SlideShare a Scribd company logo
INTERNATIONAL INSTITUTE OF PROFESSIONAL STUDIES DAVV INDORE
Mobile and Wireless Computing
Internal Test III
Name - Anushka Shastri
Roll No - IT-2K17-09
Batch - MTech 2k17
Semester - VIII
Guided By - Ms. Manju Sachdeo Ma'am
Date - 24/05/2021
Demand Assigned Multiple
Access
24/05/2021
Multiple Access:
We do multiple access to enable satellite to
take or give signals from different stations at
time without any interference between them.
Multiple Access
Sometimes a satellite’s service
is present at a particular location
on the earth station and
sometimes it is not present. That
means, a satellite may have
different service stations of its
own located at different places
on the earth. They send carrier
signal for the satellite.
In this situation, we do multiple
access to enable satellite to take
or give signals from different
stations at time without any
interference between them.
FDMA
(Frequency Division Multiple Access)
TDMA
(Time Division Multiple Access)
CDMA
(Code Division Multiple Access)
What is DAMA ?
● Full form - Demand Assigned Multiple Access
● Channel Allocation Technique
● There are two channel allocation techniques -
○ PAMA - Permanent Assigned Multiple Access
○ DAMA - Demand Assigned Multiple Access
DAMA
DAMA is a technique used to
assign satellite channels to on
an as request basis.
The most multiple-access
systems use DAMA in which
the available channels are
allocated on an as required
basis to users.
DAMA
Demand Assigned Multiple Access (DAMA) is a technology used
to assign a to clients that don't need to use it constantly.
DAMA systems assign communication channels based on news
issued from user terminals to a network security system.
Channels are typically a pair of carrier frequencies (one for
transmit and one for receive), but can be other fixed bandwidth
resources such as timeslots in a TDMA burst plan or even
physical channels.
Once a channel is allocated to a given pair of nodes, it is not
available to other users in the network until their session is
finished.
How DAMA works ?
● Demand access systems require two types of a channel:
○ a common signaling channel (CSC) and
○ a communication channel.
● A user wishing to enter the communication network
○ first calls the controlling earth station using the CSC,
○ and the controller then allocates a pair of channels to that user.
● The CSC are located at the ends of the transponder bandwidth.
● When earth station wants to access the satellite, it transmits a control packet to satellite
on the CSC Frequency & waits for a reply.
How DAMA works ?
● The control packet is received by the hub earth station
and decoded.
● The control packet contains source address & destination
address also it includes cyclic redundancy check (CRC).
● The control station measures duration of the connection.
Advantages of DAMA
Prior
Reservation
A sender reserves
a future time-slot
Increased
Efficiency
Less
Collision
Reservation can
increase
efficiency to 80%
Sending within this
reserved time-slot is
possible without
collision
Reservation
Algorithms
Explicit Reservation
Implicit Reservation (PRMA)
Reservation-TDMA
Access method DAMA: Explicit Reservation
● Two modes:
○ ALOHA mode for reservation:
■ competition for small reservation slots, collisions possible
○ reserved mode for data transmission within successful
reserved slots (no collisions possible)
It is important for all stations to keep the reservation list consistent at
any point in time and, therefore, all stations have to synchronize from
time to time.
Access method DAMA: Explicit Reservation
PRMA
Packet Reservation
Multiple Access
● a certain number of slots form a
frame
● frames are repeated
● stations compete for empty slots
according to the slotted aloha
principle
● once a station reserves a slot
successfully, this slot is
automatically assigned to this
station in all following frames as
long as the station has data to
send
● competition for this slots starts
again as soon as the slot was
empty in the last frame
PRMA
Reservation-TDMA
every frame
consists of N
mini-slots and x
data-slots
every station has
its own mini-slot
and can reserve
up to k data-slots
using this mini-
slot (i.e. x = N *
k).
other stations can
send data in
unused data-slots
according to a
round-robin
sending scheme
(best-effort
traffic)
Uses of DAMA
Military for satellite
communications
(SATCOM)
Remote location Internet
access and mobile
maritime communications.
VSAT systems for point of
sale (POS) transactions
such as credit card, polling
or radio frequency
identification
How DAMA differs from Multiplexing?
Multiplexing
Divides a single
communication channel
into multiple channels
DAMA
Assigns a pair of
frequencies to a user
terminal
Multiplexing
Technical
process
DAMA
Administrative
process
Conclusion
DAMA assigns a pair of
frequencies to a user
terminal.
Then, the frequencies
are returned to a list, or
central pool, of
frequencies available to
other terminal users.
The number of transient
clients that use DAMA
network terminals
increases according to
efficient user
sequencing at specific
frequencies and
different timeslots.
Thus, DAMA is used
for infrequently-
used networks.
DAMA does not
require continuous
connection from
user terminals to a
network control
system.

