SlideShare une entreprise Scribd logo
1  sur  36
CDMA
-
CONCEPT
• Based upon technology known as Spread
Spectrum.
• While CDMA focuses on multiple access,
Spread Spectrum offers a lot more.
STORY OF SPREAD SPECTRUM
INVENTION
• The frequency hopping technique was
invented by the actress Hedy Lamarr, bor
in Austria in 1914.
• She married Friedrich Mandl, who was in
the Defence Manufacturing business.
• During WW II, she attended many of her
husband’s business meetings.
STORY
• She learned about the problems of remote
controlled torpedoes used by the marines.
• Wirelessly controlled by English &
Americans to direct them against German
ships.
• Because the accuracy was not good,
manual fine tuning was needed.
STORY
• For the wireless control, a narrow band
signal was used.
• Once the German discovered the control
signal they could easily jam that signal.
• Hedy Lamarr came up with the idea of
multiple frequencies.
STORY
• She said that the comm should take place
on one freq at a time and then jump to
another channel fast enough so as not to
give enough time to tune in the new freq to
jam it.
• The change in freq should not be
predictable to the enemy.
STORY
• Lamarr’s problem was that this freq
hopping pattern had to be synchronized
between the sender on the boat and the
receiver in the torpedo.
• After some time, Lamarr’s friend George
Antheil came up with a solution.
STORY
• Antheil had a bar in Paris with automatic
pianos that were played by a piano roll.
• The roll had perforations in it which told
the piano which keys had to be played and
for how long.
• 88 perforations were possible in parallel.
STORY
• A tracker ball like thing was used to sense
the holes and give command to piano.
• The same mechanism was thought of for
the torpedo to keep synchronization.
• In 1962, spread spectrum was used by
military for the first time in Cuba crisis.
PRINCIPLE OF SPREAD SPECTRUM
• It gained popularity through the needs of
military communications.
• In contrast to narrow band comm, it is
more resistant to hostile jammers and
more difficult to intercept – fundamental
conditions for tactile comm.
PRINCIPLE OF SPREAD SPECTRUM
• For a comm system to be considered as Spread
Spectrum, the criteria to be satisfied are:
 BW of the transmitted spread signal has to be
greater than the information BW (this criterion is
also satisfied by FM, PCM and DM)
 The spread signal is composed of the
information signal and the spreading sequence.
The spreading sequence has to be independent
from the information in the statistical sense.
PRINCIPLE OF SPREAD SPECTRUM
• The ratio of the spreading BW Bs to info
BW Bi is denoted as the processing gain
Gspreading = Bs/Bi of a spread spectrum system.
• The processing gain does not combat
white noise with FM and PCM because
the spread signal is independent of
information signal.
PRINCIPLE OF SPREAD SPECTRUM
• However, spread spectrum signals offer
the following advantages for a wireless
comm system:
 spread spectrum modulation is capable of
dealing with the multi path signals
resulting from the radio channel.
These signals can be considered as
interference and therefore be suppressed.
PRINCIPLE OF SPREAD SPECTRUM
 the receiver of a spread spectrum system is
able to distinguish between different transmitted
signals using the spreading sequence.
Spreading sequence design is very important for
multiple access capability. The spreading
sequence is actually the identification for a
transmitter-receiver pair.
 Other advantages such as low probability Of
interception, privacy and anti-jamming capability
are more relevant for military needs.
SPREADING TECHNIQUES
• SPREAD SPECTRUM TECHNIQUES
DIRECT SEQUENCE TIME HOPPING FREQ HOPPING HYBRID
WIDEBAND NARROW BAND SLOW FAST
DS/FH DS/TH FH/TH DS/FH/TH
SPREADING TECHNIQUES
• In DSSS transmitter, the info signal is
directly modulated by a spreading
sequence.
• Main feature of DSSS is that multiple
access capability can be achieved without
synchronization between different
transmitters.
SPREADING TECHNIQUES
• FHSS systems periodically change the
carrier freq of the modulated information
signal in a random fashion.
• During a time interval thop the freq is
constant.
• Afterwards both the sender and receiver
hop to another frequency.
