SlideShare una empresa de Scribd logo
1 de 22
By : Nur Azlin Binti Razali
         Nur Fadzilah Binti Johar
Nur Fattahiah Binti Haslauhuddin
 Siti Norhidayah Binti Kamarudin
Introduction to CDMA
   CDMA (Code-Division Multiple Access) refers to any of several protocols
    used in so-called second-generation (2G) and third-generation (3G) wireless
    communications.

   As the term implies, CDMA is a form of multiplexing, which allows numerous
    signals to occupy a single transmission channel, optimizing the use of
    available bandwidth. The technology is used in ultra-high-frequency (UHF)
    cellular telephone systems in the 800-MHz and 1.9-GHz bands.

   All users can use same carrier frequency and may transmit simultaneously.
    Each user in a CDMA system uses a different code to modulate their signal.

   The best performance will occur when there is good separation between the
    signal of a desired user and the signals of other users.

   The separation of the signals is made by correlating the received signal with
    the locally generated code of the desired user. If the signal matches the
    desired user's code then the correlation function will be high and the system
    can extract that signal.
How CDMA works?
 The words "code" and "division" are important parts of
  how CDMA works.
 CDMA uses codes to convert between analog voice
  signals and digital signals and also uses codes to
  separate (or divide) voice and control data into data
  streams called "channels."
 CDMA converts speech into digital information, which is
  transmitted as a radio signal over wireless network.
 The unique about CDMA is that it uses a unique code to
  distinguish each different call, thus enabling many
  people to share the airwaves simultaneously; it thereby
  eliminates cross talk and interference.
 CDMA is also used in data technology apart from voice
  technology.
      There are five steps in generating a CDMA signal :
i)     analog to digital conversion
ii)    vocoding
iii)   encoding and interleaving
iv)    channelizing the signals
v)     conversion of the digital signals to a Radio Frequency
       (RF) signals
Analog to digital conversion
   The first step of CDMA signal generation
    is analog to digital conversion,
    sometimes called A/D conversion.
    CDMA uses a technique called Pulse
    Code Modulation (PCM) to accomplish
    A/D conversion.
Vocoding
   The second step of CDMA signal generation is voice compression
   Vocoder : to accomplish voice compression.
   The term "vocoder" is a contraction of the words "voice" and "code.
   Vocoders are located at the BSC and in the phone. People pause between
    syllables and words when they talk. CDMA takes advantage of these
    pauses in speech activity by using a variable rate vocoder. A CDMA vocoder
    varies compression of the voice signal into one of four data rates based on
    the rate of the user's speech activity.
Encoding and interleaving




   encoding and interleaving that is built into the
    BTS and the phones

    The purpose of the encoding and interleaving is
    to build redundancy into the signal so that
    information lost in transmission can be recovered
 The type of encoding done at this stage is
  called "convolutional encoding.
 A digital message consists of four bits (A, B, C,
  D) of vocoded data. Each bit is repeated three
  times. These encoded bits are called symbols.
 The decoder at the receiver uses a majority
  logic rule. Thus, if an error occurs, the
  redundancy can help recover the lost
  information.
 A burst error is a type of error in received
  digital telephone signals. Burst errors occur in
  clumps of adjacent symbols. These errors are
  caused by fading and interference. Encoding
  and interleaving reduce the effects of burst
  errors.
   Interleaving is a simple but powerful method of reducing the effects of burst
    errors and recovering lost bits. In the example shown here the symbols from
    each group are interleaved (or scrambled) in a pattern that the receiver knows.
    De-interleaving at the receiver unscrambles the bits, spreading any burst errors
    that occur during transmission.
   The encoded voice data is further encoded to separate
    it from other encoded voice data. The encoded symbols
    are then spread over the entire bandwidth of the CDMA
    channel. This process is called channelization. The
    receiver knows the code and uses it to recover the voice
    data.
Channelizing
 CDMA uses two important types of
  codes to channelize users.
 Walsh codes channelize users on the
  forward link (BTS to mobile).
 Pseudorandom Noise (PN) codes
  channelize users on the reverse link
  (mobile to BTS)
Conversion of the digital signals to a
    Radio Frequency (RF) signals


   The BTS combines channelized data from all
    calls into one signal. It then converts the
    digital signal to a Radio Frequency (RF)
    signal for transmission.
Architecture of CDMA
A CDMA network consists of the following
  components :

   Mobile Station (MS )
   Base Station ( BS )
   Base Station Controller ( BSC )
   Mobile Switching Center ( MSC )
   Home Location Register ( HLR )
   Visitor Location Register ( VLR )
   Authentication Center (AC)
   Operation and Administration (OAM)
cCOMPONENT                         FUNCTION
Mobile station                     The CDMA mobile station (or mobile phone) communicates with other parts of the system through
                                   the base station system.

