SlideShare a Scribd company logo
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 1
Motivation forspecialized
MAC
 C a n we apply media access methods from fixednetworks?
Example CSMA/CD
Carrier Sense Multiple Access with Collision Detection
send as soon as the medium is free, listen into the medium if a collision occurs
(legacy method in IEEE 802.3)
Problems in wirelessnetworks
signal strength decreases proportional to the square of the distance
 the sender would apply CS and CD,but the collisions happen at thereceiver
 i t might be the case that a sender cannot “hear” the collision, i.e., CD does not
work
furthermore, CS might not work if, e.g.,a terminal is“hidden”
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 2
CSMA/CD fails in wireless N/w because CSMA/CD is not really interested
in collisions at the sender , but rather in those at the receiver.
 T h e signal should reach the receiver without collisions. But sender isthe one
detecting collisions
 This is not a problem using wire, asmore or less the same signal
strength can be assumed all over the wire
 T h e strength of a signal in wireless N/w decreases proportionally tothe square
of the distance to the sender
 T h e senderstart sending but a collision happens at the receiver due to a
second sender.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 3
Motivation: Hidden and exposed terminals
• consider the scenario with three mobile phones as shown in Figure.
• The transmission range of A reaches B, but not C(the detection range
does not reach C either). The transmission range of C reaches B, but
not A.
• Finally, the transmission range of B reaches A and C, i.e A cannot
detect C and vice versa.
•
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 4
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 5
HiddenTerminals:
A sends to B, C cannot receiveA
C wants to send to B, C senses a “free”
medium (CS fails)
collision at B, A cannot receive the collision
(CD fails)
A is “hidden” for C ,and vice versa.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 6
Exposed Terminals:
B sends toA, C wants to send to another terminal (notA or B)
outsiderange
C senses the carrier and detects that carrier is busy
C postpones its transmission until it detects the medium as being
idle again
butA is outside the radio range of C, therefore waiting is not
necessary
C is “exposed” to B
Hidden terminals cause collisions, where asExposed terminals
causes unnecessary delay
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 7
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 8
Access methods SDMA/FDMA/TDMA/CDMA
 SDMA (Space Division MultipleAccess)
segment space into sectors, use directedantennas
 cell structure
 FDMA (Frequency Division MultipleAccess)
assign a certain frequency to a transmission channel between a sender and a
receiver
permanent (e.g.,radio broadcast), slow hopping (e.g.,GSM), fast hopping(FHSS,
Frequency Hopping Spread Spectrum)
 TDMA (Time Division MultipleAccess)
assign the fixed sending frequency to a transmission channel between a sender
and a receiver for a certain amount of time
 CDMA (Code Division MultipleAccess)
 Same bandwidth is occupied by all the users however they are all assigned separate code
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 9
SDMA
 SDMA is used for allocating a separated space to users in wirelessnetworks.
 A typical application involves assigning an optimal base station to a mobile
phone user
 T h e mobile phone may receive several base stations with differentquality.
 A MAC algorithm could now decide which base station is best, taking into
account with frequencies (FDM), time slots(TDM) or code(CDM) are still
available(depending on technology)
Typically SDMA is never used in isolation but always in combination with one
or more other schemes
 T h e basis for the SDMA algorithm is formed by cell and sectorized antennas
which constitute the infrastructure implementing SDM
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 10
FDMA ( Frequency Division Multiple Access)
 FDMA assigns individual channels to individualusers
 Eac h user is allocated a unique freq., band or channel
These channels are assigned on demand to users who request service
During the period of the call, no other user can share thesamechannel
 T h e FDMA channel carries only one phone circuit at a time.
 I f an FDMA channel is not in use, then it sits idle and can not be usedby other
users.
 FDMA requires tight RF filtering to minimize adjacentchannel
interference
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 11
 Uplink frequency:824-849MHZ
 Downlink frequency:869-894MHZ
 8 3 2 channels spaced 30KHZ apart(3users/channel)
 48.6 kbpsbitrate
 Used inAMPS(Analog cellular telephone systems)
 Used FDD(Frequency DivisionDuplexing)
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 12
