SlideShare une entreprise Scribd logo
1  sur  26
Wireless Communications Spread Spectrum....& more about CDMA
Spread Spectrum:  DS-SS, FH-SS, Coding Gain, Fading Margins
Key Digital Modulation Techniques: OFDM
Spread spectrum
Spread-spectrum ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Spread spectrum ,[object Object],[object Object],[object Object],[object Object]
Freq Hop Time Hop
Bandwidth Usage in CDMA 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Transmissions characteristics of cdma2000 (FDD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Walsh codes ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
CDMA uses spread spectrum Technology. cdmaOne™ identifies 2G and 2.5G cellular, PCS and wireless local loop (WLL) services based on the IS-95A and IS-95B CDMA air interface standards. IS-95A supports data delivery up to 14.4 kbps while IS-95B offers up to 115 kbps. CDMA2000 is an ITU-approved, IMT-2000 (3G) standard CDMA2000 1X can double voice capacity and delivers data rates up to 307 kbps CDMA2000 1xEV is optimized for high-speed data: CDMA2000 1xEV-DO uses a designated channel for data at speeds of up to 2.4 Mbps in a single carrier CDMA2000 1xEV-DV integrates voice and data on a single channel with speeds of up to 4.8 Mbps CDMA: the present and future
CDMA – Multiple Users
OFDM ,[object Object],[object Object],[object Object],[object Object],[object Object]
OFDM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overall spectrum of the simple OFDM signal shown with four subcarriers within. Note that the zero crossings all correspond to peaks of adjacent subcarriers .
conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effects of Fading
Irreducible Bit Error Rate due to multipath
Simulation of Fading and Multipath
Irreducible BER due to fading
Irreducible BER due to fading
BER due to fading & multipath

Contenu connexe

Tendances (20)

Cdma
CdmaCdma
Cdma
 
Cdma pdf
Cdma pdfCdma pdf
Cdma pdf
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
CDMA Presentation
CDMA PresentationCDMA Presentation
CDMA Presentation
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
An overwiew of cdma
An overwiew of cdmaAn overwiew of cdma
An overwiew of cdma
 
Cdma me
Cdma meCdma me
Cdma me
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
Basic cdma for 2 g and 3g
Basic cdma for 2 g and 3gBasic cdma for 2 g and 3g
Basic cdma for 2 g and 3g
 
Cdma
CdmaCdma
Cdma
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Ons training day 1
Ons training day 1Ons training day 1
Ons training day 1
 
CDMA Introducton
CDMA IntroductonCDMA Introducton
CDMA Introducton
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
Ai Cdma
Ai CdmaAi Cdma
Ai Cdma
 
CDMA
CDMACDMA
CDMA
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 

En vedette

Spread spectrum communications and CDMA
Spread spectrum communications and CDMASpread spectrum communications and CDMA
Spread spectrum communications and CDMAHossam Zein
 
MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?Alpen-Adria-Universität
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingChristian Kehl
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
 
Dsss final
Dsss finalDsss final
Dsss finalAJAL A J
 
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsRishab2612
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)danishrafiq
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Coding and testing in Software Engineering
Coding and testing in Software EngineeringCoding and testing in Software Engineering
Coding and testing in Software EngineeringAbhay Vijay
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 

En vedette (18)

Spread spectrum communications and CDMA
Spread spectrum communications and CDMASpread spectrum communications and CDMA
Spread spectrum communications and CDMA
 
MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
 
Jpeg 2000
Jpeg 2000Jpeg 2000
Jpeg 2000
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Hw2
Hw2Hw2
Hw2
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Cdma
CdmaCdma
Cdma
 
Dct and adaptive filters
Dct and adaptive filtersDct and adaptive filters
Dct and adaptive filters
 
Dsss final
Dsss finalDsss final
Dsss final
 
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 
Digital Communication Techniques
Digital Communication TechniquesDigital Communication Techniques
Digital Communication Techniques
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Jpeg2000
Jpeg2000Jpeg2000
Jpeg2000
 
Compression
CompressionCompression
Compression
 
Coding and testing in Software Engineering
Coding and testing in Software EngineeringCoding and testing in Software Engineering
Coding and testing in Software Engineering
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 

Similaire à CDMA Spread Spectrum & OFDM Technologies Explained

Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple accesssumanuppala1
 
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdfTech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdfSampathFernando12
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan ProfArshadAbbas
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless CommunicationsSuraj Katwal
 
wireless communication
wireless  communicationwireless  communication
wireless communicationcosmic123
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolutionSidra Mallick
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationsourabh kant
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsIjrdt Journal
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technologyAdams Firdaus
 
Cellular concept
Cellular conceptCellular concept
Cellular conceptgetvibha
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 

Similaire à CDMA Spread Spectrum & OFDM Technologies Explained (20)

Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdfTech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless Communications
 
wireless communication
wireless  communicationwireless  communication
wireless communication
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Report
ReportReport
Report
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systems
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
W cdma
W cdmaW cdma
W cdma
 
OFDM.ppt
OFDM.pptOFDM.ppt
OFDM.ppt
 
MODERN WIRELESS NETWORKS
MODERN WIRELESS NETWORKSMODERN WIRELESS NETWORKS
MODERN WIRELESS NETWORKS
 
ofdm
ofdmofdm
ofdm
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

CDMA Spread Spectrum & OFDM Technologies Explained

Notes de l'éditeur

  1. Fig. 2.12
  2. Fig. 2.13
  3. Fig. 2.14
  4. Fig. 2.16
  5. Fig. 2.16
  6. Fig. 2.16
  7. Fig. 2.16