More Related Content

What's hot

Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
RCC Institute of Information Technology
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
ZunAib Ali
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
METHODIST COLLEGE OF ENGG & TECH
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
JAIGANESH SEKAR
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
JAIGANESH SEKAR
 
Ec6004 unit 2
Ec6004 unit 2Ec6004 unit 2
Ec6004 unit 2
venkateshp100
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
Tanjarul Islam Mishu
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
RAVIKIRAN ANANDE
 
Monopulse tracking radar
Monopulse tracking radarMonopulse tracking radar
Monopulse tracking radarAshok Selsan
 

What's hot (20)

Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
Ec6004 unit 2
Ec6004 unit 2Ec6004 unit 2
Ec6004 unit 2
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
Monopulse tracking radar
Monopulse tracking radarMonopulse tracking radar
Monopulse tracking radar
 

Similar to Demand Assigned Multiple Access

multipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptxmultipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptx
16115yogendraSingh
 
Yogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxYogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptx
Aman564573
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
simranbisti
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
Anishkumar343890
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
panditadesh123
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Multiplexing
Multiplexing Multiplexing
Multiplexing
RUpaliLohar
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
Chyon Ju
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 
Time division multiple access
Time division multiple accessTime division multiple access
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 

Similar to Demand Assigned Multiple Access (20)

multipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptxmultipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptx
 
Yogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxYogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptx
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
 
The mac layer
The mac layerThe mac layer
The mac layer
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Multiplexing
Multiplexing Multiplexing
Multiplexing
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Demand Assigned Multiple Access

  • 1. INTERNATIONAL INSTITUTE OF PROFESSIONAL STUDIES DAVV INDORE Mobile and Wireless Computing Internal Test III Name - Anushka Shastri Roll No - IT-2K17-09 Batch - MTech 2k17 Semester - VIII Guided By - Ms. Manju Sachdeo Ma'am Date - 24/05/2021
  • 3. Multiple Access: We do multiple access to enable satellite to take or give signals from different stations at time without any interference between them.
  • 4.
  • 5. Multiple Access Sometimes a satellite’s service is present at a particular location on the earth station and sometimes it is not present. That means, a satellite may have different service stations of its own located at different places on the earth. They send carrier signal for the satellite. In this situation, we do multiple access to enable satellite to take or give signals from different stations at time without any interference between them. FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access)
  • 6. What is DAMA ? ● Full form - Demand Assigned Multiple Access ● Channel Allocation Technique ● There are two channel allocation techniques - ○ PAMA - Permanent Assigned Multiple Access ○ DAMA - Demand Assigned Multiple Access
  • 7.
  • 8. DAMA DAMA is a technique used to assign satellite channels to on an as request basis. The most multiple-access systems use DAMA in which the available channels are allocated on an as required basis to users.
  • 9. DAMA Demand Assigned Multiple Access (DAMA) is a technology used to assign a to clients that don't need to use it constantly. DAMA systems assign communication channels based on news issued from user terminals to a network security system. Channels are typically a pair of carrier frequencies (one for transmit and one for receive), but can be other fixed bandwidth resources such as timeslots in a TDMA burst plan or even physical channels. Once a channel is allocated to a given pair of nodes, it is not available to other users in the network until their session is finished.
  • 10. How DAMA works ? ● Demand access systems require two types of a channel: ○ a common signaling channel (CSC) and ○ a communication channel. ● A user wishing to enter the communication network ○ first calls the controlling earth station using the CSC, ○ and the controller then allocates a pair of channels to that user. ● The CSC are located at the ends of the transponder bandwidth. ● When earth station wants to access the satellite, it transmits a control packet to satellite on the CSC Frequency & waits for a reply.
  • 11. How DAMA works ? ● The control packet is received by the hub earth station and decoded. ● The control packet contains source address & destination address also it includes cyclic redundancy check (CRC). ● The control station measures duration of the connection.
  • 12. Advantages of DAMA Prior Reservation A sender reserves a future time-slot Increased Efficiency Less Collision Reservation can increase efficiency to 80% Sending within this reserved time-slot is possible without collision
  • 14. Access method DAMA: Explicit Reservation ● Two modes: ○ ALOHA mode for reservation: ■ competition for small reservation slots, collisions possible ○ reserved mode for data transmission within successful reserved slots (no collisions possible) It is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time.
  • 15. Access method DAMA: Explicit Reservation
  • 16. PRMA Packet Reservation Multiple Access ● a certain number of slots form a frame ● frames are repeated ● stations compete for empty slots according to the slotted aloha principle ● once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send ● competition for this slots starts again as soon as the slot was empty in the last frame
  • 17. PRMA
  • 18. Reservation-TDMA every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini- slot (i.e. x = N * k). other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic)
  • 19.
  • 20. Uses of DAMA Military for satellite communications (SATCOM) Remote location Internet access and mobile maritime communications. VSAT systems for point of sale (POS) transactions such as credit card, polling or radio frequency identification
  • 21. How DAMA differs from Multiplexing? Multiplexing Divides a single communication channel into multiple channels DAMA Assigns a pair of frequencies to a user terminal Multiplexing Technical process DAMA Administrative process
  • 22. Conclusion DAMA assigns a pair of frequencies to a user terminal. Then, the frequencies are returned to a list, or central pool, of frequencies available to other terminal users. The number of transient clients that use DAMA network terminals increases according to efficient user sequencing at specific frequencies and different timeslots. Thus, DAMA is used for infrequently- used networks. DAMA does not require continuous connection from user terminals to a network control system.