SlideShare a Scribd company logo
Multiple access in
wireless communication
Subject : Mobile Computing and Wireless Communication
CE-B
Maulik togadiya
What is Multiple access?
 Multiple access method allows several terminals connected
to the same multi-point transmission medium to transmit
over it. Examples of shared physical media are wireless
networks, bus networks, ring networks and half
duplex point-to-point links.
 Multiple access schemes to allow many users to share
simultaneously a finite amount of radio spectrum resources.
2
3
Multiple Access Techniques
 Frequency division multiple access (FDMA)
 Time division multiple access (TDMA)
 Code division multiple access (CDMA)
 Space division multiple access (SDMA)
4
Frequency division multiple access
(FDMA)
 The frequency band is divided into channels of equal
bandwidth so that each conversation is carried on a
different frequency.
 A specific frequency band is given to one person, and it
will received by identifying each of the frequency on the
receiving end. It is often used in the first generation of
analog mobile phone.
 Each station assigned a fixed frequency.
5
 In FDMA system signaling dimensions are divided along
the frequency axis into non overlapping channels and
each end users assigned a different frequency channel as
shown in fig.
6
Time division multiple access
(TDMA)
 Time frame is divided into slots (channels). Each user is
allocated a particular time slot or channel.
 Time Division Multiple Access (TDMA) is a digital
cellular telephone communication technology. It facilitates
many users to share the same frequency without
interference. Its technology divides a signal into different
timeslots, and increases the data carrying capacity.
7
 In TDMA system signaling dimensions are divided along
the Time axis into non overlapping channels and each
end users assigned a different timeslot channel as shown
in fig.
8
Code division multiple access
(CDMA)
 Code division multiple access (CDMA) is a channel
access method used by various radio communication
technologies.
 CDMA is an example of multiple access , where
several transmitters can send information
simultaneously over a single communication channel.
 This allows several users to share a band of
frequencies. To permit this without undue interference
between the users, CDMA employs spread-spectrum
technology.
9
 In this system, a user has access to the whole bandwidth
for the entire duration. The basic principle is that
different CDMA codes are used to distinguish among the
different users.
10
Space division multiple access
(CDMA)
 If there are no separation in frequency or time or code
domain ,an alternative way of separating different users is
spatial separation
 SDMA is a MIMO -based wireless communication network
architecture, primarily suitable for mobile ad-hoc networks,
which enables access to a communication channel by
identifying the user location and establishing a one-to-one
mapping between the network bandwidth division and the
identified spatial location.
11
 This figure shows a satellite system that uses spatial division
multiple access (SDMA) technology. In this example, a single
satellite contains several directional antennas. Some of these
antennas use the same frequency. This allows a single satellite to
simultaneously communicate to two different satellite receivers that
operate on the same frequency.
12
Packet radio access
 Packet radio is a form of packet switching technology used
to transmit digital data via radio or wireless
communications links. It uses the same concepts of data
transmission via Datagram that are fundamental to
communications via the Internet.
 There are three medium access protocol appropriate for
packet radio networks: ALOHA, slotted ALOHA,
and Carrier Sense Multiple Access (CSMA).
13
Pure aloha
 In pure ALOHA, the stations transmit frames whenever they have data to
send.
 When two or more stations transmit simultaneously, there is collision and
the frames are destroyed.
 In pure ALOHA, whenever any station transmits a frame, it expects the
acknowledgement from the receiver.
 If acknowledgement is not received within specified time, the station
assumes that the frame (or acknowledgement) has been destroyed.
 If the frame is destroyed because of collision the station waits for a
random amount of time and sends it again.
14
 Therefore pure ALOHA dictates that when time-out period
passes, each station must wait for a random amount of time
before resending its frame. This randomness will help avoid more
collisions.
 Figure shows an example of frame collisions in pure ALOHA.
15
Slotted aloha
 Slotted ALOHA was invented to improve the efficiency of
pure ALOHA as chances of collision in pure ALOHA are very
high.
 In slotted ALOHA, the time of the shared channel is divided
into discrete intervals called slots.
 The stations can send a frame only at the beginning of the slot
and only one frame is sent in each slot.
 In slotted ALOHA, if any station is not able to place the frame
onto the channel at the beginning of the slot i.e. it misses the
time slot then the station has to wait until the beginning of the
next time slot. 16
 In slotted ALOHA, there is still a possibility of collision if
two stations try to send at the beginning of the same time
slot as shown in fig.
17
Carrier sense multiple access
 Carrier sense multiple access (CSMA) is a probabilistic
media access control (MAC) protocol in which a node
verifies the absence of other traffic before transmitting on
transmission medium.
 CSMA is set of rule that which the device attached to the
network first determine whether the channel or carrier is in
use or free and then act accordingly.
18
 Type of CSMA:
 Persistence CSMA
 Non-persistence CSMA
19
Multiple access collision avoidance
20
 Multiple Access with Collision Avoidance (MACA) is a
protocol for slotted media access control used in wireless
LAN data transmission. MACA is used to avoid data
collisions caused by hidden station problems as well as
simplifying known exposed station problems.
 In MACA, a wireless network node announces that it is
going to send the data frame, informing the other nodes to
remain silent. When a node intends to transmit the data
frame, it communicates using a signal known as Request-
To-Send (RTS) that includes the length of the data frame
to transmit. If the recipient permits the transmission, it
responds back to the sender with a signal known as Clear-
To-Send (CTS), which includes the length of the data
frame that it is about to receive.
 In the meantime, the nodes that listen to the RTS signal
must remain silent until the data is fully transmitted in
order to avoid conflict with CTS.
 WLAN data transmission collisions can still happen, and
MACA for Wireless (MACAW) is brought to extend the
functionality of MACA. It demands nodes to send
acknowledgments after every successful frame
transmission.
21
Multiple Access in wireless communication

