The document discusses different media access methods for wireless networks, including their advantages and disadvantages. It begins by explaining why CSMA/CD is not suitable for wireless due to signal strength decreasing with distance and the possibility of collisions occurring at the receiver instead of the sender. It then discusses four main media access methods - SDMA, FDMA, TDMA, and CDMA. For each method, it provides a brief overview and examples of technologies that use each method, as well as their key features, advantages, and disadvantages. Hidden and exposed terminals problems that can occur in wireless networks are also explained.
This presentation based on TDMA technology,How it works,comparison between TDMA,FDMA,CDMA,Advantages and disadvantages of TDMA,Synchronization of TDMA and Evolution of TDMA
Presentation on MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION By SUPRIYA BHARATI (ME/EC/10006/16) and KHUSHBOO KUMARI (ME/EC/10010/16) Under the Guidance of Dr. Sanjay Kumar Department of Electronics & Communication Engg. (ECE) Birla Institute of Technology, Mesra ,Ranchi-835215 , Jharkhand , India
This presentation based on TDMA technology,How it works,comparison between TDMA,FDMA,CDMA,Advantages and disadvantages of TDMA,Synchronization of TDMA and Evolution of TDMA
Presentation on MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION By SUPRIYA BHARATI (ME/EC/10006/16) and KHUSHBOO KUMARI (ME/EC/10010/16) Under the Guidance of Dr. Sanjay Kumar Department of Electronics & Communication Engg. (ECE) Birla Institute of Technology, Mesra ,Ranchi-835215 , Jharkhand , India
The Media Access Control (MAC) data communication protocol sub-layer, also known as the
Medium Access Control, is a sublayer of the Data Link Layer specified in the seven-layer OSI
model (layer 2). The hardware that implements the MAC is referred to as a Medium Access
Controller. The MAC sub-layer acts as an interface between the Logical Link Control (LLC)
sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical
communication channel in a multi-point network. This channel may provide unicast, multicast or
broadcast communication service.
Why Mimo Dual Circular Polarisation Multiple Access Technique to Increase Sat...IJERA Editor
All multiple access techniques (like FDMA, TDMA, CDMA and combination thereof) are used to share the common node (satellite) for multiple users which are widely spread over a distance of thousands of rule or so. All these techniques have their own specific application, but none of the technique can increase the channel capacity dictated by Shannon Hartley Law. But MIMO is one such spatial division multiple access (SDMS) technique which increases channel capacity due to the fact that many parallel stream are transmitted from physically separate antenna and similarly there are many separate corresponding receive antennas. This not at present feasibly at satellites due to constraint of volume, weight & large physical size of many antennas to be used on Board Satellite. To counter this, dual circular polarisation is one technique which can be employed by using one antenna with a little more complicated feed on board satellite. By experiments it is found that a gain of 2-3 db can be achieved by using Dual circular Polarised Transmission & reception. This gain can be utilised either to increase link reliability or for increased data rate etc.
What -IoT
Why - IoT
Why - IoT
IoT is enabling Technology to ML, DL, AI and Data Science
Applications
IoT Product Development – Entrepreneurs
Research Gap
Online Tools
Linux commands working with file contents:
head, tail, cat, tac, more, less and strings, more file
attributes: hard links, symbolic links, fins, umask
and inodes The Linux file tree: the root directory, binary
directories, configuration directories, data
directories, Commands and arguments: $PATH,
echo, ls, env
Discussed on
Introduction to Linux: Linux history,
distributions, licensing, Linux commands: man
pages, commands working with directories,
absolute and relative paths
commands working with files: file, touch, rm, cp,
mv and rename, general purpose utilities: cal,
date, script, who, tty, pwd, ps, uname
Discussed about
An overview – Object basics – Object state and properties – Behavior – Methods – Messages –
Information hiding – Class hierarchy – Relationships – Associations – Aggregations- Identity –
Dynamic binding – Persistence – Metaclasses – Object oriented system development life cycle.
Discussed about:
A Short History of Business Models
The Business Model Canvas
Who is the Business Model for
Models
Funding an IoT Start-up
Lean Start-ups
Discussed about the following topics: A Web Security Forensic Lesson
Web Languages
Introduction to different web attacks
overview of n-tier web applications
Web servers
Apache
IIS
Database Servers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
2. Motivation forspecialized
MAC
C a n we apply media access methods from fixednetworks?
