SlideShare a Scribd company logo
Code Division Multiple Access Eng. MshariAlabdulkarim
Code Division Multiple Access Outline: ,[object Object]
Spread Spectrum Methods.
Technologies based on CDMA.
Performance analysis of IEEE 802.11 protocol.
Major Development in CDMA.,[object Object]
Code Division Multiple Access Introduction (Cont.): How does it support more than one group in the same channel? It allows multiple groups to share the same channel at the same time by assigning each group to different code. CDMA Modulation Steps: Generate a local pseudo-random code with a higher rate than the data to be transmitted. XOR the data which need to be transmitted with the generated code.
Code Division Multiple Access Introduction (Cont.): Data Signal Pseudo-random  Code Transmitted  Signal  Time
Code Division Multiple Access Introduction (Cont.): Input  data Output  data Channel  Encoder Modulator Channel  Demodulator Channel  Decoder Pseudo-noise Generator Pseudo-noise Generator General Model of Spread Spectrum Digital Communication System
Code Division Multiple Access Introduction (Cont.): What can we gain from the spreading of the spectrum? ,[object Object]
The immunity from the multipath distortion.
It can be used as an encrypting technique.
Several users can use the same channel with little interference.,[object Object]
It must appear random to a listener who does not have a prior knowledge of the code.
The cross-correlation between any two codes must be small.
The code should have a long period.,[object Object]
The best performance will be when the users’ signals are separated as much as possible.
The separation can be done by correlating the received signal with the local generated code.
If the correlation was high, then we exclude this code and we search for another code with less correlation.,[object Object]
Code Division Multiple Access Spread Spectrum Methods: Direct Sequence Spread Spectrum (DSSS): ,[object Object]
The original data is spread out across a wider frequency band by using the spreading code.
The spreading proportion depends on the number of bits used in the code.,[object Object]
Code Division Multiple Access Spread Spectrum Methods (Cont.): Frequency Hopping Spread Spectrum (FHSS): ,[object Object]
The receiver should use the same hopping pattern simultaneously with the transmitter in order to receive the data correctly.
The spreading code specifies the sequence of channels and the receiver should use the same code to tune into the sequence of channels that are used by the sender.,[object Object]
Code Division Multiple Access Spread Spectrum Methods (Cont.): Chirp Spread Spectrum (CSS): ,[object Object]
It encodes the information by using wideband linear frequency modulated chirp.
It uses the entire allocated bandwidth to broadcast the signal, which helps making it robust to channel noise.
Also, it is immunized from the multi-path fading, because it utilizes the spectrum broadband.
It finds the noise by relying on the linear nature of the chirp pulse.,[object Object]
It consumes low power due to the very low duty cycles.
In THSS, the pseudo random number determines the sequence of how the burst will be transmitted.,[object Object]
Code Division Multiple Access Technologies based on CDMA: WiFi (IEEE 802.11): 802.11b and 802.11g working in the 2.4 frequency band (Industry, Science and Medicine band or ISM). DSSS and FHSS physical layer options have been designed specifically to overcome the interfering with other devices in this band.
Code Division Multiple Access 22 MHz Channel 6 2.4370 Channel 11 2.4620 Channel 1 2.4120 2.4000 GHz 2.4835 GHz Three Non-Overlapping DSSS Channels in the ISM Band
Code Division Multiple Access
Code Division Multiple Access Technologies based on CDMA (Cont.): Bluetooth: ,[object Object]
It uses Frequency Hoping Spread Spectrum (FHSS) to make it rare for more than one device to transmit on the same time using the same frequency and to avoid any interference.