More Related Content

What's hot

Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
METHODIST COLLEGE OF ENGG & TECH
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
yogesh singh
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
Dr.Umadevi V
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
aroosa khan
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
Avanitrambadiya
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
RAVIKIRAN ANANDE
 
TDMA
TDMATDMA
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
Kundan Kumar
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
HimaBindu Valiveti
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi712
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
RCC Institute of Information Technology
 
OFDM
OFDMOFDM

What's hot (20)

Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
TDMA
TDMATDMA
TDMA
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Wireless networking_ASRao
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
OFDM
OFDMOFDM
OFDM
 

Similar to Multiple Access in wireless communication

MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
juhi kumari
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
Time division multiple access
Time division multiple accessTime division multiple access
Lecture 07
Lecture 07Lecture 07
Lecture 07
Chyon Ju
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
Anishkumar343890
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
N.Jagadish Kumar
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)bheemsain
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
inventionjournals
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
kidoson243
 
MA Presentation.pptx
MA Presentation.pptxMA Presentation.pptx
MA Presentation.pptx
Brijendra Tiwari
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
GowriLatha1
 

Similar to Multiple Access in wireless communication (20)

MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Mac
MacMac
Mac
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
 
MA Presentation.pptx
MA Presentation.pptxMA Presentation.pptx
MA Presentation.pptx
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
 

More from Maulik Togadiya

Information and Network Security
Information and Network SecurityInformation and Network Security
Information and Network Security
Maulik Togadiya
 
Data mining
Data miningData mining
Data mining
Maulik Togadiya
 
optimization of DFA
optimization of DFAoptimization of DFA
optimization of DFA
Maulik Togadiya
 
Turing machine-TOC
Turing machine-TOCTuring machine-TOC
Turing machine-TOC
Maulik Togadiya
 
Select query in JDBC
Select query in JDBCSelect query in JDBC
Select query in JDBC
Maulik Togadiya
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
Maulik Togadiya
 
Regular expression with DFA
Regular expression with DFARegular expression with DFA
Regular expression with DFA
Maulik Togadiya
 
Computer networking
Computer networkingComputer networking
Computer networking
Maulik Togadiya
 

More from Maulik Togadiya (8)

Information and Network Security
Information and Network SecurityInformation and Network Security
Information and Network Security
 
Data mining
Data miningData mining
Data mining
 
optimization of DFA
optimization of DFAoptimization of DFA
optimization of DFA
 
Turing machine-TOC
Turing machine-TOCTuring machine-TOC
Turing machine-TOC
 
Select query in JDBC
Select query in JDBCSelect query in JDBC
Select query in JDBC
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
Regular expression with DFA
Regular expression with DFARegular expression with DFA
Regular expression with DFA
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Multiple Access in wireless communication

