SlideShare a Scribd company logo
CDMA & SPREAD
SPECTRUM
COMMUNICATION
PRESENTED BY: PRITISH KUMAWAT(01116414219)
NEDA(00216414219)
VIJAY PAL SINGH(00416414219)
Multiple Access Techniques
Frequency Division Multiple Access (FDMA)
Time Division Multiple Access (TDMA)
Code Division Multiple Access (CDMA)
CDMA
• Each user is assigned a unique PN code.
• Each user transmits its information by spreading with
unique code.
• Direct Sequence spread spectrum is used.
• Users are separated by code not by time slot and frequency
slot.
• Users share same bandwidth
• User axis shows cumulative signal strength of all users
Working of CDMA
CDMA capacity
Factors deciding the CDMA capacity:
• Processing gain
• Signal to noise ratio
• Voice Activity Factor
• Frequency reuse efficiency
Architecture of CDMA
Mobile Station (MS):
Two Blocks
1) Mobile Equipment (ME)
2) Subscribers Identity Module (SIM)
Function of Mobile Station:
1. Personal Mobility
2. IMEI (International Mobile Equipment Identity)
3. IMSI (International Mobile Subscriber Identity)
Base Station Subsystem (BSS)
1) Base Transceiver Station (BTS)
2) Base Station Controller (BSC)
BTS : Base Transceiver station
1. It defines the cell .
2. It handles the radio link protocol with the mobile station
BSC: Base station Controller
1. It manages radio resources for one or more BTS.
2. Allocation and Deallocation of channels.
3. Transmitter power control.
4. Handoff control
Network Subsystem
MSC: Mobile Switching Center
HLR: Home Location Register
VLR: Visitor Location register
AuC: Authentication Centre
EIR: Equipment Identity Register
Network subsystem
Home Location
Register (HLR)
1 One HLR per CDMA
operator
2 Contains permanent
Mobile database of all the
subscribers in the network
3 Contains MSRN(mobile
station routing no.)
4 It is referred for every
incoming call
Mobile Switching
centre:(MSC)
1 Call set
up/supervision/release
2 Call routing
3 Billing information collection
4 Mobility management
5 Paging, Echo cancellation
connection to BSC, other MSC
and other local exchange
networks
6 Access to HLR and VLR
Network Subsystem
Visitor Location Register(VLR)
1. Temporary visitors database
2. One VLR per MSC
Authentication Centre (AuC)
1. Provides security
2. Authentication and encryption
Equipment Identity Register:
1. Contains IMEI
Advantages
• Increased security.
• Soft handoff
• Increased efficiency.
• Extended reach - beneficial to rural users situated
far from cells
• Multipath reception improves voice clarity
Disadvantages
• Time synchronization is required.
• Near far problem.
• CDMA is relatively low, and the network is not
as mature as GSM.
• CDMA can not offer international roaming, a
large GSM advantage
SPREAD SPECTRUM
OUTLINE:
• Basic of spread spectrum
• Need of spread spectrum
• Block diagram
• Working
• significance
4
Introduction of Spread
Spectrum Communications
• Spread Spectrum is a means of transmission in which
the data sequence occupies a bandwidth in excess of the
minimum bandwidth necessary to send it.
Effectively the signal is mapped to a higher dimension signal
space
• Signal spreading is done before transmission by using a
spreading sequence. The same sequence is used at the
receiver to retrieve the signal
• Spread Spectrum is most effective against interference
(intentional or non-intentional) with fixed energy.
• Main commercial applications in wireless and GPS.
r
NEED FOR SPREAD SPECTRUM
• SECURITY
• Safeguards for
physical security must be
even greater in wireless
communications
• Encryption: intercepted
communications must not
be easily interpreted
• Authentication: is the
BLOCK DIGRAM SPREAD
SPECTRUM COMMUNICATION
Spread-spectrum radio communications is a favorite technology of the
military because it resists jamming and is hard for an enemy to intercept, Just
as they are unlikely to be intercepted by a military opponent
How Spread Spectrum Works
• Spread Spectrum uses wide band, noise-like signals. Because
Spread Spectrum signals are noise-like, they are hard to detect.