More Related Content

What's hot

Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
Noushad Hasan
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Soumen Santra
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements
Siva Ganesan
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
Ayushi Gagneja
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Modulation Techniques for Mobile Radio
Modulation Techniques for Mobile RadioModulation Techniques for Mobile Radio
Modulation Techniques for Mobile Radio
METHODIST COLLEGE OF ENGG & TECH
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
RAVIKIRAN ANANDE
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)asadkhan1327
 
OFDM
OFDMOFDM
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
Priya Kaushal
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 

What's hot (20)

Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
Gmsk
GmskGmsk
Gmsk
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Modulation Techniques for Mobile Radio
Modulation Techniques for Mobile RadioModulation Techniques for Mobile Radio
Modulation Techniques for Mobile Radio
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
 
OFDM
OFDMOFDM
OFDM
 
WCDMA
WCDMAWCDMA
WCDMA
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 

Viewers also liked

Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
mangal das
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
bsnlpandian
 
Cdma system
Cdma systemCdma system
Cdma system
trimba
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
ViVek Patel
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
 
Presentation1
Presentation1Presentation1
Presentation1
tapubhai
 
Interferences
InterferencesInterferences
Interferences
AJAL A J
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Point to point.48
Point to point.48Point to point.48
Point to point.48myrajendra
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation finalAmit Gaikwad
 
Antenna types
Antenna typesAntenna types
Antenna types
youssef ramzy
 
Antenna basics
Antenna basicsAntenna basics
Antenna basicsjpratt59
 
Gsm
GsmGsm
CDMA
CDMACDMA
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagation
Isha Negi
 
Point to point microwave
Point to point microwavePoint to point microwave
Point to point microwave
nandkishorsuman
 

Viewers also liked (19)

Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma system
Cdma systemCdma system
Cdma system
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Presentation1
Presentation1Presentation1
Presentation1
 
Interferences
InterferencesInterferences
Interferences
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
Antenna types
Antenna typesAntenna types
Antenna types
 
Antenna basics
Antenna basicsAntenna basics
Antenna basics
 
Introduction to mapinfo
Introduction to mapinfoIntroduction to mapinfo
Introduction to mapinfo
 
Gsm
GsmGsm
Gsm
 
CDMA
CDMACDMA
CDMA
 
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagation
 
Point to point microwave
Point to point microwavePoint to point microwave
Point to point microwave
 
Microwave Antenna
Microwave AntennaMicrowave Antenna
Microwave Antenna
 

Similar to CDMA

Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
Chyon Ju
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd Iaetsd
 
Spread spectrum
Spread spectrumSpread spectrum
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
IOSR Journals
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
Siva Cool
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
Editor IJCATR
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
AbyThomas54
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
AbyThomas54
 
Relay lte
Relay lteRelay lte
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
Chaitanya Tata, PMP
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sridhar Baithi
 
Pulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMAPulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMA
Bhagwat Singh Rathore
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
akritigallery
 
802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overviewsureshkumarmss
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
IJNSA Journal
 

Similar to CDMA (20)

Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
Wcdma
WcdmaWcdma
Wcdma
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
Relay lte
Relay lteRelay lte
Relay lte
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Pulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMAPulse Shaping FIR Filter for WCDMA
Pulse Shaping FIR Filter for WCDMA
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
802.11 technology overview
802.11 technology overview802.11 technology overview
802.11 technology overview
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
 

More from Mshari Alabdulkarim

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbersMshari Alabdulkarim
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Mshari Alabdulkarim
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 

More from Mshari Alabdulkarim (6)