SPREADING TECHNIQUES
• The whole BW B is divided into freq slices. The
set of available frequencies is called a hop set
with N freq slices.
• FHSS systems differ radically from DSSS
systems in terms of freq occupancy.
• While DSSS systems occupy the whole BW all
the time, FHSS systems use only one freq slice
at any point in time.
SPREADING TECHNIQUES
• If one info bit is transmitted over several freq
slices the freq hopper is referred to as fast.
• If several bits are transmitted over one freq slice
it is referred to as a slow hopper.
• The relation of hop duration to info bit duration
depends upon the number of hops per info bits.
SPREADING TECHNIQUES
• The adv of FHSS systems over DSSS systems is the
less strict synchronization requirement.
• Within THSS, the time axis is divided into frames.
• A single wireless terminal (WT) will use only one slot out
of k possible slots within one frame. Within this slot, the
WT sends with a k times higher data rate in contrast to
the situation in which the WT would transmit within the
whole frame.
SPREADING TECHNIQUES
• Interference among simultaneous wireless terminals can
be minimized if coordination between terminals can be
achieved.
• This also avoids the near-far effect.
• In the absence of coordination, situations occur in which
more than one terminal uses a time slot.
• The receiver will not be able to detect either of the
signals correctly.
SPREADING TECHNIQUES
• Both terminals collide on the wireless link.
For such cases, error correction schemes
are required.
• Time hoppers have nearly the same
acquisition time as that of discrete
sequence systems, but their
implementation is much simpler than that
of a freq hopper.
SPREADING TECHNIQUES
• HSSS consist of combination of two or
more basic SS systems.
• Complexity of Tx and Rx increases but
offers a combination of their advantages.
SPREADING TECHNIQUES
• DSSS:
• Advantages:
o Best behaviour for multi-path rejection
o Best anti-jam rejection
o Best interference rejection
o No synchronization among terminals
o Simple implementation
o Most difficult to detect
SPREADING TECHNIQUES
• DSSS:
• Disadvantages:
 Near-far problem
 Require coherent bandwidth
 Long acquisition time
 Synchronization of code signal within
fraction of chip time.
SPREADING TECHNIQUES
• FH:
• Advantages:
 great amount of spreading
No need of coherent BW
Short acquisition time
Inherent security
Less effected by the near-far effect
SPREADING TECHNIQUES
• FH:
• Disadvantages:
 Complex hardware
 Error correction is needed
SPREADING TECHNIQUES
• TH:
• Advantages:
High BW efficiency
Less complex hardware
Less affected by the near-far effect
SPREADING TECHNIQUES
• TH:
• Disadvantages:
 Error correction is needed
 Long acquisition time
CDMA BASICS
• In FDMA the users are separated in the
frequency domain and in TDMA the users
are separated in time domain.
• Basically, FDMA and TDMA assign
particular frequency or time slices to
different wireless terminals.
CDMA BASICS
• When all slices are occupied in the
system, no additional wireless terminal
can be accommodated.
• Multiple access capability is also provided
by CDMA.
• The most common technique of CDMA
are FH-CDMA or DS-CDMA.
CDMA BASICS
• CDMA allows multiple users to
simultaneously use a common channel
for transmission of information.
• A CDMA transmitter will code its
information with a code or spreading
sequence particularly allocated for that
user.
CDMA BASICS
• Afterwards, the transmitter sends the
coded signal to the receiver. Using the
same code sequence, the receiver
decodes the received signal.
• The bandwidth of the coded signal is
much larger than the information
bandwidth.
CDMA BASICS
• One may say that the information signal
was spread, where spread refers to the
broadening of the signal spectrum in the
frequency domain.
• The coding process is therefore also
called spread spectrum modulation while
the coded signal is called a spread
spectrum signal.
CDMA BASICS
• The spreading of the information signal
gives CDMA its multiple access capability.
• The main feature of CDMA system using
pseudo noise sequences is that it can
tolerate overload in terms of number of
simultaneously supported users.
• In CDMA, system capacity is not fixed.
CDMA BASICS