Example CSMA/CD
Carrier Sense Multiple Access with Collision Detection
send as soon as the medium is free, listen into the medium if a collision occurs
(legacy method in IEEE 802.3)
Problems in wirelessnetworks
signal strength decreases proportional to the square of the distance
the sender would apply CS and CD,but the collisions happen at thereceiver
i t might be the case that a sender cannot “hear” the collision, i.e., CD does not
work
furthermore, CS might not work if, e.g.,a terminal is“hidden”
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 2
3. CSMA/CD fails in wireless N/w because CSMA/CD is not really interested
in collisions at the sender , but rather in those at the receiver.
T h e signal should reach the receiver without collisions. But sender isthe one
detecting collisions
This is not a problem using wire, asmore or less the same signal
strength can be assumed all over the wire
T h e strength of a signal in wireless N/w decreases proportionally tothe square
of the distance to the sender
T h e senderstart sending but a collision happens at the receiver due to a
second sender.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 3
4. Motivation: Hidden and exposed terminals
• consider the scenario with three mobile phones as shown in Figure.
• The transmission range of A reaches B, but not C(the detection range
does not reach C either). The transmission range of C reaches B, but
not A.
• Finally, the transmission range of B reaches A and C, i.e A cannot
detect C and vice versa.
•
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 4
6. HiddenTerminals:
A sends to B, C cannot receiveA
C wants to send to B, C senses a “free”
medium (CS fails)
collision at B, A cannot receive the collision
(CD fails)
A is “hidden” for C ,and vice versa.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 6
7. Exposed Terminals:
B sends toA, C wants to send to another terminal (notA or B)
outsiderange
C senses the carrier and detects that carrier is busy
C postpones its transmission until it detects the medium as being
idle again
butA is outside the radio range of C, therefore waiting is not
necessary
C is “exposed” to B
Hidden terminals cause collisions, where asExposed terminals
causes unnecessary delay
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 7
9. Access methods SDMA/FDMA/TDMA/CDMA
SDMA (Space Division MultipleAccess)
segment space into sectors, use directedantennas
cell structure
FDMA (Frequency Division MultipleAccess)
assign a certain frequency to a transmission channel between a sender and a
receiver
permanent (e.g.,radio broadcast), slow hopping (e.g.,GSM), fast hopping(FHSS,
Frequency Hopping Spread Spectrum)
TDMA (Time Division MultipleAccess)
assign the fixed sending frequency to a transmission channel between a sender
and a receiver for a certain amount of time
CDMA (Code Division MultipleAccess)
Same bandwidth is occupied by all the users however they are all assigned separate code
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 9
10. SDMA
SDMA is used for allocating a separated space to users in wirelessnetworks.
A typical application involves assigning an optimal base station to a mobile
phone user
T h e mobile phone may receive several base stations with differentquality.
A MAC algorithm could now decide which base station is best, taking into
account with frequencies (FDM), time slots(TDM) or code(CDM) are still
available(depending on technology)
Typically SDMA is never used in isolation but always in combination with one
or more other schemes
T h e basis for the SDMA algorithm is formed by cell and sectorized antennas
which constitute the infrastructure implementing SDM
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 10
11. FDMA ( Frequency Division Multiple Access)
FDMA assigns individual channels to individualusers
Eac h user is allocated a unique freq., band or channel
These channels are assigned on demand to users who request service
During the period of the call, no other user can share thesamechannel
T h e FDMA channel carries only one phone circuit at a time.
I f an FDMA channel is not in use, then it sits idle and can not be usedby other
users.
FDMA requires tight RF filtering to minimize adjacentchannel
interference
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 11
13. Main features
• Continuous transmission
• Narrow bandwidth
• Low overhead
• Simple hardware at mobile unit and BS : (1) no digital
processing needed (2) ease of framing and synchronization.
• FDMA can be used with both analogue and digitalsignal.
• FDMA requires high-performing filters in the radio hardware, in
contrast toTDMA andCDMA.
