAVAMISURESH2
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
simranbisti
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
MalshaniPrabodhika
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
vish0110
 
Chapter 3 mobile on 18-11-2019.pptx
Chapter 3 mobile on 18-11-2019.pptxChapter 3 mobile on 18-11-2019.pptx
Chapter 3 mobile on 18-11-2019.pptx
EiduAhmed
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx

Similar to 2.3 time division multiple access (20)

v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
multiple access for wireless mobile communications
multiple access for wireless mobile communicationsmultiple access for wireless mobile communications
multiple access for wireless mobile communications
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
 
schaeffner.ppt
schaeffner.pptschaeffner.ppt
schaeffner.ppt
 
Multiplexing and Multiple access
Multiplexing and Multiple accessMultiplexing and Multiple access
Multiplexing and Multiple access
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptx
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
Chapter 3 mobile on 18-11-2019.pptx
Chapter 3 mobile on 18-11-2019.pptxChapter 3 mobile on 18-11-2019.pptx
Chapter 3 mobile on 18-11-2019.pptx
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Recently uploaded

Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
VanTuDuong1
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
Abdullah Al Noman
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 

Recently uploaded (20)

Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 

2.3 time division multiple access

  • 2. Lecture Videos are available for this slides at www.youtube.com/gurukula Support by Subscribing to my Channel
  • 3. Frequency Division Multiple Access - FDMA USER 1 USER 3 USER 2 GUARD BANDS To avoid interference
  • 4. Time Division Multiple Access - TDMA USER 1 USER 3 USER 2
  • 5. Time Division Multiple Access - TDMA TDMA divides the entire radio spectrum in to time slots, and in each slot only one user is allowed to either transmit or receive. Each user occupies a cyclically repeating time slot TDMA System transmits data in Buffer and Burst method, This makes the transmission a discontinuous one. Hence this makes the TDMA Systems more suitable for Digital Systems. Systems use TDMA/TDD or TDMA/FDD methods for Duplexing and Multiple Accessing. In TDMA/TDD – The Single Frame will be used as forward link for half of the duration and as reverse link on another half period. In TDMA/FDD – 2 Different Frames will be used for Forward and Reverse Link but the carrier frequency will be different.
  • 7. Time Division Multiple Access - TDMA  Preamble:  Consists of Address and Synchronisation bits which is used by base stations subscribers to identify each others.  Information Message:  Contains multiple slots of user information  Each slot will have  Trail Bits  Sync Bits  Information  Guard Bits  Trail Bits
  • 8. Features of TDMA 1.In case of TDMA a single carrier frequency is shared among several users. The time slots used by the users depends on several factors such as modulation techniques and the available bandwidth. 2.The Handoff process is much simpler in the case of TDMA because of its discontinuity and it is able to listen to the other base stations during its idle slot time. 3.The Transmission rates are very high in the case of TDMA as compared to the FDMA because of the Adaptive Equalization which is necessary in the case of TDMA. 4.The guard time present in the case of TDMA should be minimum. 5.The main advantage of TDMA is that it is very cost-effective. 6.TDMA technology is used to separate users in time and ensure that there will not be any interference which is presented from any other simultaneous transmissions.
  • 9. Efficiency in TDMA • Calculation of Efficiency becomes trivial as TDMA uses high Overhead than compared to FDMA. • The efficiency of TDMA System is a measure of the percentage of transmitted data that contains information as opposed to providing overhead for the scheme. Frame Efficiency (η 𝑓 ) is calculated by η 𝑓 = 1 − 𝑏 𝑂𝐻 𝑏 𝑇 X 100% 𝑏 𝑂𝐻 = Nr Br + Nt Bp + Nt Bg + Nr Bg Nr – Number of reference burst per frame Br – Number of overhead bits per reference burst Nt – Number of Traffic Burst per Frame Bp – Number of Overhead bits per Preamble in each slot Bg – Number of Equalent bits in each guard time interval 𝑏 𝑇 = Tf R Tf – Frame Duration R – Channel Bit Rate 𝑏 𝑂𝐻 - Number of overhead bits per frame 𝑏𝑇 – Total Number of Bits per Frame
  • 10. Number of Channels in TDMA Systems • The number of TDMA Channels slots that can be provided in a TDMA system is found by multiplying the number of TDMA slots per channel by the number of channels available. 𝑵 = 𝒎(𝑩 𝒕𝒐𝒕 − 𝟐𝑩 𝒈𝒖𝒂𝒓𝒅) 𝑩 𝒄 m – maximum number of TDMA users supported in channel It is also important to note that the 2 Guard Bands , one at the lower end and other at the higher end of the allotted frequency are required to ensure the users at the edge do not “bleed over” into an adjacent radio channels
  • 11. Summary • Recap of FDMA • Concepts and Working of TDMA • Frame Structure of TDMA • Features of TDMA • Efficiency of TDMA Systems • Capacity of TDMA Systems ***---***