Base station (BS)                  The base station (BS) handles the radio interface to the mobile station. The base station is the radio
                                   equipment (transceivers and antennas).

Base station Controller (BSC)      The BSC provides the control functions and physical links between the MSC and BTS. It provides
                                   functions such as hand cover, cell configuration data and control of RF power levels in as transceiver
                                   stations.

Mobile      switching     center The MSC performs the telephony switching functions of the system. Its also performs such functions
(MSC)                              as toll ticketing, network interfacing ,common channel signaling, and others.

Home location register (HLR)       The HLR database is used for storage and management of subscriptions. The home location register
                                   stores permanent data about subscribers, including a subscriber’s service profile, location
                                   information, and activity status.

Visitor location register (VLR) The VLR database contains temporary information about subscribers that is needed by the mobile
                                   services switching center (MSC) in order to service visiting subscribers. When a mobile station
                                   roams into a new mobile services switching center (MSC)
                                   Area, the visitor location register (VLR) connected to that MSC will request data about the mobile
                                   station from the HLR, reducing the need for interrogation of the home location register (HLR).


Authentication (AC)          The AC provides authentication and encryption parameters that verify the user’s identity and ensure
                             the confidentiality of each call. The authentication center (AUC) also protects network operators
                             from fraud.
Operation and administration The OAM is the functional entity from which the network operator monitors and control the system.
(OAM)                        The purpose of operation and support system is to offer support for centralized, regional and local
                             operational and maintenance activities that are required for a CDMA network.
Architecture of CDMA
Example CDMA 2nd Generation:
Architecture of CDMA
Example CDMA 3rd Generation:
CDMA Applications :
   One of the early applications for code division multiplexing
    is in GPS. This predates and is distinct from its use
    in mobile phones.
   The Qualcomm standard IS-95, marketed as cdma One.
   The Qualcomm standard IS-2000, known as CDMA2000.
    This standard is used by several mobile phone
    companies, including the Global star satellite
    phone network.
   The UMTS 3G mobile phone standard, which uses W-
    CDMA.
   CDMA has been used in the Omni TRACS satellite
    system for transportation logistic

Advantages of CDMa                     Disadvantages of CDMA

   more advanced digital interface
    technology                                one major problem in CDMA
                                               technology is channel
   the transmission power is
    extremely small, so conversation           polution,where signals from too
    is not only less radiation,                many cell sites are present in
                                               the subscriber’s phone but
    also longer battery life mobile
    phones.                                    none of them is dominant.(the
                                               quality of the audio degrades)
   better call quality, almost no noise
    when making a call,                       limited to North America and a
   there is no health adverse effects         few other places, GSM is
    because its radiation is negligible        worldwide
   faster download speeds                    limited variety of the handset
   best privacy (spread spectrum),            because at present the major
                                               mobile companies use GSM
   hardest to crack (the AIR
                                               technologies.
    INTERFACE)
   cost of calls is cheaper than in
    GSM.
ADVANTAGES                                 DISADVANTAGES



CDMA   •Increased cellular communications         •Due to its proprietary
       security.                                  nature, all of cdma’s
       •Simultaneous conversations                flaws are not known
       •Increased efficiency                      •CDMA is relatively new,
       •Smaller phones                            and all the network is not
       •Low power requirements and little cell-   as mature as GSM.
       to-cell coordination needed by             •Cannot offer
       operators.                                 international roaming
       •Extended reach
GSM    •Already used worldwide                    •Lack of access to
       •Permits international roaming             burgeoning American
       •More stable network                       market.
       •Smart cards that provide security data
       encryption
Frequency hopping CDMA
There are two kinds of frequency hopping ;
 Slow Frequency Hopping (SFH)
  In this case one or more data bits are
  transmitted within one hop. An advantage is
  that coherent data detection is possible. Often,
  systems using slow hopping also employ
  (burst) error control coding to restore loss of
  (multiple) bits in one hop.
 Fast Frequency Hopping (FFH)
  One data bit is divided over multiple hops. In
  fast hopping, coherent signal detection is
  difficult, and seldom used. Mostly, FSK or
  MFSK modulation is used.
Direct sequence CDMA
   In Direct Sequence spread spectrum transmission, the
    user data signal is multiplied by a code sequence. Mostly,
    binary sequences are used. The duration of an element in
    the code is called the "chip time". The ratio between the
    user symbol time and the chip time is called the spread
    factor. The transmit signal occupies a bandwidth that
    equals the spread factor times the bandwidth of the user
    data.
   As despreading is the same operation as spreading a
    possible narrowband jammer signal in the radio channel
    is spread before the detector. Thus, the jam signal is
    attenuated by the spread factor ("spreading gain").