• Spread Spectrum signals are also hard to Intercept
or demodulate.
• Further, Spread Spectrum signals are harder to jam
(interfere with) than narrowband signals.
• These Low Probability of Intercept (LPI) and anti-jam
(AJ) features are why the military has used Spread Spectrum
for so many years.
.
PN Sequences
• PN generator produces periodic sequence that appears to
be random
• PN Sequences
▫ Generated by an algorithm using initialseed
▫ Sequence isn’t statistically random but will pass many test
of randomness
▫ Sequences referred to as pseudorandom numbers or
pseudonoise sequences
▫ Unless algorithm and seed are known, the sequence is impractical
to predict
Important PN Properties
• Randomness
▫ Uniform distribution
▫ Independence
• Unpredictability
Spreading Codes
• A noise-like and random signal has to be
generated at the transmitter.
• The same signal must be generated at the receiver
in synchronization.
• We limit the complexity by specifying only one bit
per sample, i.e., a binary sequence.
9
• Spread Spectrum signals use fast codes that
run many times the information bandwidth or
data rate.
These special "Spreading" codes are
called "Pseudo Random" or "Pseudo Noise"
codes. They are called "Pseudo" because they
are not real Gaussian noise.
Why Spread Spectrum?
• Spread spectrum signals are distributed over
a wide range of frequencies and then
collected back at the receiver
▫ These wideband signals are noise-like and
hence difficult to detect or interfere with.
• Initially adopted in military applications, for
its resistance to jamming and difficulty
of interception
• More recently, adopted in commercial
wireless communications
SIGNIFICANCE
• Immunity to jamming
• Low interference
• High processing gain
• Easy encryption
• Multiple access
SPREAD SPECTRUM TECHNIQUES
• THE MAJOR SPREAD SPECTRUM
TECHNIQUES ARE
• DSSS
• FHSS
Frequency Hopping Spread Spectrum
(FHSS)
• Data signal is modulated with a narrowband
signal that hops from frequency band to
frequency band, over time
• The transmission frequencies are determined by
a spreading, or hopping code (a pseudo-random
sequence)
WirelessEnvironment
and WirelessLANs
18
WirelessNetworks
Spring2005
Frequency Hoping Spread Spectrum
Frequency Hopping
the carrier frequency is 'hopping' according to a
unique sequence
Direct Sequence Spread Spectrum
• Data signal is multiplied by a spreading code,
and resulting signal occupies a much higher
frequency band
• Spreading code is a pseudo-random sequence
WirelessEnvironment
and WirelessLANs
15
(DSSS)
11010111010100100001101010010011111010100100111
Information after spreadingUser data
1101010010011
Spreading code 11010111010100100001101010010011111010100100111(…)
Processing Gain (spreading factor)
Period of
one chip
Period of one
data bit
PG = SF = Tb / Tc
DSSS Example
WirelessEnvironment
and WirelessLANs
17
Advantages of Spread Spectrum
1. Reduced crosstalk interference:
2. Better voice quality/data integrity and less static noise
3. Lowered susceptibility to multipath fading
4. Inherent security:
5. Co-existence:
6. Longer operating distances
7. Hard to detect:
8. Hard to intercept or demodulate:
9. Harder to jam
Conclusion
Spread spectrum promises several benefits such as
higher capacity and ability to resist multipath propagation.
Spread spectrum signals are difficult to intercept for an
unauthorized person, they are easily hidden. For an
unauthorized person, it is difficult to even detect their presence
in many cases. They are resistant to jamming. They provide a
measure of immunity to distortion due to multipath
•
propagation. They have multiple access capability
• .
telephones, personal communications and position location.
For example, DS/SS is used in electronic Industries
Association’s Interim Standard IS-95 for cellular telephones,
as
well as wide range of position location systems such as the
global position location and other vehicle location
and messaging systems.
Cdma, speard spectrum