  • 1. Multiple access in wireless communication Subject : Mobile Computing and Wireless Communication CE-B Maulik togadiya
  • 2. What is Multiple access?  Multiple access method allows several terminals connected to the same multi-point transmission medium to transmit over it. Examples of shared physical media are wireless networks, bus networks, ring networks and half duplex point-to-point links.  Multiple access schemes to allow many users to share simultaneously a finite amount of radio spectrum resources. 2
  • 3. 3
  • 4. Multiple Access Techniques  Frequency division multiple access (FDMA)  Time division multiple access (TDMA)  Code division multiple access (CDMA)  Space division multiple access (SDMA) 4
  • 5. Frequency division multiple access (FDMA)  The frequency band is divided into channels of equal bandwidth so that each conversation is carried on a different frequency.  A specific frequency band is given to one person, and it will received by identifying each of the frequency on the receiving end. It is often used in the first generation of analog mobile phone.  Each station assigned a fixed frequency. 5
  • 6.  In FDMA system signaling dimensions are divided along the frequency axis into non overlapping channels and each end users assigned a different frequency channel as shown in fig. 6
  • 7. Time division multiple access (TDMA)  Time frame is divided into slots (channels). Each user is allocated a particular time slot or channel.  Time Division Multiple Access (TDMA) is a digital cellular telephone communication technology. It facilitates many users to share the same frequency without interference. Its technology divides a signal into different timeslots, and increases the data carrying capacity. 7
  • 8.  In TDMA system signaling dimensions are divided along the Time axis into non overlapping channels and each end users assigned a different timeslot channel as shown in fig. 8
  • 9. Code division multiple access (CDMA)  Code division multiple access (CDMA) is a channel access method used by various radio communication technologies.  CDMA is an example of multiple access , where several transmitters can send information simultaneously over a single communication channel.  This allows several users to share a band of frequencies. To permit this without undue interference between the users, CDMA employs spread-spectrum technology. 9
  • 10.  In this system, a user has access to the whole bandwidth for the entire duration. The basic principle is that different CDMA codes are used to distinguish among the different users. 10
  • 11. Space division multiple access (CDMA)  If there are no separation in frequency or time or code domain ,an alternative way of separating different users is spatial separation  SDMA is a MIMO -based wireless communication network architecture, primarily suitable for mobile ad-hoc networks, which enables access to a communication channel by identifying the user location and establishing a one-to-one mapping between the network bandwidth division and the identified spatial location. 11
  • 12.  This figure shows a satellite system that uses spatial division multiple access (SDMA) technology. In this example, a single satellite contains several directional antennas. Some of these antennas use the same frequency. This allows a single satellite to simultaneously communicate to two different satellite receivers that operate on the same frequency. 12
  • 13. Packet radio access  Packet radio is a form of packet switching technology used to transmit digital data via radio or wireless communications links. It uses the same concepts of data transmission via Datagram that are fundamental to communications via the Internet.  There are three medium access protocol appropriate for packet radio networks: ALOHA, slotted ALOHA, and Carrier Sense Multiple Access (CSMA). 13
  • 14. Pure aloha  In pure ALOHA, the stations transmit frames whenever they have data to send.  When two or more stations transmit simultaneously, there is collision and the frames are destroyed.  In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver.  If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed.  If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. 14
  • 15.  Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions.  Figure shows an example of frame collisions in pure ALOHA. 15
  • 16. Slotted aloha  Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high.  In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots.  The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.  In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. 16
  • 17.  In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. 17
  • 18. Carrier sense multiple access  Carrier sense multiple access (CSMA) is a probabilistic media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on transmission medium.  CSMA is set of rule that which the device attached to the network first determine whether the channel or carrier is in use or free and then act accordingly. 18
  • 19.  Type of CSMA:  Persistence CSMA  Non-persistence CSMA 19
  • 20. Multiple access collision avoidance 20  Multiple Access with Collision Avoidance (MACA) is a protocol for slotted media access control used in wireless LAN data transmission. MACA is used to avoid data collisions caused by hidden station problems as well as simplifying known exposed station problems.
  • 21.  In MACA, a wireless network node announces that it is going to send the data frame, informing the other nodes to remain silent. When a node intends to transmit the data frame, it communicates using a signal known as Request- To-Send (RTS) that includes the length of the data frame to transmit. If the recipient permits the transmission, it responds back to the sender with a signal known as Clear- To-Send (CTS), which includes the length of the data frame that it is about to receive.  In the meantime, the nodes that listen to the RTS signal must remain silent until the data is fully transmitted in order to avoid conflict with CTS.  WLAN data transmission collisions can still happen, and MACA for Wireless (MACAW) is brought to extend the functionality of MACA. It demands nodes to send acknowledgments after every successful frame transmission. 21