Más contenido relacionado

La actualidad más candente

Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple accessShalikramRajpoot
 
OKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsOKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsMohammed Abuibaid
 
6. 2 ray propagation model part 2
6. 2 ray propagation model   part 26. 2 ray propagation model   part 2
6. 2 ray propagation model part 2JAIGANESH SEKAR
 
2.6 cellular concepts - frequency reusing, channel assignment
2.6   cellular concepts - frequency reusing, channel assignment2.6   cellular concepts - frequency reusing, channel assignment
2.6 cellular concepts - frequency reusing, channel assignmentJAIGANESH SEKAR
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniquesJAIGANESH SEKAR
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1JAIGANESH SEKAR
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesBibhu Prasad
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffsAJAL A J
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 

La actualidad más candente (20)

Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple access
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
FDMA & TDMA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
 
CDMA
CDMACDMA
CDMA
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 
Ofdm for wireless
Ofdm for wirelessOfdm for wireless
Ofdm for wireless
 
OKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation ModelsOKUMURA, HATA and COST231 Propagation Models
OKUMURA, HATA and COST231 Propagation Models
 
6. 2 ray propagation model part 2
6. 2 ray propagation model   part 26. 2 ray propagation model   part 2
6. 2 ray propagation model part 2
 
2.6 cellular concepts - frequency reusing, channel assignment
2.6   cellular concepts - frequency reusing, channel assignment2.6   cellular concepts - frequency reusing, channel assignment
2.6 cellular concepts - frequency reusing, channel assignment
 
Outdoor propagatiom model
Outdoor propagatiom modelOutdoor propagatiom model
Outdoor propagatiom model
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Prioritizing handoffs
Prioritizing handoffsPrioritizing handoffs
Prioritizing handoffs
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 
Mimo
MimoMimo
Mimo
 

Destacado

Destacado (14)

Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
CDMA
CDMACDMA
CDMA
 
Cdma system
Cdma systemCdma system
Cdma system
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma Anjan V1
Cdma  Anjan V1Cdma  Anjan V1
Cdma Anjan V1
 
Cd
CdCd
Cd
 
Cdma
CdmaCdma
Cdma
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction pr
 
CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
Ai Cdma
Ai CdmaAi Cdma
Ai Cdma
 

Similar a Cdma : mobile

Similar a Cdma : mobile (20)

Celluler telephone 2
Celluler telephone 2Celluler telephone 2
Celluler telephone 2
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
My Seminar
My SeminarMy Seminar
My Seminar
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
GSM
GSMGSM
GSM
 
Gsm
Gsm Gsm
Gsm
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
Unit 1
Unit 1Unit 1
Unit 1
 
G second generation network
G second generation networkG second generation network
G second generation network
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
Pawan..bsnl
Pawan..bsnlPawan..bsnl
Pawan..bsnl
 
Gsmadvanced
GsmadvancedGsmadvanced
Gsmadvanced
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Gsm1
Gsm1Gsm1
Gsm1
 
Gsm is
Gsm isGsm is
Gsm is
 
2g,3g,4g, technology Dialog axiata
2g,3g,4g, technology Dialog axiata2g,3g,4g, technology Dialog axiata
2g,3g,4g, technology Dialog axiata
 
Gsm technology. final seminar reportdocx
Gsm technology. final seminar reportdocxGsm technology. final seminar reportdocx
Gsm technology. final seminar reportdocx
 

Más de Azlin lolin

Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstAzlin lolin
 
Engineers in society
Engineers in societyEngineers in society
Engineers in societyAzlin lolin
 
nilai2 islam dlm agama lain
nilai2 islam dlm agama lainnilai2 islam dlm agama lain
nilai2 islam dlm agama lainAzlin lolin
 
Design of a rectangular patch antenna
Design of a rectangular patch antennaDesign of a rectangular patch antenna
Design of a rectangular patch antennaAzlin lolin
 
A better tomorrow
A better tomorrowA better tomorrow
A better tomorrowAzlin lolin
 
humidity sensor project
humidity sensor projecthumidity sensor project
humidity sensor projectAzlin lolin
 
Dato bahaman intro
Dato bahaman introDato bahaman intro
Dato bahaman introAzlin lolin
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurementAzlin lolin
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensorAzlin lolin
 