Main features
• Continuous transmission
• Narrow bandwidth
• Low overhead
• Simple hardware at mobile unit and BS : (1) no digital
processing needed (2) ease of framing and synchronization.
• FDMA can be used with both analogue and digitalsignal.
• FDMA requires high-performing filters in the radio hardware, in
contrast toTDMA andCDMA.
• FDMA is not vulnerable to the timing problems thatTDMAhas.
• Due to the frequency filtering, FDMA is not sensitive to nearfar
problem.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 13
Advantages
• I f channel is not in use, it sits idle
• Channel bandwidth is relatively narrow(30kHz)
• Simple algorithmically,and from a hardwarestandpoint
• Fairly efficient when the number of stations is small andthetraffic is
uniformly constant
• Capacity increase can be obtained by reducing the
information bit rate and using efficient digital code
• No need for network timing
• No restriction regarding the type of baseband or type of
modulation
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 14
Disadvantages
• The presence of guardbands
• Requires right RF filtering to minimize adjacent channel interference
• Maximum bit rate per channel is fixed
• Small inhibiting flexibility in bit rate capability
• Does not differ significantly from analog system
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 15
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 16
FDD/FDMA - general scheme, example GSM
f
t
124
1
124
1
20 MHz
200 kHz
890.2 MHz
935.2 MHz
915 MHz
960 MHz
TDMA (Time Division Multiple Access)
10/10/2019
Vikram Neerugatti, SVCET,
Chittoor, Andhra Pradesh.
17
• TDMA (Time Division MultipleAccess) System divide the ratio
spectrum into time slots.
• In each slot only one user is allowed to either transmit or receive
• Each user occupies a cyclically repeating time slot
transmission for any user is non continuous
• Listening to different frequencies at the same time is quite difficult
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh.
Uplink frequency:824-849MHZ
Downlink frequency:869-894MHZ
 832 channels spaced 30KHZ apart(3users/channel)
48.6 kbpsbitrate
Used in DigitalAMPS(Advanced Mobile Phone systems)
UsedTDD(Time Division Duplexing)
MAIN FEATURES
Shares single carrier frequency with multipleusers.
Non-continuous transmission.This results in low battery
consumption since the subscriber transmitter can be turned OFF
when not in use.
Slots can be assigned on demand in dynamicTDMA.
TDMA uses different time slots forTx and Rx,thus
duplexers are not required.
 Global Systems for Mobile communications (GSM) uses the DMA
technique
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 19
Advantages
 I t carry data rates of 64 kbps to 120 Mbps .
 I t provides the user with extended battery life and talk time.
 I t is the most cost effective technology to convert an
analogue system to digital.
TDMA technology separates users according to time, it
ensures that there will be no interference
TDMA allows the operator to do services like fax, voice band data,
and SMS as well as bandwidth-intensive application such as
multimedia and videoconferencing.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 20
Disadvantages
 Each user has a predefined time slot.When moving from one
cell to other,if all the time slots in this cell are full the user might
be disconnected.
 I t is subjected to multipath distortion.A signal coming from atower
to a handset might come from any one of several directions. It might
have bounced off several different buildings before arriving.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 21
TDD/TDMA - general scheme, example DECT
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 22
11 12 1 2 3 11 12
t
downlink uplink
417 µs
1 2 3
CDMA
 CDMA (Code Division MultipleAccess)
There is no restriction on time and frequency in thisscheme.
 Parallel communication without collision and whole bandwidth canbe used
Users are separated by code not by time slot and frequencyslot
 A l l terminals send on the same frequency probably at the sametimeand can
use the whole bandwidth of the transmission channel
Eac h sender has a unique random number, the sender XORsthesignal
with this random number
 T h e receiver can “tune” into this signal if it knows the pseudorandom
number, tuning is done via a correlation function
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 23
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 24
Advantages
Potentially larger capacity (more users can communicate
simultaneously) If users don’t use the medium all the time (e.g.,they
are just reading email), CDMA will allowmuch more users to
communicate simultaneously.
CDMA will use the resource (the radio spectrum)more
efficiently.
Provides larger spread spectrum, thus more robustagainst noise
bursts and multipath frequency selective fading
