SlideShare una empresa de Scribd logo
1 de 35
 Multiple access schemes allow many mobile users to
share a finite amount of radio spectrum in efficient
manner
 High quality of communications must be maintained
during the sharing process
 Duplexing scheme provides us mechanism to
support simultaneous DL and UL communication
 FDD: UL and DL communication are separated in
frequency domain by assigning two different
frequency
 TDD : UL and DL communication takes place
over same frequency but different instant of time
but this time is too small to perceived by us.
•Frequency Division Multiple Access (FDMA)
•Time Division Multiple Access (TDMA)
•Code Division Multiple Access (CDMA)
•Space Division Multiple Access (SDMA)
CONTENTION FREE MULTIPLE ACCESS TECHNIQUE ARE
BASED ON FREQUENCY, TIME ,CODE AND SPACE
DOMAIN.
N=(Bt-2Bg)/Bc
Where
: BC indicates coherence bandwidth
: Bg indicates guard band
: Bt represent transmission band width.
FDMA has a drawback that if a channel is assigned
to the user most of time it is idle.
Bandwidth requirement is more.
Lower spectral efficiency.
TDMA systems divide each FDMA
channe line to time slots.
Each user occupies a cyclically
repeating time slot.
TDMA can allow different number of
time slots for separate user
PREAMBLE
INFORMATI
ON
MESSAGE
TRAIL BITS
SLOT 1 SLOT 2 …….. SLOT N
TRAIL BIT SYNC BIT INFORMATI-
ON BIT
GUARD BITS
 Data Transmission for user of TDMA system occurs in
discrete bursts
 The result is low battery consumption
 Handoff process is simpler
 TDMA has higher data rate compare to FDMA
 For high data rate implies small symbol duration which
is more prone to ISI .
 Since different slots are used for T and R, duplexers are
not required.
 Using nonlinear power amplifier in FDMA creates
undesirable effect such effect are very less in TDMA.
 It enables more efficient use of spectrum as there is no
need of guard band.
 TDMA incurs high synchronization overhead compare
to FDMA.
Bt = Total number of bits per frame
= TF X R
 The actual transmission bandwidth of an individual
signal is made many times wider intentionally.
 Several users are allowed to access same wider band
simultaneously.
 Band width of individual
 Bandwidth of an individual signal is Bs and after it
spreading it become Bss. Then gain processing is
defined as
Gp=Bss/Bs
Similarly processing gain is also defined as
Gp=Rc/Rb
Spreading result in lower power spectral density since
power spreads uniformly over the entire spread spectrum.
After de-spreading original power spectral density is
recovered.
A filtering operation removes most of the noise and
interferences.
 Spreading of signal seems to inefficient utilization of
bandwidth since a single user uses much wider
bandwidth than it actually requires. However spread
spectrum is designed to use multiuser ,where multi
users access same spectrum, without interfering one
another, result in a bandwidth efficient system.
 Spread spectrum technique offer much higher tolerance
to noise and interference.
 It is much difficult to detect, intercept, anr jam the
spread signal compare to narrowband original signal.
Therefore spread spectrum technique can be used to
defeat enemy jamming or any intentional or
unintentional interference.
 The frequency reuse distance is limited by co-channel
interference in system using TDMA and FDMA.
In DSSS technique before transmission , the high data rate
pseudorandom sequence is directly used as a spreading
code.
Each user is given a unique PN sequence, which is used at
receiver by intended user to de-spread the received
bandwidth.
The multiple access technique based on DSSS is known as
code division multiple access scheme.
In CDMA full frequency band is available to a user for
entire duration of time .
There is no division in frequency domain or time domain.
Unique codes are assigned to different user, on the basis of
which the users are distinguished from one another.
In CDMA, in order to spread the digital data is multiplied
by PN sequence before transmission. At the receiver end ,
the received signal is again multiplied by the de-spreading
code, which is same as PN sequence
•CDMA offers soft capacity. In CDMA number of users
are determined by numbers of orthogonal code but
practically it is not true.
•In CDMA system as the number of user increases noise
increasing level of noise causes degradation in system
performance
•CDMA is affected by near far effect.
•CDMA permits using same set of frequency in all the cell
. This eliminate the frequency planning.
 In FHSS, total system bandwidth is divided into a
number of smaller bandwidth. During transmission a
user does not stick to particular sub-band rather it
keeps changing from ine sub band to another.
