SlideShare une entreprise Scribd logo
1  sur  16
CDMA
What is
CDMA?
The term “CDMA” (Code Division Multiple
Access) refers to both a spread spectrum
technique and a cellular standards.
Initially it was restricted to the armed
forces, this technology was commercially
launched in 1995.
Multiple access basically means that
information by several transmitters can be
sent simultaneously onto a single
communication channel.
There are multiple users which are provided or assigned variant CDMA
codes and thus the users can access the entire band of frequencies or
the whole bandwidth.
This method does not limit the frequency range of the user. Hence,
with the help of CDMA, multiple users can share a band of frequencies
without any kind of undue interference between them.
CDMA makes the use of spectrum technology along with analog to
digital conversion(ADC).
It is thus used by various radio communication technologies. Mainly, it
is used for mobile communication.
History of CDMA
• The CDMA technology was originated during World War II.
• It was developed by English allies for protection of their wireless
transmissions from jamming from enemies.
• This technology was patented by Qualcomm post war and was made
commercially available for use.
• The first CDMA system was launched in 1995 in Hongkong by Hutchison
Telephone Company.
How it Works?
• Code: It refers to the string of binary sequence that the
transmitter and the receiver share. This code encodes the
information into a low frequency signal before it is
transmitted over a channel. This same code is used by the
receiver to decode the information. The receiver gets the
code with the help of the nearest base station.
• Division: In CDMA a single channel is divided into
numerous slots which can be used by multiple users. This
is possible because of the use of unique code.
• Multiple Accesses: Due to code based communication,
multiple users can communicate and access the same
channel simultaneously without any undesirable
interference and loses.
Features of CDMA
Some of the key features of CDMA are:
• Used in Global Positioning System (GPS)
• Every channel uses full available spectrum
• Better capacity for voice and data communications
• CDMA does not require synchronization
• Allocation of code word to each user helps to reduce interference
• Used by several mobile companies (Qualcomm standard IS-2000 known as CDMA2000)
• Emits less radiation
• Faster data transfers
• CDMA supports high speed push to talk and push to email services
• UTMS 3G mobile phone standard uses W-CDMA
• OmniTRACS satellite system uses CDMA for transportation
Encoder for DS-SS CDMA
• The input provided to the CDMA encoder can be in the form of Pulse
code modulation (PCM) encoded voice band signal or can be a digital
signal from computer.
• It is multiplied with N bit, which is a unique chip code.
• The output of balanced modulator is the product code.
• In IF carrier it is used as an PSK modulation.
• The balanced modulator is sometimes referred to as multiplier.
• Further the modulated signal is then converted to RF band and is used
for transmission purpose.
• The high-power amplifier basically raises the level of power to a very
high level and then the antennas transmit this signal.
• The encoder is also called as multiplexer.
Decoder for DS-SS CDMA
• The decoder helps in reconverting the RF signal to IF.
• A coherent PSK carrier is been obtained from IF.
• The chip code is been used by the receiver and it helps in synchronizing the receiver
station’s code generator.
• The recovered chip is then multiplied with recovered PSK carrier to generate PSK
modulated signal which contains PSK carrier and the chip code.
• The IF signal which is received, contains chip code, PSK carrier and data. In correlator it
is compared with the received IF signal.
• The correlator helps in comparing this two signals and helps in recovering the original
data.
• The decoder is also called as demultiplexer.
Limitations of CDMA
• Some of the Limitations of CDMA are:
• A large code length could induce delay or interference
• Time synchronization is required
• Reduction in capacity due to gradual transfers
• Constant tight power control is required resulting in multiple handovers (Causing dropped calls)
Types of CDMA Technologies
There are two types of CDMA technologies:
• Synchronous CDMA (orthogonal codes)
• Asynchronous CDMA (pseudorandom codes)
Difference between Synchronous CDMA
(orthogonal codes) & Asynchronous CDMA
(pseudorandom codes)
CDMA
Technology
Definition Advantages Disadvantages Best suited for
Synchronous
CDMA
It exploits the mathematical
properties orthogonally
between vectors
representing the data
strings.
•Can accommodate large
number of subscribers
•Gives better performance
•Orthogonal codes are
used
•Digital modulation is
analogues
•Issue of dropped
calls
•Quality degrades
with increased user
base
Mainly used by mobile telephone
operators.
Asynchronous
CDMA
Makes use of code space .
Pseudo-random or pseudo-
noise sequences are used.
•Pseudo-random code
(Pseudo-random Noise)
or Gold code is used
•Flexible allocation of
resources
•Slow speeds
•Uses random or
irregular time
intervals
Ideally suited for mobile networks
having large number of transmitters
are producing small amount of
traffic at irregular intervals.
Advantages
• Increased user capacity is an advantage of the CDMA as it supports a lot more users in
comparison to TDMA or FDMA.
• CDMA is more secure as the information transmitted is below the noise floor making the
intrusion of the spectrum difficult.
• CDMA systems have comparatively fewer dropouts than GSM. Thus, it can also be used
in rural areas.
• The cost of the calls in CDMA is lower in comparison to the cost in GSM.
• CDMA provides a high quality of voice with almost no noise during the calls.
• Using CDMA problems like multipath and fading do not occur.
• CDMA has a very low power requirement.
Disadvantages
• CDMA lacks the facility of international roaming which is provided by GSM.
• Since there is no limit to the number of users the system performance degrades with an
increase in the number of users.
• Self-jamming problem occurs in CDMA systems because of loss of orthogonality.
• The problem of channel pollution occurs in CDMA systems which thus degrades the
quality of audio.
• Since most of the mobile companies use GSM thus there is a lack of handsets for CDMA
technology.