More Related Content

What's hot

Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum Techniques
Anil Nigam
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
GopinathD17
 
Handoff
HandoffHandoff
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
paramsidhu89
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
METHODIST COLLEGE OF ENGG & TECH
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
MrajKumar11
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
Handoff parameters
Handoff parametersHandoff parameters
Handoff parameters
AJAL A J
 
CDMA
CDMACDMA
S1 dcn - l10 - gsm-introduction
S1   dcn - l10 - gsm-introductionS1   dcn - l10 - gsm-introduction
S1 dcn - l10 - gsm-introduction
asadsbbu
 
Software radio
Software radioSoftware radio
Software radio
Sanjana Prasad
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
Keerthana Nambiar
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanism
Basil John
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
ViVek Patel
 
Equal gain combining and orthogonality restoring combining
Equal gain combining and orthogonality restoring combiningEqual gain combining and orthogonality restoring combining
Equal gain combining and orthogonality restoring combining
Sanjana Prasad
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
NSConclave
 

What's hot (20)

Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum Techniques
 
Cdma me
Cdma meCdma me
Cdma me
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
Handoff
HandoffHandoff
Handoff
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Handoff parameters
Handoff parametersHandoff parameters
Handoff parameters
 
CDMA
CDMACDMA
CDMA
 
S1 dcn - l10 - gsm-introduction
S1   dcn - l10 - gsm-introductionS1   dcn - l10 - gsm-introduction
S1 dcn - l10 - gsm-introduction
 
Software radio
Software radioSoftware radio
Software radio
 
India2009 Dowling
India2009 DowlingIndia2009 Dowling
India2009 Dowling
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanism
 
Handover
HandoverHandover
Handover
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Equal gain combining and orthogonality restoring combining
Equal gain combining and orthogonality restoring combiningEqual gain combining and orthogonality restoring combining
Equal gain combining and orthogonality restoring combining
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
 
cdma
cdmacdma
cdma
 

Similar to Cdma, speard spectrum

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
mpsrekha83
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
Uday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
Uday Kumar
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
maheswaricse
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
Bidhan Ghimire
 
Secure modem design
Secure modem designSecure modem design
Secure modem design
Dr.Joko Suryana
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
Abhishek Sainkar
 
AJAL ACS Chap2 rev
AJAL  ACS Chap2 revAJAL  ACS Chap2 rev
AJAL ACS Chap2 rev
AJAL A J
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
ZunAib Ali
 
Lecture spread spectrum
Lecture spread spectrumLecture spread spectrum
Lecture spread spectrum
Ronoh Kennedy
 
Ch11 spread spectrum
Ch11 spread spectrumCh11 spread spectrum
Ch11 spread spectrum
AJEETKUMAR397
 
CDMA.pptx
CDMA.pptxCDMA.pptx
CDMA.pptx
ShikharAgarwal63
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
NAVAMISURESH2
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
Mazin Alwaaly
 
cdma2000_Fundamentals.pdf
cdma2000_Fundamentals.pdfcdma2000_Fundamentals.pdf
cdma2000_Fundamentals.pdf
CheikhAhmetTidianeDi1
 
1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx
shivnarayansingh12
 

Similar to Cdma, speard spectrum (20)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Secure modem design
Secure modem designSecure modem design
Secure modem design
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
 
Cdmaconcepts
CdmaconceptsCdmaconcepts
Cdmaconcepts
 
AJAL ACS Chap2 rev
AJAL  ACS Chap2 revAJAL  ACS Chap2 rev
AJAL ACS Chap2 rev
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
3G Systems
3G Systems3G Systems
3G Systems
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Lecture spread spectrum
Lecture spread spectrumLecture spread spectrum
Lecture spread spectrum
 