Contenu connexe

Tendances

multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communicationSajid ali
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communicationSajid ali
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communicationMadugula Kumar
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesAnil Nigam
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Accessguest734441
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532kassayemamo
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrumKashif Amjad
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple AccessVishal Pawar
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniquesparamsidhu89
 

Tendances (20)

multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communication
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Ssma
SsmaSsma
Ssma
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 
multiple access techniques for wireless communication
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communication
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum Techniques
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
Cdma
CdmaCdma
Cdma
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Access
 
cdma
cdmacdma
cdma
 
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONMULTIPLE ACCESS IN WIRELESS COMMUNICATION
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
TDMA
TDMATDMA
TDMA
 

En vedette

Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
Spread spectrum communications and CDMA
Spread spectrum communications and CDMASpread spectrum communications and CDMA
Spread spectrum communications and CDMAHossam Zein
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction prsharmasantosh
 
CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1Tempus Telcosys
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation finalAmit Gaikwad
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 
Cdma system
Cdma systemCdma system
Cdma systemtrimba
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 

En vedette (16)

Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
Spread spectrum communications and CDMA
Spread spectrum communications and CDMASpread spectrum communications and CDMA
Spread spectrum communications and CDMA
 
Cd
CdCd
Cd
 
Cdma : mobile
Cdma : mobileCdma : mobile
Cdma : mobile
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction pr
 
CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
Ai Cdma
Ai CdmaAi Cdma
Ai Cdma
 
Cdma system
Cdma systemCdma system
Cdma system
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
CDMA
CDMACDMA
CDMA
 

Similaire à Cdma

scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple accesssumanuppala1
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrumSHALINI a
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaShadab Siddiqui
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
CDMA.pdf
CDMA.pdfCDMA.pdf
CDMA.pdfTroll9
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxNAVAMISURESH2
 
Unit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptxUnit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptx222pavankoteswararao
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 

Similaire à Cdma (20)

scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Satellite access
Satellite accessSatellite access
Satellite access
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdma
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
CDMA.pdf
CDMA.pdfCDMA.pdf
CDMA.pdf
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
Unit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptxUnit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptx
 
Spread spectrum technics
Spread spectrum technicsSpread spectrum technics
Spread spectrum technics
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Multiplexing
Multiplexing Multiplexing
Multiplexing
 
Hybrid m-a-t
Hybrid m-a-tHybrid m-a-t
Hybrid m-a-t
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Cdma