Contenu connexe

Similaire à CDMA.pptx

presentation-150814181821-lva1-app6891.pptx
presentation-150814181821-lva1-app6891.pptxpresentation-150814181821-lva1-app6891.pptx
presentation-150814181821-lva1-app6891.pptxKunjPatel615667
 
Unitabcdefghijklmnopqrstuvxyz1234 1.pptx
Unitabcdefghijklmnopqrstuvxyz1234 1.pptxUnitabcdefghijklmnopqrstuvxyz1234 1.pptx
Unitabcdefghijklmnopqrstuvxyz1234 1.pptxThanga Durai
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular networkMaulik Patel
 
Cellular concept
Cellular conceptCellular concept
Cellular conceptgetvibha
 
CDMA Code Division Multiple Access.pptx
CDMA Code Division Multiple  Access.pptxCDMA Code Division Multiple  Access.pptx
CDMA Code Division Multiple Access.pptxBlackAdam7
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESrashmi_surekha
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communicationDr.Umadevi V
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
tdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdftdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdfPrince500060
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICSMrajKumar11
 
3G vs 4G and Cellular Networks
3G vs 4G and Cellular Networks3G vs 4G and Cellular Networks
3G vs 4G and Cellular NetworksAli Gamal
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Lecture5_MobileCommunication.pptx
Lecture5_MobileCommunication.pptxLecture5_MobileCommunication.pptx
Lecture5_MobileCommunication.pptxHusnainraza61
 
wireless communication
wireless  communicationwireless  communication
wireless communicationcosmic123
 

Similaire à CDMA.pptx (20)

CDMA WIRELESS COMMUNICATONS
CDMA WIRELESS COMMUNICATONSCDMA WIRELESS COMMUNICATONS
CDMA WIRELESS COMMUNICATONS
 
presentation-150814181821-lva1-app6891.pptx
presentation-150814181821-lva1-app6891.pptxpresentation-150814181821-lva1-app6891.pptx
presentation-150814181821-lva1-app6891.pptx
 
Unitabcdefghijklmnopqrstuvxyz1234 1.pptx
Unitabcdefghijklmnopqrstuvxyz1234 1.pptxUnitabcdefghijklmnopqrstuvxyz1234 1.pptx
Unitabcdefghijklmnopqrstuvxyz1234 1.pptx
 
CDMA
CDMACDMA
CDMA
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
CDMA Code Division Multiple Access.pptx
CDMA Code Division Multiple  Access.pptxCDMA Code Division Multiple  Access.pptx
CDMA Code Division Multiple Access.pptx
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIES
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
tdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdftdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdf
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
 
CDMA Presentation
CDMA PresentationCDMA Presentation
CDMA Presentation
 
3G vs 4G and Cellular Networks
3G vs 4G and Cellular Networks3G vs 4G and Cellular Networks
3G vs 4G and Cellular Networks
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Lecture5_MobileCommunication.pptx
Lecture5_MobileCommunication.pptxLecture5_MobileCommunication.pptx
Lecture5_MobileCommunication.pptx
 
Compare Between CDMA,TDMA and GSM
Compare Between CDMA,TDMA and GSMCompare Between CDMA,TDMA and GSM
Compare Between CDMA,TDMA and GSM
 
wireless communication
wireless  communicationwireless  communication
wireless communication
 