 GSM bandwidth = 200kHz
 IS-95 bandwidth = 1.25 MHz
W-CDMA (3G) bandwidth = 10MHz
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 25
 The transition from one BS to another (handoff) is not abrupt,as
inTDMA,and provides better quality No absolute limit on the
number of users
Easy addition of moreusers
Impossible for hackers to decipher the code sent
Better signal quality
Huge code space (e.g.232) compared to frequencyspace
Interferences (e.g.white noise) is notcoded
forward error correction and encryption can beeasily
integrated
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 26
Disadvantages:
 A s the number of users increases, the overallquality of service
decreases
Self-jamming
 Near- Far- problem arises
Higher complexity of a receiver(receiver cannot just listen into
the medium and start receiving if there is a signal)
 A l l signals should have the same strengthat areceiver
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 27
CDMA in theory
SenderA
 s e n d s Ad= 1,keyAk= 010011 (assign:“0”=-1,“1”=+1)
 s e n d i n g signalAs=Ad*Ak= (-1,+1,-1,-1,+1,+1)
Sender B
 s e n d s Bd= 0, keyBk= 110101 (assign: “0”= -1, “1”= +1)
 s e n d i n g signal Bs= Bd* Bk= (-1, -1, +1, -1, +1,-1)
Both signals superimpose in space
 interference neglected(noiseetc.)
 A s + Bs= (-2,0,0,-2,+2,0)
Receiver wants to receive signal from senderA
 a p p l y keyAkbitwise (innerproduct)
 Ae= (-2,0,0,-2,+2,0) Ak= 2 + 0 + 0 + 2 + 2 + 0 = 6
 result greater than 0, therefore, original bit was “1”
 r e c e i v i n g B
 Be= (-2,0,0,-2,+2,0)  Bk= -2 + 0 + 0 - 2 - 2 + 0 = -6,i.e.“0”
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 28
CDMA on signal level I
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 29
data A
signal A
key A
key
sequence A
data  key
Real systems use much longer keys resulting in a larger distance
between single code words in code space.
1 0 1
0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1
1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
Ad
Ak
As
CDMA on signal level II
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh.
30
signal A
data B
signal B
As + Bs
key B
key
sequence B
data  key
1 0 0
0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1
1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
Bd
Bk
Bs
As
CDMA on signal level III
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 31
Ak
(As + Bs)
* Ak
As + Bs
data A
1 0 1
1 0 1
integrator
output
comparator
output
Ad
CDMA on signal level IV
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 32
Bk
(As + Bs)
* Bk
As + Bs
data B
1 0 0
1 0 0
integrator
output
comparator
output
Bd
CDMA on signal level V
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 33
wrong
key K
(As + Bs)
* K
As + Bs
(0) (0) ?
integrator
output
comparator
output
SAMA - Spread Aloha Multiple Access
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 34
 Aloha has only a very low efficiency, CDMA needs complex receivers to be able to
receive different senders with individual codes at the same time
 Idea: use spread spectrum with only one single code (chipping sequence) for
spreading for all senders accessing according to aloha
1
0
sender A
sender B
0
1
narrow
band
send for a
shorter period
with higher power
spread the signal e.g. using the chipping sequence 110101 („CDMA without CD“)
t
Problem: find a chipping sequence with good characteristics
1
1
collision
Comparison SDMA/TDMA/FDMA/CDMA
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 35
Approach SDMA TDMA FDMA CDMA
Idea segment space into
cells/sectors
segment sending
time into disjoint
time-slots, demand
driven or fixed
patterns
segment the
frequency band into
disjoint sub-bands
spread the spectrum
using orthogonal codes
Terminals only one terminal can
be active in one
cell/one sector
all terminals are
active for short
periods of time on
the same frequency
every terminal has its
own frequency,
uninterrupted
all terminals can be active
at the same place at the
same moment,
uninterrupted
Signal
separation
cell structure, directed
antennas
synchronization in
the time domain
filtering in the
frequency domain
code plus special
receivers
Advantages very simple, increases
capacity per km²
established, fully
digital, flexible
simple, established,
robust
flexible, less frequency
planning needed, soft
handover
Dis-
advantages
inflexible, antennas
typically fixed
guard space
needed (multipath
propagation),
synchronization
difficult
inflexible,
frequencies are a
scarce resource
complex receivers, needs
more complicated power
control for senders
Comment only in combination
with TDMA, FDMA or
CDMA useful
standard in fixed
networks, together
with FDMA/SDMA
used in many
mobile networks
typically combined
with TDMA
(frequency hopping
patterns) and SDMA
(frequency reuse)
still faces some problems,
higher complexity,
lowered expectations; will
be integrated with
TDMA/FDMA