  • 2. CONCEPT • Based upon technology known as Spread Spectrum. • While CDMA focuses on multiple access, Spread Spectrum offers a lot more.
  • 3. STORY OF SPREAD SPECTRUM INVENTION • The frequency hopping technique was invented by the actress Hedy Lamarr, bor in Austria in 1914. • She married Friedrich Mandl, who was in the Defence Manufacturing business. • During WW II, she attended many of her husband’s business meetings.
  • 4. STORY • She learned about the problems of remote controlled torpedoes used by the marines. • Wirelessly controlled by English & Americans to direct them against German ships. • Because the accuracy was not good, manual fine tuning was needed.
  • 5. STORY • For the wireless control, a narrow band signal was used. • Once the German discovered the control signal they could easily jam that signal. • Hedy Lamarr came up with the idea of multiple frequencies.
  • 6. STORY • She said that the comm should take place on one freq at a time and then jump to another channel fast enough so as not to give enough time to tune in the new freq to jam it. • The change in freq should not be predictable to the enemy.
  • 7. STORY • Lamarr’s problem was that this freq hopping pattern had to be synchronized between the sender on the boat and the receiver in the torpedo. • After some time, Lamarr’s friend George Antheil came up with a solution.
  • 8. STORY • Antheil had a bar in Paris with automatic pianos that were played by a piano roll. • The roll had perforations in it which told the piano which keys had to be played and for how long. • 88 perforations were possible in parallel.
  • 9. STORY • A tracker ball like thing was used to sense the holes and give command to piano. • The same mechanism was thought of for the torpedo to keep synchronization. • In 1962, spread spectrum was used by military for the first time in Cuba crisis.
  • 10. PRINCIPLE OF SPREAD SPECTRUM • It gained popularity through the needs of military communications. • In contrast to narrow band comm, it is more resistant to hostile jammers and more difficult to intercept – fundamental conditions for tactile comm.
  • 11. PRINCIPLE OF SPREAD SPECTRUM • For a comm system to be considered as Spread Spectrum, the criteria to be satisfied are:  BW of the transmitted spread signal has to be greater than the information BW (this criterion is also satisfied by FM, PCM and DM)  The spread signal is composed of the information signal and the spreading sequence. The spreading sequence has to be independent from the information in the statistical sense.
  • 12. PRINCIPLE OF SPREAD SPECTRUM • The ratio of the spreading BW Bs to info BW Bi is denoted as the processing gain Gspreading = Bs/Bi of a spread spectrum system. • The processing gain does not combat white noise with FM and PCM because the spread signal is independent of information signal.
  • 13. PRINCIPLE OF SPREAD SPECTRUM • However, spread spectrum signals offer the following advantages for a wireless comm system:  spread spectrum modulation is capable of dealing with the multi path signals resulting from the radio channel. These signals can be considered as interference and therefore be suppressed.
  • 14. PRINCIPLE OF SPREAD SPECTRUM  the receiver of a spread spectrum system is able to distinguish between different transmitted signals using the spreading sequence. Spreading sequence design is very important for multiple access capability. The spreading sequence is actually the identification for a transmitter-receiver pair.  Other advantages such as low probability Of interception, privacy and anti-jamming capability are more relevant for military needs.
  • 15. SPREADING TECHNIQUES • SPREAD SPECTRUM TECHNIQUES DIRECT SEQUENCE TIME HOPPING FREQ HOPPING HYBRID WIDEBAND NARROW BAND SLOW FAST DS/FH DS/TH FH/TH DS/FH/TH
  • 16. SPREADING TECHNIQUES • In DSSS transmitter, the info signal is directly modulated by a spreading sequence. • Main feature of DSSS is that multiple access capability can be achieved without synchronization between different transmitters.
  • 17. SPREADING TECHNIQUES • FHSS systems periodically change the carrier freq of the modulated information signal in a random fashion. • During a time interval thop the freq is constant. • Afterwards both the sender and receiver hop to another frequency.
  • 18. SPREADING TECHNIQUES • The whole BW B is divided into freq slices. The set of available frequencies is called a hop set with N freq slices. • FHSS systems differ radically from DSSS systems in terms of freq occupancy. • While DSSS systems occupy the whole BW all the time, FHSS systems use only one freq slice at any point in time.
  • 19. SPREADING TECHNIQUES • If one info bit is transmitted over several freq slices the freq hopper is referred to as fast. • If several bits are transmitted over one freq slice it is referred to as a slow hopper. • The relation of hop duration to info bit duration depends upon the number of hops per info bits.
  • 20. SPREADING TECHNIQUES • The adv of FHSS systems over DSSS systems is the less strict synchronization requirement. • Within THSS, the time axis is divided into frames. • A single wireless terminal (WT) will use only one slot out of k possible slots within one frame. Within this slot, the WT sends with a k times higher data rate in contrast to the situation in which the WT would transmit within the whole frame.
  • 21. SPREADING TECHNIQUES • Interference among simultaneous wireless terminals can be minimized if coordination between terminals can be achieved. • This also avoids the near-far effect. • In the absence of coordination, situations occur in which more than one terminal uses a time slot. • The receiver will not be able to detect either of the signals correctly.
  • 22. SPREADING TECHNIQUES • Both terminals collide on the wireless link. For such cases, error correction schemes are required. • Time hoppers have nearly the same acquisition time as that of discrete sequence systems, but their implementation is much simpler than that of a freq hopper.
  • 23. SPREADING TECHNIQUES • HSSS consist of combination of two or more basic SS systems. • Complexity of Tx and Rx increases but offers a combination of their advantages.
  • 24. SPREADING TECHNIQUES • DSSS: • Advantages: o Best behaviour for multi-path rejection o Best anti-jam rejection o Best interference rejection o No synchronization among terminals o Simple implementation o Most difficult to detect
  • 25. SPREADING TECHNIQUES • DSSS: • Disadvantages:  Near-far problem  Require coherent bandwidth  Long acquisition time  Synchronization of code signal within fraction of chip time.
  • 26. SPREADING TECHNIQUES • FH: • Advantages:  great amount of spreading No need of coherent BW Short acquisition time Inherent security Less effected by the near-far effect
  • 27. SPREADING TECHNIQUES • FH: • Disadvantages:  Complex hardware  Error correction is needed
  • 28. SPREADING TECHNIQUES • TH: • Advantages: High BW efficiency Less complex hardware Less affected by the near-far effect
  • 29. SPREADING TECHNIQUES • TH: • Disadvantages:  Error correction is needed  Long acquisition time
  • 30. CDMA BASICS • In FDMA the users are separated in the frequency domain and in TDMA the users are separated in time domain. • Basically, FDMA and TDMA assign particular frequency or time slices to different wireless terminals.
  • 31. CDMA BASICS • When all slices are occupied in the system, no additional wireless terminal can be accommodated. • Multiple access capability is also provided by CDMA. • The most common technique of CDMA are FH-CDMA or DS-CDMA.
  • 32. CDMA BASICS • CDMA allows multiple users to simultaneously use a common channel for transmission of information. • A CDMA transmitter will code its information with a code or spreading sequence particularly allocated for that user.
  • 33. CDMA BASICS • Afterwards, the transmitter sends the coded signal to the receiver. Using the same code sequence, the receiver decodes the received signal. • The bandwidth of the coded signal is much larger than the information bandwidth.
  • 34. CDMA BASICS • One may say that the information signal was spread, where spread refers to the broadening of the signal spectrum in the frequency domain. • The coding process is therefore also called spread spectrum modulation while the coded signal is called a spread spectrum signal.
  • 35. CDMA BASICS • The spreading of the information signal gives CDMA its multiple access capability. • The main feature of CDMA system using pseudo noise sequences is that it can tolerate overload in terms of number of simultaneously supported users. • In CDMA, system capacity is not fixed.