Más de Azlin lolin (11)

Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cst
 
Engineers in society
Engineers in societyEngineers in society
Engineers in society
 
nilai2 islam dlm agama lain
nilai2 islam dlm agama lainnilai2 islam dlm agama lain
nilai2 islam dlm agama lain
 
Design of a rectangular patch antenna
Design of a rectangular patch antennaDesign of a rectangular patch antenna
Design of a rectangular patch antenna
 
A better tomorrow
A better tomorrowA better tomorrow
A better tomorrow
 
humidity sensor project
humidity sensor projecthumidity sensor project
humidity sensor project
 
Burst
BurstBurst
Burst
 
Ese563
Ese563 Ese563
Ese563
 
Dato bahaman intro
Dato bahaman introDato bahaman intro
Dato bahaman intro
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurement
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensor
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Cdma : mobile

  • 1. By : Nur Azlin Binti Razali Nur Fadzilah Binti Johar Nur Fattahiah Binti Haslauhuddin Siti Norhidayah Binti Kamarudin
  • 2. Introduction to CDMA  CDMA (Code-Division Multiple Access) refers to any of several protocols used in so-called second-generation (2G) and third-generation (3G) wireless communications.  As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands.  All users can use same carrier frequency and may transmit simultaneously. Each user in a CDMA system uses a different code to modulate their signal.  The best performance will occur when there is good separation between the signal of a desired user and the signals of other users.  The separation of the signals is made by correlating the received signal with the locally generated code of the desired user. If the signal matches the desired user's code then the correlation function will be high and the system can extract that signal.
  • 3. How CDMA works?  The words "code" and "division" are important parts of how CDMA works.  CDMA uses codes to convert between analog voice signals and digital signals and also uses codes to separate (or divide) voice and control data into data streams called "channels."  CDMA converts speech into digital information, which is transmitted as a radio signal over wireless network.  The unique about CDMA is that it uses a unique code to distinguish each different call, thus enabling many people to share the airwaves simultaneously; it thereby eliminates cross talk and interference.  CDMA is also used in data technology apart from voice technology.
  • 4. There are five steps in generating a CDMA signal : i) analog to digital conversion ii) vocoding iii) encoding and interleaving iv) channelizing the signals v) conversion of the digital signals to a Radio Frequency (RF) signals
  • 5. Analog to digital conversion  The first step of CDMA signal generation is analog to digital conversion, sometimes called A/D conversion. CDMA uses a technique called Pulse Code Modulation (PCM) to accomplish A/D conversion.
  • 6. Vocoding  The second step of CDMA signal generation is voice compression  Vocoder : to accomplish voice compression.  The term "vocoder" is a contraction of the words "voice" and "code.  Vocoders are located at the BSC and in the phone. People pause between syllables and words when they talk. CDMA takes advantage of these pauses in speech activity by using a variable rate vocoder. A CDMA vocoder varies compression of the voice signal into one of four data rates based on the rate of the user's speech activity.
  • 7. Encoding and interleaving  encoding and interleaving that is built into the BTS and the phones  The purpose of the encoding and interleaving is to build redundancy into the signal so that information lost in transmission can be recovered
  • 8.  The type of encoding done at this stage is called "convolutional encoding.  A digital message consists of four bits (A, B, C, D) of vocoded data. Each bit is repeated three times. These encoded bits are called symbols.  The decoder at the receiver uses a majority logic rule. Thus, if an error occurs, the redundancy can help recover the lost information.  A burst error is a type of error in received digital telephone signals. Burst errors occur in clumps of adjacent symbols. These errors are caused by fading and interference. Encoding and interleaving reduce the effects of burst errors.
  • 9. Interleaving is a simple but powerful method of reducing the effects of burst errors and recovering lost bits. In the example shown here the symbols from each group are interleaved (or scrambled) in a pattern that the receiver knows. De-interleaving at the receiver unscrambles the bits, spreading any burst errors that occur during transmission.
  • 10. The encoded voice data is further encoded to separate it from other encoded voice data. The encoded symbols are then spread over the entire bandwidth of the CDMA channel. This process is called channelization. The receiver knows the code and uses it to recover the voice data.
  • 11. Channelizing CDMA uses two important types of codes to channelize users.  Walsh codes channelize users on the forward link (BTS to mobile).  Pseudorandom Noise (PN) codes channelize users on the reverse link (mobile to BTS)
  • 12. Conversion of the digital signals to a Radio Frequency (RF) signals  The BTS combines channelized data from all calls into one signal. It then converts the digital signal to a Radio Frequency (RF) signal for transmission.