More Related Content

What's hot

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
ViVek Patel
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
MalshaniPrabodhika
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
Bharat Bhushan
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
Deepak Sharma
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
Madugula Kumar
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communication
Sajid ali
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
RCC Institute of Information Technology
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
MrajKumar11
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communication
Sajid ali
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction pr
sharmasantosh
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
Md. Saddam Hossain Noyon
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
ggpriya me
 

What's hot (20)

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Cdma
CdmaCdma
Cdma
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 
cdma
cdmacdma
cdma
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communication
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communication
 
Ons training day 1
Ons training day 1Ons training day 1
Ons training day 1
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction pr
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Tdm & fdm
Tdm & fdmTdm & fdm
Tdm & fdm
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 

Similar to Unit 1 part 2

Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM Collegegueste2620035
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
vish0110
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
ArunangshuChetia1
 
Apr7.pdf
Apr7.pdfApr7.pdf
Apr7.pdf
Anuradha Shukla
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)bheemsain
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
Time division multiple access
Time division multiple accessTime division multiple access
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshi
NajmulHoqueMunshi
 
CDMA,SDMA.pptx
CDMA,SDMA.pptxCDMA,SDMA.pptx
CDMA,SDMA.pptx
GANGA734939
 
3.final report
3.final report3.final report
3.final report
Khalid Ustad
 
3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx
ShashankMishra393695
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
NadaAAmin
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
NAVAMISURESH2
 
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
IJERA Editor
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
Sambasiva62
 

Similar to Unit 1 part 2 (20)

Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Mobile Communication MDM College
Mobile Communication MDM CollegeMobile Communication MDM College
Mobile Communication MDM College
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
 
Unit 2
Unit 2Unit 2
Unit 2
 
Apr7.pdf
Apr7.pdfApr7.pdf
Apr7.pdf
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshi
 
CDMA,SDMA.pptx
CDMA,SDMA.pptxCDMA,SDMA.pptx
CDMA,SDMA.pptx
 
3.final report
3.final report3.final report
3.final report
 
3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx3.TDMA ACCESS TECHNOLOGY.pptx
3.TDMA ACCESS TECHNOLOGY.pptx
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 

More from Vikram Nandini

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
Vikram Nandini
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
Vikram Nandini
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
Vikram Nandini
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
Vikram Nandini
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
Vikram Nandini
 
Ethics
EthicsEthics
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
Vikram Nandini
 
Manufacturing
ManufacturingManufacturing
Manufacturing
Vikram Nandini
 
Business Models
Business ModelsBusiness Models
Business Models
Vikram Nandini
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
Vikram Nandini
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
Vikram Nandini
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
Vikram Nandini
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
Vikram Nandini
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
Vikram Nandini
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
Vikram Nandini
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
Vikram Nandini
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Vikram Nandini
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
Vikram Nandini
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
Vikram Nandini
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
Vikram Nandini
 