Ch11 spread spectrum
Ch11 spread spectrumCh11 spread spectrum
Ch11 spread spectrum
 
CDMA.pptx
CDMA.pptxCDMA.pptx
CDMA.pptx
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
cdma2000_Fundamentals.pdf
cdma2000_Fundamentals.pdfcdma2000_Fundamentals.pdf
cdma2000_Fundamentals.pdf
 
1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Cdma, speard spectrum

  • 1. CDMA & SPREAD SPECTRUM COMMUNICATION PRESENTED BY: PRITISH KUMAWAT(01116414219) NEDA(00216414219) VIJAY PAL SINGH(00416414219)
  • 2. Multiple Access Techniques Frequency Division Multiple Access (FDMA) Time Division Multiple Access (TDMA) Code Division Multiple Access (CDMA)
  • 3. CDMA • Each user is assigned a unique PN code. • Each user transmits its information by spreading with unique code. • Direct Sequence spread spectrum is used. • Users are separated by code not by time slot and frequency slot. • Users share same bandwidth • User axis shows cumulative signal strength of all users
  • 5. CDMA capacity Factors deciding the CDMA capacity: • Processing gain • Signal to noise ratio • Voice Activity Factor • Frequency reuse efficiency
  • 7. Mobile Station (MS): Two Blocks 1) Mobile Equipment (ME) 2) Subscribers Identity Module (SIM) Function of Mobile Station: 1. Personal Mobility 2. IMEI (International Mobile Equipment Identity) 3. IMSI (International Mobile Subscriber Identity)
  • 8. Base Station Subsystem (BSS) 1) Base Transceiver Station (BTS) 2) Base Station Controller (BSC) BTS : Base Transceiver station 1. It defines the cell . 2. It handles the radio link protocol with the mobile station BSC: Base station Controller 1. It manages radio resources for one or more BTS. 2. Allocation and Deallocation of channels. 3. Transmitter power control. 4. Handoff control
  • 9. Network Subsystem MSC: Mobile Switching Center HLR: Home Location Register VLR: Visitor Location register AuC: Authentication Centre EIR: Equipment Identity Register
  • 10. Network subsystem Home Location Register (HLR) 1 One HLR per CDMA operator 2 Contains permanent Mobile database of all the subscribers in the network 3 Contains MSRN(mobile station routing no.) 4 It is referred for every incoming call Mobile Switching centre:(MSC) 1 Call set up/supervision/release 2 Call routing 3 Billing information collection 4 Mobility management 5 Paging, Echo cancellation connection to BSC, other MSC and other local exchange networks 6 Access to HLR and VLR
  • 11. Network Subsystem Visitor Location Register(VLR) 1. Temporary visitors database 2. One VLR per MSC Authentication Centre (AuC) 1. Provides security 2. Authentication and encryption Equipment Identity Register: 1. Contains IMEI
  • 12. Advantages • Increased security. • Soft handoff • Increased efficiency. • Extended reach - beneficial to rural users situated far from cells • Multipath reception improves voice clarity
  • 13. Disadvantages • Time synchronization is required. • Near far problem. • CDMA is relatively low, and the network is not as mature as GSM. • CDMA can not offer international roaming, a large GSM advantage
  • 14. SPREAD SPECTRUM OUTLINE: • Basic of spread spectrum • Need of spread spectrum • Block diagram • Working • significance
  • 15. 4 Introduction of Spread Spectrum Communications • Spread Spectrum is a means of transmission in which the data sequence occupies a bandwidth in excess of the minimum bandwidth necessary to send it. Effectively the signal is mapped to a higher dimension signal space • Signal spreading is done before transmission by using a spreading sequence. The same sequence is used at the receiver to retrieve the signal • Spread Spectrum is most effective against interference (intentional or non-intentional) with fixed energy. • Main commercial applications in wireless and GPS.
  • 16. r NEED FOR SPREAD SPECTRUM • SECURITY • Safeguards for physical security must be even greater in wireless communications • Encryption: intercepted communications must not be easily interpreted • Authentication: is the