• FDMA is not vulnerable to the timing problems thatTDMAhas.
• Due to the frequency filtering, FDMA is not sensitive to nearfar
problem.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 13
14. Advantages
• I f channel is not in use, it sits idle
• Channel bandwidth is relatively narrow(30kHz)
• Simple algorithmically,and from a hardwarestandpoint
• Fairly efficient when the number of stations is small andthetraffic is
uniformly constant
• Capacity increase can be obtained by reducing the
information bit rate and using efficient digital code
• No need for network timing
• No restriction regarding the type of baseband or type of
modulation
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 14
15. Disadvantages
• The presence of guardbands
• Requires right RF filtering to minimize adjacent channel interference
• Maximum bit rate per channel is fixed
• Small inhibiting flexibility in bit rate capability
• Does not differ significantly from analog system
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 15
16. 10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 16
FDD/FDMA - general scheme, example GSM
f
t
124
1
124
1
20 MHz
200 kHz
890.2 MHz
935.2 MHz
915 MHz
960 MHz
17. TDMA (Time Division Multiple Access)
10/10/2019
Vikram Neerugatti, SVCET,
Chittoor, Andhra Pradesh.
17
• TDMA (Time Division MultipleAccess) System divide the ratio
spectrum into time slots.
• In each slot only one user is allowed to either transmit or receive
• Each user occupies a cyclically repeating time slot
transmission for any user is non continuous
• Listening to different frequencies at the same time is quite difficult
19. MAIN FEATURES
Shares single carrier frequency with multipleusers.
Non-continuous transmission.This results in low battery
consumption since the subscriber transmitter can be turned OFF
when not in use.
Slots can be assigned on demand in dynamicTDMA.
TDMA uses different time slots forTx and Rx,thus
duplexers are not required.
Global Systems for Mobile communications (GSM) uses the DMA
technique
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 19
20. Advantages
I t carry data rates of 64 kbps to 120 Mbps .
I t provides the user with extended battery life and talk time.
I t is the most cost effective technology to convert an
analogue system to digital.
TDMA technology separates users according to time, it
ensures that there will be no interference
TDMA allows the operator to do services like fax, voice band data,
and SMS as well as bandwidth-intensive application such as
multimedia and videoconferencing.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 20
21. Disadvantages
Each user has a predefined time slot.When moving from one
cell to other,if all the time slots in this cell are full the user might
be disconnected.
I t is subjected to multipath distortion.A signal coming from atower
to a handset might come from any one of several directions. It might
have bounced off several different buildings before arriving.
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 21
22. TDD/TDMA - general scheme, example DECT
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 22
11 12 1 2 3 11 12
t
downlink uplink
417 µs
1 2 3
23. CDMA
CDMA (Code Division MultipleAccess)
There is no restriction on time and frequency in thisscheme.
Parallel communication without collision and whole bandwidth canbe used
Users are separated by code not by time slot and frequencyslot
A l l terminals send on the same frequency probably at the sametimeand can
use the whole bandwidth of the transmission channel
Eac h sender has a unique random number, the sender XORsthesignal
with this random number
T h e receiver can “tune” into this signal if it knows the pseudorandom
number, tuning is done via a correlation function
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 23
25. Advantages
Potentially larger capacity (more users can communicate
simultaneously) If users don’t use the medium all the time (e.g.,they
are just reading email), CDMA will allowmuch more users to
communicate simultaneously.
CDMA will use the resource (the radio spectrum)more
efficiently.
Provides larger spread spectrum, thus more robustagainst noise
bursts and multipath frequency selective fading
GSM bandwidth = 200kHz
IS-95 bandwidth = 1.25 MHz
W-CDMA (3G) bandwidth = 10MHz
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 25
26. The transition from one BS to another (handoff) is not abrupt,as
inTDMA,and provides better quality No absolute limit on the
number of users
Easy addition of moreusers
Impossible for hackers to decipher the code sent
Better signal quality
Huge code space (e.g.232) compared to frequencyspace
Interferences (e.g.white noise) is notcoded
forward error correction and encryption can beeasily
integrated
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 26
27. Disadvantages:
A s the number of users increases, the overallquality of service
decreases
Self-jamming
Near- Far- problem arises
Higher complexity of a receiver(receiver cannot just listen into
the medium and start receiving if there is a signal)
A l l signals should have the same strengthat areceiver
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 27
28. CDMA in theory
SenderA
s e n d s Ad= 1,keyAk= 010011 (assign:“0”=-1,“1”=+1)
s e n d i n g signalAs=Ad*Ak= (-1,+1,-1,-1,+1,+1)
Sender B
s e n d s Bd= 0, keyBk= 110101 (assign: “0”= -1, “1”= +1)
s e n d i n g signal Bs= Bd* Bk= (-1, -1, +1, -1, +1,-1)
Both signals superimpose in space
interference neglected(noiseetc.)