 In FHSS, different user are identified based on their
frequency hop pattern. There is dynamic change in
transmission frequency takes place so it becomes
robust in case of jamming and interferences.
When interval of frequency hopping is larger than the
symbol duration then it is said to be SFH. In this case
frequency hopping rate is slower than transmission rate.
Fast frequency hop takes place when the frequency
hoping rate is equal or exceed the transmission rate or
in one symbol duration one or more frequency hopping
takes place.
 In THSS a transmission frame is divided into a number
of equal intervals of time slots. During transmission it
does not stick to a particular time slot rather it keep
changing in from one slot to another.
 In FHSS scheme intended receiver must have the
knowledge of time hop pattern in order to de-hop and
recover the transmitted signal.
 SDMA is a multiple access technique, takes the
advantage of the directional nature of space. Using a
directional antenna the transmission power is focused
in a desired direction and reduces the interferences.
 SDMA can be used in combination with other multiple
access technique, since user in different space domain
can use the same frequency, time and code resources,
without creating interferences.
 FDMA/TDMA indicates a hybrid multiple access
technique, which includes combination of both TDMA
and FDMA.
 FDMA/TDMA/FDD scheme as used in GSM.
 TDMA/FHMA , this hybrid technique is also known as
TDFH .
 DSMA/FHMA this hybrid technique is also known as
DS/FHMA.
 MCMA is unlike FDMA where the system bandwidth
is not divided in sub-band rather different independent
sub-carrier constitute a composite wider system
bandwidth.
 There is no frequency hopping in MCMA but the
subcarrier frequency of a particular user can be
changed.
 Orthogonal supports orthogonal relationship among the
subcarrier which permits subcarrier to be packed
together with minimum adjacent channel interference
between them. OFDM is considered as the key
technology for higher spectral efficiency and operation
over scalable bandwidth. In OFDMA different subset of
sub-carrier are to the different users in dynamic
manner in a multi user scenario.
 It is modified version of OFDMA.
 The main disadvantage of OFDMA is high peak to
average power ratio, which result in low power
amplifier efficiency.
 More power consumption.
 SC-FDMA permits only adjacent subcarrier to be
allocated together so the lowering of PAPRSC-
OFDMA has been used in UL of LTE cellular system.
MC-CDMA combines OFDMA with frequency domain
spreading, while MC-DS-CDMA combines OFDMA with time
division spreading.
Both the schemes are advantageous in term of spectral
efficiency , flexibility and narrow band interference rejection
capabilities
Data stream is subdivided into number of sub stream each sub
stream is spreading in time using the spreading code and then
transmitted over the orthogonal subcarrier.
 The contention based multiple access scheme helps to
serve a large number of user with minimum overhead.
 It offer flexibility and freedom for in order to gain
access only when required. Such flexibility and
freedom result in collision and may require
retransmission.
 The contention based multiple access scheme follows
certain protocol.
It may function without co-ordinator or with limited
coordinator to realize to realize collision resolution.
The random access protocol does not require any call
set up procedure and is based on ALOHA protocol.
Contention based multiple access scheme is known as
packet radio multiple access scheme.
The performance of contention based multiple access
scheme is generally evaluated in term of delay and
throughput.
In ALOHA each user transmits its data whenever it has
data to send. The ALOHA based protocol may be placed
in three categories , pure ALOHA , slotted ALOHA, and
reserved ALOHA.
 Pure ALOHA assumes that there are number of users
operating independently. A user transmit data packet
when it has data to sent and a simple procedure.
 After transmitting the packet the user wait for an
acknowledgment ACK from the receiver. The waiting
period is called round trip delay. If the ACK is received
it is assumed that data is received.
 If ACK is not received the packet is assumed to be lost
and retransmit the data.
 All the data packet are assumed to be of equal length L,
arriving randomly from a large number of users. If the
average transmission rate is
THROUGHPUT
– Measures fracture of time channel is used
– No power limitations
– Doesn’t measure true rate
ASSUMPTIONS
– Retransmission required for any packet overlap
– Normalize slot time to 1
– Infinite number of nodes
– Poisson packet arrivals at rate l.
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION

Más contenido relacionado

La actualidad más candente

Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communicationstooty s
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
 
2.2 frequency division multiple access
2.2   frequency division multiple access2.2   frequency division multiple access
2.2 frequency division multiple accessJAIGANESH SEKAR
 
LTE TDD Technology Overview
LTE TDD Technology OverviewLTE TDD Technology Overview
LTE TDD Technology OverviewGoing LTE
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniquesparamsidhu89
 
10. types of small scale fading
10. types of small scale fading10. types of small scale fading
10. types of small scale fadingJAIGANESH SEKAR
 
GSM Architecture.ppt
GSM Architecture.pptGSM Architecture.ppt
GSM Architecture.pptMohammed Amer
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Cellular technology overview
Cellular technology overviewCellular technology overview
Cellular technology overviewLee Chang Fatt
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentationayodejieasy
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPTMelkamu Deressa
 
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...UthsoNandy
 

La actualidad más candente (20)

Tdd Versus Fdd
Tdd Versus FddTdd Versus Fdd
Tdd Versus Fdd
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
2.2 frequency division multiple access
2.2   frequency division multiple access2.2   frequency division multiple access
2.2 frequency division multiple access
 
Ofdma
OfdmaOfdma
Ofdma
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
 
LTE TDD Technology Overview
LTE TDD Technology OverviewLTE TDD Technology Overview
LTE TDD Technology Overview
 
Radio propagation
Radio propagationRadio propagation
Radio propagation
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
10. types of small scale fading
10. types of small scale fading10. types of small scale fading
10. types of small scale fading
 
GSM Architecture.ppt
GSM Architecture.pptGSM Architecture.ppt
GSM Architecture.ppt
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Cellular technology overview
Cellular technology overviewCellular technology overview
Cellular technology overview
 
Fading Seminar
Fading SeminarFading Seminar
Fading Seminar
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPT
 
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
Multiplexing & DE Multiplexing( Time Division Multiplexing(TDM) & Frequency D...
 

Similar a B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION

Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Soumen Santra
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessvish0110
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access proceduresabishajesus
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...IJTET Journal
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communicationSajid ali
 
Common protocols
Common protocolsCommon protocols
Common protocolsMr SMAK
 
Lecture 07
Lecture 07Lecture 07
Lecture 07Chyon Ju
 
Vhdl implementation of ofdm transmitter
Vhdl  implementation  of ofdm transmitterVhdl  implementation  of ofdm transmitter
Vhdl implementation of ofdm transmitterrajeshr0009
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesAnil Nigam
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptxSaemaAzim
 

Similar a B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION (20)

Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
three
threethree
three
 
MA Presentation.pptx
MA Presentation.pptxMA Presentation.pptx
MA Presentation.pptx
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
Apr7.pdf
Apr7.pdfApr7.pdf
Apr7.pdf
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communication
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Hp3414121418
Hp3414121418Hp3414121418
Hp3414121418
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Vhdl implementation of ofdm transmitter
Vhdl  implementation  of ofdm transmitterVhdl  implementation  of ofdm transmitter
Vhdl implementation of ofdm transmitter
 
doc_raj.docx
doc_raj.docxdoc_raj.docx
doc_raj.docx
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum Techniques
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptx
 

Último

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Último (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION

  • 1.
  • 2.  Multiple access schemes allow many mobile users to share a finite amount of radio spectrum in efficient manner  High quality of communications must be maintained during the sharing process  Duplexing scheme provides us mechanism to support simultaneous DL and UL communication
  • 3.  FDD: UL and DL communication are separated in frequency domain by assigning two different frequency  TDD : UL and DL communication takes place over same frequency but different instant of time but this time is too small to perceived by us.
  • 4.
  • 5. •Frequency Division Multiple Access (FDMA) •Time Division Multiple Access (TDMA) •Code Division Multiple Access (CDMA) •Space Division Multiple Access (SDMA) CONTENTION FREE MULTIPLE ACCESS TECHNIQUE ARE BASED ON FREQUENCY, TIME ,CODE AND SPACE DOMAIN.
  • 6. N=(Bt-2Bg)/Bc Where : BC indicates coherence bandwidth : Bg indicates guard band : Bt represent transmission band width. FDMA has a drawback that if a channel is assigned to the user most of time it is idle. Bandwidth requirement is more. Lower spectral efficiency.
  • 7. TDMA systems divide each FDMA channe line to time slots. Each user occupies a cyclically repeating time slot. TDMA can allow different number of time slots for separate user
  • 8. PREAMBLE INFORMATI ON MESSAGE TRAIL BITS SLOT 1 SLOT 2 …….. SLOT N TRAIL BIT SYNC BIT INFORMATI- ON BIT GUARD BITS
  • 9.  Data Transmission for user of TDMA system occurs in discrete bursts  The result is low battery consumption  Handoff process is simpler  TDMA has higher data rate compare to FDMA  For high data rate implies small symbol duration which is more prone to ISI .  Since different slots are used for T and R, duplexers are not required.
  • 10.  Using nonlinear power amplifier in FDMA creates undesirable effect such effect are very less in TDMA.  It enables more efficient use of spectrum as there is no need of guard band.  TDMA incurs high synchronization overhead compare to FDMA.
  • 11. Bt = Total number of bits per frame = TF X R
  • 12.  The actual transmission bandwidth of an individual signal is made many times wider intentionally.  Several users are allowed to access same wider band simultaneously.  Band width of individual  Bandwidth of an individual signal is Bs and after it spreading it become Bss. Then gain processing is defined as
  • 13. Gp=Bss/Bs Similarly processing gain is also defined as Gp=Rc/Rb Spreading result in lower power spectral density since power spreads uniformly over the entire spread spectrum. After de-spreading original power spectral density is recovered. A filtering operation removes most of the noise and interferences.
  • 14.  Spreading of signal seems to inefficient utilization of bandwidth since a single user uses much wider bandwidth than it actually requires. However spread spectrum is designed to use multiuser ,where multi users access same spectrum, without interfering one another, result in a bandwidth efficient system.
  • 15.  Spread spectrum technique offer much higher tolerance to noise and interference.  It is much difficult to detect, intercept, anr jam the spread signal compare to narrowband original signal. Therefore spread spectrum technique can be used to defeat enemy jamming or any intentional or unintentional interference.  The frequency reuse distance is limited by co-channel interference in system using TDMA and FDMA.
  • 16. In DSSS technique before transmission , the high data rate pseudorandom sequence is directly used as a spreading code. Each user is given a unique PN sequence, which is used at receiver by intended user to de-spread the received bandwidth. The multiple access technique based on DSSS is known as code division multiple access scheme.
  • 17. In CDMA full frequency band is available to a user for entire duration of time . There is no division in frequency domain or time domain. Unique codes are assigned to different user, on the basis of which the users are distinguished from one another. In CDMA, in order to spread the digital data is multiplied by PN sequence before transmission. At the receiver end , the received signal is again multiplied by the de-spreading code, which is same as PN sequence
  • 18. •CDMA offers soft capacity. In CDMA number of users are determined by numbers of orthogonal code but practically it is not true. •In CDMA system as the number of user increases noise increasing level of noise causes degradation in system performance •CDMA is affected by near far effect. •CDMA permits using same set of frequency in all the cell . This eliminate the frequency planning.
  • 19.  In FHSS, total system bandwidth is divided into a number of smaller bandwidth. During transmission a user does not stick to particular sub-band rather it keeps changing from ine sub band to another.  In FHSS, different user are identified based on their frequency hop pattern. There is dynamic change in transmission frequency takes place so it becomes robust in case of jamming and interferences.