More from Vikram Nandini (20)

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
 
Ethics
EthicsEthics
Ethics
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Business Models
Business ModelsBusiness Models
Business Models
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
ambekarshweta25
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Unit 1 part 2

  • 1. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 1
  • 2. Motivation forspecialized MAC  C a n we apply media access methods from fixednetworks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (legacy method in IEEE 802.3) Problems in wirelessnetworks signal strength decreases proportional to the square of the distance  the sender would apply CS and CD,but the collisions happen at thereceiver  i t might be the case that a sender cannot “hear” the collision, i.e., CD does not work furthermore, CS might not work if, e.g.,a terminal is“hidden” 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 2
  • 3. CSMA/CD fails in wireless N/w because CSMA/CD is not really interested in collisions at the sender , but rather in those at the receiver.  T h e signal should reach the receiver without collisions. But sender isthe one detecting collisions  This is not a problem using wire, asmore or less the same signal strength can be assumed all over the wire  T h e strength of a signal in wireless N/w decreases proportionally tothe square of the distance to the sender  T h e senderstart sending but a collision happens at the receiver due to a second sender. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 3
  • 4. Motivation: Hidden and exposed terminals • consider the scenario with three mobile phones as shown in Figure. • The transmission range of A reaches B, but not C(the detection range does not reach C either). The transmission range of C reaches B, but not A. • Finally, the transmission range of B reaches A and C, i.e A cannot detect C and vice versa. • 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 4
  • 5. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 5
  • 6. HiddenTerminals: A sends to B, C cannot receiveA C wants to send to B, C senses a “free” medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is “hidden” for C ,and vice versa. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 6
  • 7. Exposed Terminals: B sends toA, C wants to send to another terminal (notA or B) outsiderange C senses the carrier and detects that carrier is busy C postpones its transmission until it detects the medium as being idle again butA is outside the radio range of C, therefore waiting is not necessary C is “exposed” to B Hidden terminals cause collisions, where asExposed terminals causes unnecessary delay 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 7
  • 8. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 8
  • 9. Access methods SDMA/FDMA/TDMA/CDMA  SDMA (Space Division MultipleAccess) segment space into sectors, use directedantennas  cell structure  FDMA (Frequency Division MultipleAccess) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g.,radio broadcast), slow hopping (e.g.,GSM), fast hopping(FHSS, Frequency Hopping Spread Spectrum)  TDMA (Time Division MultipleAccess) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time  CDMA (Code Division MultipleAccess)  Same bandwidth is occupied by all the users however they are all assigned separate code 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 9
  • 10. SDMA  SDMA is used for allocating a separated space to users in wirelessnetworks.  A typical application involves assigning an optimal base station to a mobile phone user  T h e mobile phone may receive several base stations with differentquality.  A MAC algorithm could now decide which base station is best, taking into account with frequencies (FDM), time slots(TDM) or code(CDM) are still available(depending on technology) Typically SDMA is never used in isolation but always in combination with one or more other schemes  T h e basis for the SDMA algorithm is formed by cell and sectorized antennas which constitute the infrastructure implementing SDM 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 10
  • 11. FDMA ( Frequency Division Multiple Access)  FDMA assigns individual channels to individualusers  Eac h user is allocated a unique freq., band or channel These channels are assigned on demand to users who request service During the period of the call, no other user can share thesamechannel  T h e FDMA channel carries only one phone circuit at a time.  I f an FDMA channel is not in use, then it sits idle and can not be usedby other users.  FDMA requires tight RF filtering to minimize adjacentchannel interference 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 11