  • 17. BLOCK DIGRAM SPREAD SPECTRUM COMMUNICATION Spread-spectrum radio communications is a favorite technology of the military because it resists jamming and is hard for an enemy to intercept, Just as they are unlikely to be intercepted by a military opponent
  • 18. How Spread Spectrum Works • Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. • Spread Spectrum signals are also hard to Intercept or demodulate. • Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. • These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. .
  • 19. PN Sequences • PN generator produces periodic sequence that appears to be random • PN Sequences ▫ Generated by an algorithm using initialseed ▫ Sequence isn’t statistically random but will pass many test of randomness ▫ Sequences referred to as pseudorandom numbers or pseudonoise sequences ▫ Unless algorithm and seed are known, the sequence is impractical to predict
  • 20. Important PN Properties • Randomness ▫ Uniform distribution ▫ Independence • Unpredictability
  • 21. Spreading Codes • A noise-like and random signal has to be generated at the transmitter. • The same signal must be generated at the receiver in synchronization. • We limit the complexity by specifying only one bit per sample, i.e., a binary sequence. 9
  • 22. • Spread Spectrum signals use fast codes that run many times the information bandwidth or data rate. These special "Spreading" codes are called "Pseudo Random" or "Pseudo Noise" codes. They are called "Pseudo" because they are not real Gaussian noise.
  • 23. Why Spread Spectrum? • Spread spectrum signals are distributed over a wide range of frequencies and then collected back at the receiver ▫ These wideband signals are noise-like and hence difficult to detect or interfere with. • Initially adopted in military applications, for its resistance to jamming and difficulty of interception • More recently, adopted in commercial wireless communications
  • 24. SIGNIFICANCE • Immunity to jamming • Low interference • High processing gain • Easy encryption • Multiple access
  • 25. SPREAD SPECTRUM TECHNIQUES • THE MAJOR SPREAD SPECTRUM TECHNIQUES ARE • DSSS • FHSS
  • 26. Frequency Hopping Spread Spectrum (FHSS) • Data signal is modulated with a narrowband signal that hops from frequency band to frequency band, over time • The transmission frequencies are determined by a spreading, or hopping code (a pseudo-random sequence) WirelessEnvironment and WirelessLANs 18
  • 28. Frequency Hopping the carrier frequency is 'hopping' according to a unique sequence
  • 29. Direct Sequence Spread Spectrum • Data signal is multiplied by a spreading code, and resulting signal occupies a much higher frequency band • Spreading code is a pseudo-random sequence WirelessEnvironment and WirelessLANs 15 (DSSS) 11010111010100100001101010010011111010100100111 Information after spreadingUser data 1101010010011 Spreading code 11010111010100100001101010010011111010100100111(…)
  • 30. Processing Gain (spreading factor) Period of one chip Period of one data bit PG = SF = Tb / Tc
  • 32. Advantages of Spread Spectrum 1. Reduced crosstalk interference: 2. Better voice quality/data integrity and less static noise 3. Lowered susceptibility to multipath fading 4. Inherent security: 5. Co-existence: 6. Longer operating distances 7. Hard to detect: 8. Hard to intercept or demodulate: 9. Harder to jam
  • 33. Conclusion Spread spectrum promises several benefits such as higher capacity and ability to resist multipath propagation. Spread spectrum signals are difficult to intercept for an unauthorized person, they are easily hidden. For an unauthorized person, it is difficult to even detect their presence in many cases. They are resistant to jamming. They provide a measure of immunity to distortion due to multipath • propagation. They have multiple access capability • . telephones, personal communications and position location. For example, DS/SS is used in electronic Industries Association’s Interim Standard IS-95 for cellular telephones, as well as wide range of position location systems such as the global position location and other vehicle location and messaging systems.