A s + Bs= (-2,0,0,-2,+2,0)
Receiver wants to receive signal from senderA
a p p l y keyAkbitwise (innerproduct)
Ae= (-2,0,0,-2,+2,0) Ak= 2 + 0 + 0 + 2 + 2 + 0 = 6
result greater than 0, therefore, original bit was “1”
r e c e i v i n g B
Be= (-2,0,0,-2,+2,0) Bk= -2 + 0 + 0 - 2 - 2 + 0 = -6,i.e.“0”
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 28
29. CDMA on signal level I
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 29
data A
signal A
key A
key
sequence A
data key
Real systems use much longer keys resulting in a larger distance
between single code words in code space.
1 0 1
0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1
1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
Ad
Ak
As
30. CDMA on signal level II
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh.
30
signal A
data B
signal B
As + Bs
key B
key
sequence B
data key
1 0 0
0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1
1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
Bd
Bk
Bs
As
31. CDMA on signal level III
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 31
Ak
(As + Bs)
* Ak
As + Bs
data A
1 0 1
1 0 1
integrator
output
comparator
output
Ad
32. CDMA on signal level IV
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 32
Bk
(As + Bs)
* Bk
As + Bs
data B
1 0 0
1 0 0
integrator
output
comparator
output
Bd
33. CDMA on signal level V
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 33
wrong
key K
(As + Bs)
* K
As + Bs
(0) (0) ?
integrator
output
comparator
output
34. SAMA - Spread Aloha Multiple Access
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 34
Aloha has only a very low efficiency, CDMA needs complex receivers to be able to
receive different senders with individual codes at the same time
Idea: use spread spectrum with only one single code (chipping sequence) for
spreading for all senders accessing according to aloha
1
0
sender A
sender B
0
1
narrow
band
send for a
shorter period
with higher power
spread the signal e.g. using the chipping sequence 110101 („CDMA without CD“)
t
Problem: find a chipping sequence with good characteristics
1
1
collision
35. Comparison SDMA/TDMA/FDMA/CDMA
10/10/2019 Vikram Neerugatti, SVCET, Chittoor, Andhra Pradesh. 35
Approach SDMA TDMA FDMA CDMA
Idea segment space into
cells/sectors
segment sending
time into disjoint
time-slots, demand
driven or fixed
patterns
segment the
frequency band into
disjoint sub-bands
spread the spectrum
using orthogonal codes
Terminals only one terminal can
be active in one
cell/one sector
all terminals are
active for short
periods of time on
the same frequency
every terminal has its
own frequency,
uninterrupted
all terminals can be active
at the same place at the
same moment,
uninterrupted
Signal
separation
cell structure, directed
antennas
synchronization in
the time domain
filtering in the
frequency domain
code plus special
receivers
Advantages very simple, increases
capacity per km²
established, fully
digital, flexible
simple, established,
robust
flexible, less frequency
planning needed, soft
handover
Dis-
advantages
inflexible, antennas
typically fixed
guard space
needed (multipath
propagation),
synchronization
difficult
inflexible,
frequencies are a
scarce resource
complex receivers, needs
more complicated power
control for senders
Comment only in combination
with TDMA, FDMA or
CDMA useful
standard in fixed
networks, together
with FDMA/SDMA
used in many
mobile networks
typically combined
with TDMA
(frequency hopping
patterns) and SDMA
(frequency reuse)
still faces some problems,
higher complexity,
lowered expectations; will
be integrated with
TDMA/FDMA