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
 
WPA2
WPA2WPA2
WPA2
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

CDMA

  • 1. Code Division Multiple Access Eng. MshariAlabdulkarim
  • 2.
  • 5. Performance analysis of IEEE 802.11 protocol.
  • 6.
  • 7. Code Division Multiple Access Introduction (Cont.): How does it support more than one group in the same channel? It allows multiple groups to share the same channel at the same time by assigning each group to different code. CDMA Modulation Steps: Generate a local pseudo-random code with a higher rate than the data to be transmitted. XOR the data which need to be transmitted with the generated code.
  • 8. Code Division Multiple Access Introduction (Cont.): Data Signal Pseudo-random Code Transmitted Signal Time
  • 9. Code Division Multiple Access Introduction (Cont.): Input data Output data Channel Encoder Modulator Channel Demodulator Channel Decoder Pseudo-noise Generator Pseudo-noise Generator General Model of Spread Spectrum Digital Communication System
  • 10.
  • 11. The immunity from the multipath distortion.
  • 12. It can be used as an encrypting technique.
  • 13.
  • 14. It must appear random to a listener who does not have a prior knowledge of the code.
  • 15. The cross-correlation between any two codes must be small.
  • 16.
  • 17. The best performance will be when the users’ signals are separated as much as possible.
  • 18. The separation can be done by correlating the received signal with the local generated code.
  • 19.
  • 20.
  • 21. The original data is spread out across a wider frequency band by using the spreading code.
  • 22.
  • 23.
  • 24. The receiver should use the same hopping pattern simultaneously with the transmitter in order to receive the data correctly.
  • 25.
  • 26.
  • 27. It encodes the information by using wideband linear frequency modulated chirp.
  • 28. It uses the entire allocated bandwidth to broadcast the signal, which helps making it robust to channel noise.
  • 29. Also, it is immunized from the multi-path fading, because it utilizes the spectrum broadband.
  • 30.
  • 31. It consumes low power due to the very low duty cycles.
  • 32.
  • 33. Code Division Multiple Access Technologies based on CDMA: WiFi (IEEE 802.11): 802.11b and 802.11g working in the 2.4 frequency band (Industry, Science and Medicine band or ISM). DSSS and FHSS physical layer options have been designed specifically to overcome the interfering with other devices in this band.
  • 34. Code Division Multiple Access 22 MHz Channel 6 2.4370 Channel 11 2.4620 Channel 1 2.4120 2.4000 GHz 2.4835 GHz Three Non-Overlapping DSSS Channels in the ISM Band
  • 36.
  • 37. It uses Frequency Hoping Spread Spectrum (FHSS) to make it rare for more than one device to transmit on the same time using the same frequency and to avoid any interference.
  • 38.
  • 39.
  • 40.
  • 41. The satellite carrier frequencies are modulated using the ranging signal which is PRN code which is different between satellites.
  • 42. The receiver uses the satellite PRN code to reconstruct the actual message data.
  • 43.
  • 44. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol: There are several assumptions have been considered in presenting this analytical framework: The effect of bit errors introduced by channel noise has been ignored. The only considered errors are the one which caused by collisions due to other simultaneous transmissions. There are no hidden stations. The propagation delays are not considered. There are n stations in the network.
  • 45. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): Every station always has a packet to send (saturated conditions). The collision probability of a transmitted frame is constant and independent of the number of retransmissions that this frame has experienced in the past. RTS/CTS access mechanism.
  • 46. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The sequence of events in a successful frame transmission using the RTS/CTS access method will be like the following: RTS: Request To Send. SIFS: Short Inter-Frame Space. CTS: Clear To Send. DIFS: Distributed Coordination Function.
  • 47. Code Division Multiple Access t0 DATA RTS Source Destination SIFS CTS SIFS SIFS ACK Other NAV (RTS) DIFS NAV (CTS) NAV (DATA) Defer Access Back-off RTS: Request To Send. SIFS: Short Inter-Frame Space. CTS: Clear To Send. DIFS: Distributed Coordination Function.
  • 48. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): Abbreviations:
  • 49. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): For simplicity, I assumed that the value of τ will be known and we will start by calculating the value of p: Because we have n stations and all of them will transmit with a probability of τ , then the value of will be:
  • 50. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The probability of successful transmission will be equal to the probability that one station is transmitting while the remaining stations stay silent: If is the frame header, the average time delays for RTS/CTS will be:
  • 51. Code Division Multiple Access Performance analysis of IEEE 802.11 protocol (Cont.): The throughput will be equal to the time needed to transmit the payload information divided by the average length of slot time:
  • 52.
  • 53. It supports frequency division (FDD) and inter-cell asynchronous operation.
  • 54. It employs coherent detection on both the uplink and downlink.
  • 55. It has a Variable mission on a 10 ms frame basis.
  • 56. It supports Multi-code transmission.
  • 57.
  • 58. The signals from different users are separated in both time and code domain.
  • 59. It has a frame length of 10 ms and it is divided into 15 time slots.
  • 60. Each slot has duration of 666 micro second and length of 2560 chips.
  • 61.
  • 62. It is better suited for densely populated areas.
  • 63. It uses time-division duplexing (TDD).
  • 64. It can accommodate asymmetric traffic with different data rates on downlink and uplink.
  • 65.