Professional Documents
Culture Documents
Unit-4 Mutiple Access WC
Unit-4 Mutiple Access WC
Unit-4
Multiple Access Techniques
1
CONTENTS
• FDD
• TDD
• Bandwidth
• Use of multiple access technique
Duplexing
5
Time division duplexing (TDD)
8
Compiled By: SWEETU D SUREJA
9
Compiled By: SWEETU D SUREJA
10
Multiple access Protocol
1. Random Access Protocol:
• In this protocol, all the station has the equal priority to send the data over a channel.
• In random access protocol, one or more stations cannot depend on another station.
• Depending on the channel's state (idle or busy), each station transmits the data frame.
• However, if more than one station sends the data over a channel, there may be a collision or
• Following are the different methods of random-access protocols for broadcasting frames on
the channel.
1. Aloha 11
2. CSMA
3. CSMA/CD
4. CSMA/CA
Multiple access Protocol
Random Access Protocol:
Aloha
• One of the first attempts to design the MAC Protocol.
• Its main idea is that the transmitter sending packets whenever it wants without
coordination between nodes.
2) Slotted aloha
• It is improved version of pure aloha.
• It is similar to pure aloha except that we divide time into slots and that particular time 13
slot only you can send or received data.
Multiple access Protocol
2. Controlled Access Protocol
18
Multiple access system
• Bandwidth is more needed for a message to be transmitted hence, multiple
access methods are introduces.
• The ability of system to carry many signals at the same time is called as
“multiple access”.
• When call is processed, no other user can share the same channel.
21
FDMA (Frequency Division Multiple Access)
• When FDMA channel not in use, it will be idle and not used by other user. 22
hence, It generated chance of resource waste.
FDMA (Frequency Division Multiple Access)
• The cost of cell site is higher in comparison to TDMA. It result an increases the cost
of subscriber unit and BS.
• Near saturation region for getting maximum power and it is NON LINEAR.
• Non- linearity's cause spreading signal over the entire frequency and result in
intermodulation.
25
Example
• In an analogue cellular system, find the number of
channels when total spectrum allocation (Bt) is 10 MHz
per simplex band with guard band (Bguard) as 10 kHz
having channel bandwidth (Bc) as 30 kHz.
FDMA
DAMA
Channel are assigned in predetermined manner So that random changes in capacity are not
• DAMA :-
MERITS OF FDMA
• All station can operate continuously all 24 hours without having to wait for
their turn to come
• No synchronization is necessary
DEMERITS OF FDMA
• As a result of nonlinearities, intermodulation are generated.
• It carries only one phone circuit at a time.
• The bandwidth of FDMA channel is narrow. 30
TDMA (Time Division Multiple Access)
• Different user shares the different time slots of the complete time available.
31
TDMA (Time Division Multiple Access)
• TDMA system transmit data in Burst and Buffer method.
• It is assumed that there are “N” number of slots for “N” User can access
channel in their allowed time slot.
32
TDMA (Time Division Multiple Access)
• Duplexer is not required because of TDMA uses different time slot for
transmission and receiver.
• In TDMA the entire bandwidth can be used by every user but not
• Each user needs to know the beginning of its slot and location of its slot.
33
TDMA
• A single carrier frequency for several user
• low battery consumption
34
TDMA
• CDMA is a combination of FDMA and TDMA in which resources are allocated based
• This code allows the user to spread the information signal across the assigned band .
• These codes are selected in such a way that if the code is utilized for a second
• CDMA has soft capacity limit. If the number of user increases the noise 38
increases and system performance decreases.
CDMA (Code Division Multiple Access)
43
• In order to avoid interference the signal can be separated by frequency.
OFDM is robust in narrowband interference environment.
Compiled By: SWEETU D SUREJA
44
Compiled By: SWEETU D SUREJA
45
Compiled By: SWEETU D SUREJA
46
OFDM(Orthogonal Frequency Division
Multiple Access)
• FDM allows multiple users to
share one link.
• Non overlapping sub –
channels.
• COFDM
• FLASH OFDM
• OFDMA
• COFDM :
COFDM stands for coded orthogonal frequency division multiplexing. It is the form
of OFDM where error correction coding into the signal.
52
• Flash OFDM :
This variant was developed by Flarion. It is a fast hopped form of OFDM.
OFDM(Orthogonal Frequency Division
Multiple Access)
• OFDM variants :
• OFDMA :
OFDMA stands for orthogonal frequency division multiple access. It is used to provide multiple
• VOFDM :
VOFDM stands for vector OFDM. It uses the concept of MIMO technology. It is being
developed by CISCO systems.
• WOFDM :
WOFDM stands for wideband OFDM. This variant was particularly applicable to Wi-Fi 53
systems.
OFDM(Orthogonal Frequency Division
Multiple Access)
IFFT and FFT is algorithm QPSK – Quadrature phase shifting keying.
IFFT – inverse fast Fourier transform. QAM – Quadrature amplitude modulation.
FFT – fast Fourier transform
• CSMA protocol are based on the principle that each terminal on the
network is able to monitor the status of the channel before
transmitting information. 55
CSMA (Carrier Sense Multiple Access)
1) 1- Persistent
• In this schema the station which wants to transmit continuously monitors the
channel until is idle an then transmit immediately.
58
CSMA (Carrier Sense Multiple Access)
2) Non-Persistent
• In this schema, if a station wants to transmit a frame and it checks the carrier it finds
channel is busy, then it will wait for random amount of time.
• After this time, it again checks status of channel and if channel is free it will transmit.
• In this schema all the waiting station are not allowed to transmit simultaneously when
channel is in ideal.
59
• For example, 6 stations are waiting then one station will transmit and other will wait.
CSMA (Carrier Sense Multiple Access)
• Methods of CSMA :-
1) CSMA/CD
2) CSMA/CA
CSMA/CD
• CSMA stands for Carrier Sense Multiple Access with Collision Avoidance.
• It means that it is a network protocol that uses to avoid a collision and it does not
deal with the recovery of packets after a collision.