Dernier

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

CDMA.pptx

  • 2. What is CDMA? The term “CDMA” (Code Division Multiple Access) refers to both a spread spectrum technique and a cellular standards. Initially it was restricted to the armed forces, this technology was commercially launched in 1995. Multiple access basically means that information by several transmitters can be sent simultaneously onto a single communication channel.
  • 3. There are multiple users which are provided or assigned variant CDMA codes and thus the users can access the entire band of frequencies or the whole bandwidth. This method does not limit the frequency range of the user. Hence, with the help of CDMA, multiple users can share a band of frequencies without any kind of undue interference between them. CDMA makes the use of spectrum technology along with analog to digital conversion(ADC). It is thus used by various radio communication technologies. Mainly, it is used for mobile communication.
  • 4.
  • 5. History of CDMA • The CDMA technology was originated during World War II. • It was developed by English allies for protection of their wireless transmissions from jamming from enemies. • This technology was patented by Qualcomm post war and was made commercially available for use. • The first CDMA system was launched in 1995 in Hongkong by Hutchison Telephone Company.
  • 6. How it Works? • Code: It refers to the string of binary sequence that the transmitter and the receiver share. This code encodes the information into a low frequency signal before it is transmitted over a channel. This same code is used by the receiver to decode the information. The receiver gets the code with the help of the nearest base station. • Division: In CDMA a single channel is divided into numerous slots which can be used by multiple users. This is possible because of the use of unique code. • Multiple Accesses: Due to code based communication, multiple users can communicate and access the same channel simultaneously without any undesirable interference and loses.
  • 7. Features of CDMA Some of the key features of CDMA are: • Used in Global Positioning System (GPS) • Every channel uses full available spectrum • Better capacity for voice and data communications • CDMA does not require synchronization • Allocation of code word to each user helps to reduce interference • Used by several mobile companies (Qualcomm standard IS-2000 known as CDMA2000) • Emits less radiation • Faster data transfers • CDMA supports high speed push to talk and push to email services • UTMS 3G mobile phone standard uses W-CDMA • OmniTRACS satellite system uses CDMA for transportation
  • 9. • The input provided to the CDMA encoder can be in the form of Pulse code modulation (PCM) encoded voice band signal or can be a digital signal from computer. • It is multiplied with N bit, which is a unique chip code. • The output of balanced modulator is the product code. • In IF carrier it is used as an PSK modulation. • The balanced modulator is sometimes referred to as multiplier. • Further the modulated signal is then converted to RF band and is used for transmission purpose. • The high-power amplifier basically raises the level of power to a very high level and then the antennas transmit this signal. • The encoder is also called as multiplexer.
  • 11. • The decoder helps in reconverting the RF signal to IF. • A coherent PSK carrier is been obtained from IF. • The chip code is been used by the receiver and it helps in synchronizing the receiver station’s code generator. • The recovered chip is then multiplied with recovered PSK carrier to generate PSK modulated signal which contains PSK carrier and the chip code. • The IF signal which is received, contains chip code, PSK carrier and data. In correlator it is compared with the received IF signal. • The correlator helps in comparing this two signals and helps in recovering the original data. • The decoder is also called as demultiplexer.
  • 12. Limitations of CDMA • Some of the Limitations of CDMA are: • A large code length could induce delay or interference • Time synchronization is required • Reduction in capacity due to gradual transfers • Constant tight power control is required resulting in multiple handovers (Causing dropped calls)
  • 13. Types of CDMA Technologies There are two types of CDMA technologies: • Synchronous CDMA (orthogonal codes) • Asynchronous CDMA (pseudorandom codes)
  • 14. Difference between Synchronous CDMA (orthogonal codes) & Asynchronous CDMA (pseudorandom codes) CDMA Technology Definition Advantages Disadvantages Best suited for Synchronous CDMA It exploits the mathematical properties orthogonally between vectors representing the data strings. •Can accommodate large number of subscribers •Gives better performance •Orthogonal codes are used •Digital modulation is analogues •Issue of dropped calls •Quality degrades with increased user base Mainly used by mobile telephone operators. Asynchronous CDMA Makes use of code space . Pseudo-random or pseudo- noise sequences are used. •Pseudo-random code (Pseudo-random Noise) or Gold code is used •Flexible allocation of resources •Slow speeds •Uses random or irregular time intervals Ideally suited for mobile networks having large number of transmitters are producing small amount of traffic at irregular intervals.
  • 15. Advantages • Increased user capacity is an advantage of the CDMA as it supports a lot more users in comparison to TDMA or FDMA. • CDMA is more secure as the information transmitted is below the noise floor making the intrusion of the spectrum difficult. • CDMA systems have comparatively fewer dropouts than GSM. Thus, it can also be used in rural areas. • The cost of the calls in CDMA is lower in comparison to the cost in GSM. • CDMA provides a high quality of voice with almost no noise during the calls. • Using CDMA problems like multipath and fading do not occur. • CDMA has a very low power requirement.
  • 16. Disadvantages • CDMA lacks the facility of international roaming which is provided by GSM. • Since there is no limit to the number of users the system performance degrades with an increase in the number of users. • Self-jamming problem occurs in CDMA systems because of loss of orthogonality. • The problem of channel pollution occurs in CDMA systems which thus degrades the quality of audio. • Since most of the mobile companies use GSM thus there is a lack of handsets for CDMA technology.