  • 13. Architecture of CDMA A CDMA network consists of the following components :  Mobile Station (MS )  Base Station ( BS )  Base Station Controller ( BSC )  Mobile Switching Center ( MSC )  Home Location Register ( HLR )  Visitor Location Register ( VLR )  Authentication Center (AC)  Operation and Administration (OAM)
  • 14. cCOMPONENT FUNCTION Mobile station The CDMA mobile station (or mobile phone) communicates with other parts of the system through the base station system. Base station (BS) The base station (BS) handles the radio interface to the mobile station. The base station is the radio equipment (transceivers and antennas). Base station Controller (BSC) The BSC provides the control functions and physical links between the MSC and BTS. It provides functions such as hand cover, cell configuration data and control of RF power levels in as transceiver stations. Mobile switching center The MSC performs the telephony switching functions of the system. Its also performs such functions (MSC) as toll ticketing, network interfacing ,common channel signaling, and others. Home location register (HLR) The HLR database is used for storage and management of subscriptions. The home location register stores permanent data about subscribers, including a subscriber’s service profile, location information, and activity status. Visitor location register (VLR) The VLR database contains temporary information about subscribers that is needed by the mobile services switching center (MSC) in order to service visiting subscribers. When a mobile station roams into a new mobile services switching center (MSC) Area, the visitor location register (VLR) connected to that MSC will request data about the mobile station from the HLR, reducing the need for interrogation of the home location register (HLR). Authentication (AC) The AC provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call. The authentication center (AUC) also protects network operators from fraud. Operation and administration The OAM is the functional entity from which the network operator monitors and control the system. (OAM) The purpose of operation and support system is to offer support for centralized, regional and local operational and maintenance activities that are required for a CDMA network.
  • 15. Architecture of CDMA Example CDMA 2nd Generation:
  • 16. Architecture of CDMA Example CDMA 3rd Generation:
  • 17. CDMA Applications :  One of the early applications for code division multiplexing is in GPS. This predates and is distinct from its use in mobile phones.  The Qualcomm standard IS-95, marketed as cdma One.  The Qualcomm standard IS-2000, known as CDMA2000. This standard is used by several mobile phone companies, including the Global star satellite phone network.  The UMTS 3G mobile phone standard, which uses W- CDMA.  CDMA has been used in the Omni TRACS satellite system for transportation logistic 
  • 18. Advantages of CDMa Disadvantages of CDMA  more advanced digital interface technology  one major problem in CDMA technology is channel  the transmission power is extremely small, so conversation polution,where signals from too is not only less radiation, many cell sites are present in the subscriber’s phone but  also longer battery life mobile phones. none of them is dominant.(the quality of the audio degrades)  better call quality, almost no noise when making a call,  limited to North America and a  there is no health adverse effects few other places, GSM is because its radiation is negligible worldwide  faster download speeds  limited variety of the handset  best privacy (spread spectrum), because at present the major mobile companies use GSM  hardest to crack (the AIR technologies. INTERFACE)  cost of calls is cheaper than in GSM.
  • 19.
  • 20. ADVANTAGES DISADVANTAGES CDMA •Increased cellular communications •Due to its proprietary security. nature, all of cdma’s •Simultaneous conversations flaws are not known •Increased efficiency •CDMA is relatively new, •Smaller phones and all the network is not •Low power requirements and little cell- as mature as GSM. to-cell coordination needed by •Cannot offer operators. international roaming •Extended reach GSM •Already used worldwide •Lack of access to •Permits international roaming burgeoning American •More stable network market. •Smart cards that provide security data encryption
  • 21. Frequency hopping CDMA There are two kinds of frequency hopping ;  Slow Frequency Hopping (SFH) In this case one or more data bits are transmitted within one hop. An advantage is that coherent data detection is possible. Often, systems using slow hopping also employ (burst) error control coding to restore loss of (multiple) bits in one hop.  Fast Frequency Hopping (FFH) One data bit is divided over multiple hops. In fast hopping, coherent signal detection is difficult, and seldom used. Mostly, FSK or MFSK modulation is used.
  • 22. Direct sequence CDMA  In Direct Sequence spread spectrum transmission, the user data signal is multiplied by a code sequence. Mostly, binary sequences are used. The duration of an element in the code is called the "chip time". The ratio between the user symbol time and the chip time is called the spread factor. The transmit signal occupies a bandwidth that equals the spread factor times the bandwidth of the user data.  As despreading is the same operation as spreading a possible narrowband jammer signal in the radio channel is spread before the detector. Thus, the jam signal is attenuated by the spread factor ("spreading gain").