  • 12.  Uplink frequency:824-849MHZ  Downlink frequency:869-894MHZ  8 3 2 channels spaced 30KHZ apart(3users/channel)  48.6 kbpsbitrate  Used inAMPS(Analog cellular telephone systems)  Used FDD(Frequency DivisionDuplexing) 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 12
  • 13. Main features • Continuous transmission • Narrow bandwidth • Low overhead • Simple hardware at mobile unit and BS : (1) no digital processing needed (2) ease of framing and synchronization. • FDMA can be used with both analogue and digitalsignal. • FDMA requires high-performing filters in the radio hardware, in contrast toTDMA andCDMA. • FDMA is not vulnerable to the timing problems thatTDMAhas. • Due to the frequency filtering, FDMA is not sensitive to nearfar problem. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 13
  • 14. Advantages • I f channel is not in use, it sits idle • Channel bandwidth is relatively narrow(30kHz) • Simple algorithmically,and from a hardwarestandpoint • Fairly efficient when the number of stations is small andthetraffic is uniformly constant • Capacity increase can be obtained by reducing the information bit rate and using efficient digital code • No need for network timing • No restriction regarding the type of baseband or type of modulation 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 14
  • 15. Disadvantages • The presence of guardbands • Requires right RF filtering to minimize adjacent channel interference • Maximum bit rate per channel is fixed • Small inhibiting flexibility in bit rate capability • Does not differ significantly from analog system 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 15
  • 16. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 16 FDD/FDMA - general scheme, example GSM f t 124 1 124 1 20 MHz 200 kHz 890.2 MHz 935.2 MHz 915 MHz 960 MHz
  • 17. TDMA (Time Division Multiple Access) 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 17 • TDMA (Time Division MultipleAccess) System divide the ratio spectrum into time slots. • In each slot only one user is allowed to either transmit or receive • Each user occupies a cyclically repeating time slot transmission for any user is non continuous • Listening to different frequencies at the same time is quite difficult
  • 18. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. Uplink frequency:824-849MHZ Downlink frequency:869-894MHZ  832 channels spaced 30KHZ apart(3users/channel) 48.6 kbpsbitrate Used in DigitalAMPS(Advanced Mobile Phone systems) UsedTDD(Time Division Duplexing)
  • 19. MAIN FEATURES Shares single carrier frequency with multipleusers. Non-continuous transmission.This results in low battery consumption since the subscriber transmitter can be turned OFF when not in use. Slots can be assigned on demand in dynamicTDMA. TDMA uses different time slots forTx and Rx,thus duplexers are not required.  Global Systems for Mobile communications (GSM) uses the DMA technique 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 19
  • 20. Advantages  I t carry data rates of 64 kbps to 120 Mbps .  I t provides the user with extended battery life and talk time.  I t is the most cost effective technology to convert an analogue system to digital. TDMA technology separates users according to time, it ensures that there will be no interference TDMA allows the operator to do services like fax, voice band data, and SMS as well as bandwidth-intensive application such as multimedia and videoconferencing. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 20
  • 21. Disadvantages  Each user has a predefined time slot.When moving from one cell to other,if all the time slots in this cell are full the user might be disconnected.  I t is subjected to multipath distortion.A signal coming from atower to a handset might come from any one of several directions. It might have bounced off several different buildings before arriving. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 21
  • 22. TDD/TDMA - general scheme, example DECT 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 22 11 12 1 2 3 11 12 t downlink uplink 417 µs 1 2 3
  • 23. CDMA  CDMA (Code Division MultipleAccess) There is no restriction on time and frequency in thisscheme.  Parallel communication without collision and whole bandwidth canbe used Users are separated by code not by time slot and frequencyslot  A l l terminals send on the same frequency probably at the sametimeand can use the whole bandwidth of the transmission channel Eac h sender has a unique random number, the sender XORsthesignal with this random number  T h e receiver can “tune” into this signal if it knows the pseudorandom number, tuning is done via a correlation function 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 23
  • 24. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 24