  • 20. When interval of frequency hopping is larger than the symbol duration then it is said to be SFH. In this case frequency hopping rate is slower than transmission rate. Fast frequency hop takes place when the frequency hoping rate is equal or exceed the transmission rate or in one symbol duration one or more frequency hopping takes place.
  • 21.  In THSS a transmission frame is divided into a number of equal intervals of time slots. During transmission it does not stick to a particular time slot rather it keep changing in from one slot to another.  In FHSS scheme intended receiver must have the knowledge of time hop pattern in order to de-hop and recover the transmitted signal.
  • 22.  SDMA is a multiple access technique, takes the advantage of the directional nature of space. Using a directional antenna the transmission power is focused in a desired direction and reduces the interferences.  SDMA can be used in combination with other multiple access technique, since user in different space domain can use the same frequency, time and code resources, without creating interferences.
  • 23.  FDMA/TDMA indicates a hybrid multiple access technique, which includes combination of both TDMA and FDMA.  FDMA/TDMA/FDD scheme as used in GSM.  TDMA/FHMA , this hybrid technique is also known as TDFH .  DSMA/FHMA this hybrid technique is also known as DS/FHMA.
  • 24.  MCMA is unlike FDMA where the system bandwidth is not divided in sub-band rather different independent sub-carrier constitute a composite wider system bandwidth.  There is no frequency hopping in MCMA but the subcarrier frequency of a particular user can be changed.
  • 25.  Orthogonal supports orthogonal relationship among the subcarrier which permits subcarrier to be packed together with minimum adjacent channel interference between them. OFDM is considered as the key technology for higher spectral efficiency and operation over scalable bandwidth. In OFDMA different subset of sub-carrier are to the different users in dynamic manner in a multi user scenario.
  • 26.  It is modified version of OFDMA.  The main disadvantage of OFDMA is high peak to average power ratio, which result in low power amplifier efficiency.  More power consumption.  SC-FDMA permits only adjacent subcarrier to be allocated together so the lowering of PAPRSC- OFDMA has been used in UL of LTE cellular system.
  • 27. MC-CDMA combines OFDMA with frequency domain spreading, while MC-DS-CDMA combines OFDMA with time division spreading. Both the schemes are advantageous in term of spectral efficiency , flexibility and narrow band interference rejection capabilities Data stream is subdivided into number of sub stream each sub stream is spreading in time using the spreading code and then transmitted over the orthogonal subcarrier.
  • 28.  The contention based multiple access scheme helps to serve a large number of user with minimum overhead.  It offer flexibility and freedom for in order to gain access only when required. Such flexibility and freedom result in collision and may require retransmission.  The contention based multiple access scheme follows certain protocol.
  • 29. It may function without co-ordinator or with limited coordinator to realize to realize collision resolution. The random access protocol does not require any call set up procedure and is based on ALOHA protocol. Contention based multiple access scheme is known as packet radio multiple access scheme. The performance of contention based multiple access scheme is generally evaluated in term of delay and throughput.
  • 30. In ALOHA each user transmits its data whenever it has data to send. The ALOHA based protocol may be placed in three categories , pure ALOHA , slotted ALOHA, and reserved ALOHA.
  • 31.  Pure ALOHA assumes that there are number of users operating independently. A user transmit data packet when it has data to sent and a simple procedure.  After transmitting the packet the user wait for an acknowledgment ACK from the receiver. The waiting period is called round trip delay. If the ACK is received it is assumed that data is received.  If ACK is not received the packet is assumed to be lost and retransmit the data.
  • 32.
  • 33.  All the data packet are assumed to be of equal length L, arriving randomly from a large number of users. If the average transmission rate is
  • 34. THROUGHPUT – Measures fracture of time channel is used – No power limitations – Doesn’t measure true rate ASSUMPTIONS – Retransmission required for any packet overlap – Normalize slot time to 1 – Infinite number of nodes – Poisson packet arrivals at rate l.