  • 25. Advantages Potentially larger capacity (more users can communicate simultaneously) If users don’t use the medium all the time (e.g.,they are just reading email), CDMA will allowmuch more users to communicate simultaneously. CDMA will use the resource (the radio spectrum)more efficiently. Provides larger spread spectrum, thus more robustagainst noise bursts and multipath frequency selective fading  GSM bandwidth = 200kHz  IS-95 bandwidth = 1.25 MHz W-CDMA (3G) bandwidth = 10MHz 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 25
  • 26.  The transition from one BS to another (handoff) is not abrupt,as inTDMA,and provides better quality No absolute limit on the number of users Easy addition of moreusers Impossible for hackers to decipher the code sent Better signal quality Huge code space (e.g.232) compared to frequencyspace Interferences (e.g.white noise) is notcoded forward error correction and encryption can beeasily integrated 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 26
  • 27. Disadvantages:  A s the number of users increases, the overallquality of service decreases Self-jamming  Near- Far- problem arises Higher complexity of a receiver(receiver cannot just listen into the medium and start receiving if there is a signal)  A l l signals should have the same strengthat areceiver 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 27
  • 28. CDMA in theory SenderA  s e n d s Ad= 1,keyAk= 010011 (assign:“0”=-1,“1”=+1)  s e n d i n g signalAs=Ad*Ak= (-1,+1,-1,-1,+1,+1) Sender B  s e n d s Bd= 0, keyBk= 110101 (assign: “0”= -1, “1”= +1)  s e n d i n g signal Bs= Bd* Bk= (-1, -1, +1, -1, +1,-1) Both signals superimpose in space  interference neglected(noiseetc.)  A s + Bs= (-2,0,0,-2,+2,0) Receiver wants to receive signal from senderA  a p p l y keyAkbitwise (innerproduct)  Ae= (-2,0,0,-2,+2,0) Ak= 2 + 0 + 0 + 2 + 2 + 0 = 6  result greater than 0, therefore, original bit was “1”  r e c e i v i n g B  Be= (-2,0,0,-2,+2,0)  Bk= -2 + 0 + 0 - 2 - 2 + 0 = -6,i.e.“0” 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 28
  • 29. CDMA on signal level I 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 29 data A signal A key A key sequence A data  key Real systems use much longer keys resulting in a larger distance between single code words in code space. 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0 Ad Ak As
  • 30. CDMA on signal level II 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 30 signal A data B signal B As + Bs key B key sequence B data  key 1 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1 Bd Bk Bs As
  • 31. CDMA on signal level III 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 31 Ak (As + Bs) * Ak As + Bs data A 1 0 1 1 0 1 integrator output comparator output Ad
  • 32. CDMA on signal level IV 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 32 Bk (As + Bs) * Bk As + Bs data B 1 0 0 1 0 0 integrator output comparator output Bd
  • 33. CDMA on signal level V 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 33 wrong key K (As + Bs) * K As + Bs (0) (0) ? integrator output comparator output
  • 34. SAMA - Spread Aloha Multiple Access 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 34  Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time  Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha 1 0 sender A sender B 0 1 narrow band send for a shorter period with higher power spread the signal e.g. using the chipping sequence 110101 („CDMA without CD“) t Problem: find a chipping sequence with good characteristics 1 1 collision
  • 35. Comparison SDMA/TDMA/FDMA/CDMA 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 35 Approach SDMA TDMA FDMA CDMA Idea segment space into cells/sectors segment sending time into disjoint time-slots, demand driven or fixed patterns segment the frequency band into disjoint sub-bands spread the spectrum using orthogonal codes Terminals only one terminal can be active in one cell/one sector all terminals are active for short periods of time on the same frequency every terminal has its own frequency, uninterrupted all terminals can be active at the same place at the same moment, uninterrupted Signal separation cell structure, directed antennas synchronization in the time domain filtering in the frequency domain code plus special receivers Advantages very simple, increases capacity per km² established, fully digital, flexible simple, established, robust flexible, less frequency planning needed, soft handover Dis- advantages inflexible, antennas typically fixed guard space needed (multipath propagation), synchronization difficult inflexible, frequencies are a scarce resource complex receivers, needs more complicated power control for senders Comment only in combination with TDMA, FDMA or CDMA useful standard in fixed networks, together with FDMA/SDMA used in many mobile networks typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA