114
1 Multiple Access Techniques V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Multiple Access Techniques

Embed Size (px)

Citation preview

Page 1: Multiple Access Techniques

1

Multiple Access Techniques

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 2: Multiple Access Techniques

2

Multiple Access

• Term has its Origin in Satellite Communications

• System of Earth Stations and a Satellite

• Used to Mean Sharing a Communications Channel (of M Hz) among a Group of Users

• Signal Space of Time Bandwidth TW– Where T = k/R– Signal Space D = 2TW

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 3: Multiple Access Techniques

3

Duplex Transmission

• Frequency Division Duplexing

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 4: Multiple Access Techniques

4

Frequency/Time Division Duplexing

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 5: Multiple Access Techniques

5

Trade-offs between FDD and TDD

• Frequency Division Duplexing– Geared toward Individual Channels for each User

– Frequency Separation must use Inexpensive Technology

• Time Division Duplexing– Eliminates Need for Forward and Reverse Channels

– Time Latency

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 6: Multiple Access Techniques

6

Multiple Access Techniques

• Frequency Division Multiple Access (FDMA)

• Time Division Multiple Access (TDMA)

• Code Division Multiple Access (CDMA)

• Grouped as Narrowband or Wideband SystemsV.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 7: Multiple Access Techniques

7

Narrowband Systems

• “Narrow” relates single channel BW to coherent BW• Normally operated using Frequency Division Duplexing• Narrowband FDMA

– Channel not Shared with other users

– Called FDMA/FDD Access Systems

• Narrowband TDMA– Users Separated by Time

– Called TDMA/FDD or TDMA/TDD Access Systems

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 8: Multiple Access Techniques

8

Wideband Systems

• Transmission BW is much larger than Coherence BW

• Multipath Fading is not a Problem

• Users Transmit in a Large Part of the Spectrum

• Many Transmitters use the Same Channel using TDMA

• TDMA Allocates Time Slots

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 9: Multiple Access Techniques

9

Frequency Division Multiple Access

• Users Receive Unique Channel

• Channels Assigned as Users Request Service

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 10: Multiple Access Techniques

10

FDMA vs. TDMA• If an FDMA channel not in use, it is idle, and can not be used by other users.• After the assignment the reverse and forward channel may transmit simultaneously and

continuously• FDMA implemented as Single channel per carrier (SCPC), and is narrow band 30 KHz• The symbol time is large as compared to average delay spread. ISI is low, and no

equalization required for NB FDMA• FDMA mobile system is less complex as compared to TDMA. Due to advancement in DSP

this is changing• FDMA is continuous tx scheme, so fewer overhead bits are required as compared to

TDMA• FDMA systems have higher cell site costs as compared to TDMA, because of SCPC in

FDMA, and use of expensive pass band filters to eleminate the spurious radiations at base stations.

• The FDMA mobile unit uses duplexers, since both TX and RCVR operate at the same time, resulting in an incresae in the cost of mobie units and base stations

• FDMA requires tight RF filtering to minimize adjacent channel interference

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 11: Multiple Access Techniques

11

Nonlinear Effects in FDMA

• Antenna at Base Station Shared by Channels

• Nonlinearities of Power Amps and Combiners

• Results in Signal Spreading – Generates Intermodulation– Causes Adjacent Channel Interference– And Adjacent Service Interference

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 12: Multiple Access Techniques

12

Time Division Multiple Access• Enables Users to Use the Whole Bandwidth on a time Basis

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 13: Multiple Access Techniques

13

TDMA Time Frame

• Data Transmitted in a Buffer-and-Burst Method

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 14: Multiple Access Techniques

14

Time Division Multiple Access Features

• In TDMA a single carrier frequency with a wide bandwidth is shared among multiple users. Ecah user is assigned non-overlapping time slot.

• Number of time slots per frame depends on (1) available bandwidth, (2) modulation techniques etc

• Transmission for TDMA users is not continuous, but occurs in bursts, resulting in low battery consumption. The subscriber transmitter may be turned off during non-transmission periods

• Hand off process is simpler for a subscriber, sinc eit can listen to other base stations during non-transmit times. – AN ENHANCED LINK CONTROL SUCH AS THAT PROVIDED BY

MAHO CAN BE implemented by a subscribet by listening in an idle time slot in the TDMA frame

– TDMA uses different time slots for TX and reception, thus duplexers are not required.

• Even in TDMA/FDD a switch rather than a duplexer is required in the mobile unit to switch between the TX and RCRVR

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 15: Multiple Access Techniques

15

Time Division Multiple Access Features (Cont’d)

• Adaptive equalization is usually required since Tx speed for a TDMA system is higher as compared to FDMA

• In TDMA the guard band should be minimized. IF the TX signal at the edges of a time slot are suppressed sharply in order to reduce the guard band, the TX spectrum will expand, and cause interference to the adjacent channels

• A high synchronization overhead is required, because of burst transmission.

• TDMA transmissions are slotted, this requires the receievr to be synchronized for each data burst. In addition guard slots are necessary, to separate users. TDMA systems have larger overhead as compared to FDMA

• TDMA is more flexible, as a number of time slots may be combined to give a higher capacity to a users. Further more number of slots combined can be varied for serving different user requirements. Bandwidth on demand

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 16: Multiple Access Techniques

16

Efficiency of TDMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 17: Multiple Access Techniques

17

Overview of Wireless Systems and Standards

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 18: Multiple Access Techniques

18

Spread Spectrum Multiple Access

• Frequency Hopped Multiple Access(FHMA)• Code Division Multiple Access• Hybrid Spread Spectrum Techniques

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 19: Multiple Access Techniques

19

Spread Spectrum multiple access (SSMA) uses signals which have a transmission bandwidth that is several orders of magnitude greater than the minimum required RF bandwidth. A PN sequence converts a narrowband signal to a wideband noise-like signal before transmission.

Two main types of SSMA:

1. Frequency hopped multiple access (FH)

2. Direct sequence multiple access (DS)

Code division multiple access(CDMA)

Advantage:

1. Immune to multipath interference and robust multiple access capability.

2. Efficient in a multiple user environment

Spread Spectrum multiple access (SSMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 20: Multiple Access Techniques

20

FHMA is a digital multiple access system in which the carrier frequencies of the individual users are varied in a pseudorandom fashion within a wideband channel.

• In a FH transmitter:

1. The digital data is broken into uniform sized bursts which are transmitted on different carrier frequencies.

2. The instantaneous bandwidth of any one transmission burst is much smaller than the total spread bandwidth.

3. The pseudorandom change of the carrier frequencies of the user randomizes the occupancy of a specific channel at any given time.

Frequency Hopped Multiple Access (FHMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 21: Multiple Access Techniques

21

In FH receiver:

1. A locally generated PN code is used to synchronize the receivers instantaneous frequency with that of the transmitter.

2. At any given point in time, a frequency hopped signal only occupies a single, relatively narrow channel since narrowband FM or FSK is used.

3. FHMA systems often employ energy efficient constant envelope modulation.

4. Linearity is not an issue, and the power of multiple users at the receiver does not degrade FHMA performance.

Frequency Hopped Multiple Access (FHMA) (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 22: Multiple Access Techniques

22

The difference between FHMA and FDMA

The difference between FHMA and FDMA is that the frequency hopped signal changes channels at rapid interval.

If the rate of change of the carrier frequency is greater than the symbol rate, it is referred to as a fast frequency hopping. (FDMA)

If the channel changes at a rate less than or equal to the symbol rate, it is called slow frequency hopping system.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 23: Multiple Access Techniques

23

Advantage of FH system

1. A frequency hopped system provides a level of security, since an unintended receiver that does not know the pseudorandom sequence of frequency slots must retune rapidly to search for the signal it wishes to intercept.

2. FH signal is somewhat immune to fading, since error control coding and interleaving can be used to protect the frequency hopped signal against deep fades which may occasionally occur during the hopping sequence.

FH system

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 24: Multiple Access Techniques

24

Code Division Multiple Access CDMA

• The spreading signal is a pseudo-noise code sequence that has a chip rate which is orders of magnitudes greater than the data rate of the message.

• All users in CDMA system, use the same carrier frequency and may transmit simultaneously.

• In CDMA, the narrowband message signal is multiplied by a very large bandwidth signal called the spreading signal.

• Each user has its own pseudorandom codeword which is approximately orthogonal to all other codewords.

• The receiver performs a time correlation operation to detect only the specific desired codeword.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 25: Multiple Access Techniques

25

SSMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 26: Multiple Access Techniques

26

The near-far problem

• when many mobile users share the same channel, the strongest received mobile signal will capture the demodulator at a base station.

• In CDMA, stronger received signal levels raise the noise floors at the base station demodulators for the weaker signals, thereby decreasing the probability that weaker signals will be received.

CDMA (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 27: Multiple Access Techniques

27

Solution: power control

• Power control is provided by each base station in a cellular system and assures that each mobile within the base station coverage area provides the same signal level to the base station receiver. This solves the problem of a near by subscriber over powering the base station

• Power control is implemented at the base station by rapidly sampling the radio signal strength indicator levels of each mobile and then sending a power change command over the forward radio link.

CDMA (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 28: Multiple Access Techniques

28

The features of CDMA1. Many users of a CDMA system share the same frequency.

2. CDMA has a soft capacity. Increasing the number of users in a CDMA system raises the noise floor in a linear manner.

3. Multipath fading may be substantially reduced, because the signal is spread over a large bandwidth. If the spread spectrum BW greater than the coherence BW of the channel, the inherent freq diversty will mitigate the efefcts of small scale fading.

4. Channel data rates are very high in CDMA system. A Chip (symbol duration) is usually much smaller than the delay spread. The PN sequences have low autocorrelation, multipath which is delayed by more than a chip will appear as noise. A rake receiver can be used to improve reception by collecting time delayed versions of the signalV.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 29: Multiple Access Techniques

29

The features of CDMA (cont’d)

• Macroscopic Spatial Diversity

• CDMA uses co-channel cells it can use macroscopic spatial diversity to provide soft handoff. Soft handoff is performed by the MSC, which can monitor the user from 2 or more base stations. MSC then chooses the best version of the signal at any time.

• Self Jamming

• It arises because the PN codes of the users are not exact orthogonal. Hence in despreading of a specific code, there may be non-zero contributions from other users, which influences the receiver decision process

• The near-far problem occurs in CDMA system.V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 30: Multiple Access Techniques

30

Comparison of DS and FH system

DS FH

Bandwidth PN sequence clock rate or chip rate

The tuning range of frequencies

Synchronization Very crucial Less critical

Spectrum Very wide narrow

Near-far problem More likely to occur Less likely to occur

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 31: Multiple Access Techniques

31

Feature FDMA TDMA CDMA

High carrier frequency stability

Required Not necessary Not necessary

Timing/synchronization Not required Required Required

Near-far problem No No Yes,power control tech.

Variable transmission rate

Difficult Easy Easy

Fading mitigation Equalizer not needed

Equalizer may be needed

RAKE receiver possible

Power monitoring Difficult Easy Easy

Zone size Any size Any size Large size difficult

Comparison of FDMA, TDMA, CDMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 32: Multiple Access Techniques

32

1. Hybrid FDMA/CDMA(FCDMA)

2. Hybrid Direct Sequence/Frequency Hopped Multiple Access(DS/FHMA)

3. Time Division CDMA(TCDMA)

4. Time Division Frequency Hopping(TDFH)

Hybrid Spread Spectrum Techniques

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 33: Multiple Access Techniques

33

The available wideband spectrum is divided into a number of subspectras with smaller bandwidths. Each of these smaller subchannels becomes a narrowband CDMA system having processing gain lower than the original CDMA system.

Hybrid FDMA/CDMA(FCDMA)

Advantage: the required bandwidth need not be contiguous and different users and be allotted different subspectrum bandwidths depending on their requirement.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 34: Multiple Access Techniques

34

Advantage: they avoid the near-far effect.

Disadvantage: they are not adaptable to the soft handoff process.

Hybrid Direct Sequence/Frequency Hopped Multiple Access(DS/FHMA)

This technique consists of a direct sequence modulated signal whose center frequency is made to hop periodically in a pseudorandom fashion.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 35: Multiple Access Techniques

35

Different spreading codes are assigned to different cells. Within each cell, only one user per cell is allotted a particular time slot.Thus at any time, only one CDMA user is transmitting in each cell. When a handoff takes place, the spreading code of the user is changed to that of the new cell.

Advantage: it avoids the near-far effect .

Time Division CDMA(TCDMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 36: Multiple Access Techniques

36

Time Division Frequency Hopping (TDFH)

Time Division Frequency Hopping(TDFH)• The subscriber can hop to a new frequency at the

start of a new TDMA frame. In GSM standard, hopping sequence is predefined and the subscriber is allowed to hop only on certain frequencies which are assigned to a cell.

• Advantage: – Avoiding a severe fade or erasure event on a

particular channel.– Avoiding the co-channel interference

problems between neighboring cells if two interfering base station transmitters are made to transmit on different frequencies at different times.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 37: Multiple Access Techniques

37

SDMA controls the radiated energy for each user in space. From Fig 9.8., we see that different areas covered by the antenna beam may be served by the same frequency or different frequencies.

Space Division Multiple Access(SDMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 38: Multiple Access Techniques

38

Space Division Multiple Access(Cont’d))

• Sectorized antennas may be thought of as a primitive application of SDMA. In the future, adaptive antennas will likely be used to simultaneously steer energy in the direction of many users at once and appear to be best suited for TDMA and CDMA base station architectures.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 39: Multiple Access Techniques

39

Packet Radio

• Packet Radio Protocols

• Carrier Sense Multiple Access(CSMA) Protocol

• Reservation Protocols

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 40: Multiple Access Techniques

40

Packet Radio

• In packet radio (PR) access techniques, many subscribers attempt to access a single channel in an uncoordinated( or minimally coordinated) manner. Collisions from the simultaneous transmissions of multiple transmitters are detected at the base station receiver, in which case an ACK or NACK signal is broadcast by the base station to alert the desired user of received transmission.

• The subscribers use a contention technique to transmit on a common channel. ALOHA protocols are the best examples of contention techniques.

• The performance of contention techniques can be evaluated by the throughput(T), and the average delay(D).

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 41: Multiple Access Techniques

41

pV

Packet Radio Protocol

• Vulnerable period : the time interval during which the packets are susceptible to collisions with transmissions form other users.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 42: Multiple Access Techniques

42

Assumption:• All packets sent by all users have a constant packet length

and fixed, channel data rate.• All other users may generate new packets at random time

intervals.• Packet transmissions occur with a Poisson distribution

having a mean arrival rate of packets per second.

The traffic occupancy or throughput R:

R

Is theis the packet duration in seconds

Is the mean arrival rate in packets per second

Packet Radio Protocol (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 43: Multiple Access Techniques

43

]Pr[]Pr[ collisionnocollisionnoRT

T: the normalized throughput.

Pr[no collision]: the probability of a user making a successful packet transmission

!)Pr(

n

eRn

Rn

Pr(n): the probability that n packets are generated by the user population during a given packet duration interval is assumed to be Poisson

Packet Radio Protocol (Cont’d)

A packet is assumed to be successfully transmitted if no other packets are transmitted during the given packet interval. The prob that no packets are generated during this interval is given by (1) with n =0 , ie Pr (0) = e -R

(1)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 44: Multiple Access Techniques

44

Packet contention protocols

• Based on the type of access, contention protocols are categorized as :– Random access

• No contention among the users, and packets are transmitted, as they arrive from the user

– Scheduled access• Based on coordinated access by the users. Messages

are transmitted within assigned time slots

– Hybrid access

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 45: Multiple Access Techniques

45

The pure ALOHA protocol is a random access protocol used for data transfer. A user accesses the channel as soon as the packet is ready to be transmitted. Then it waits for an ack or nack, if it gets a nack (a collision) then it waits for a random amount of time and then retransmits the packet. The delay increases as the number of users increases, as the prob of collision increases

!

)2()Pr(

2

n

eRn

Rn

The vulnerable period is , the probability of no collision during the vulnerable period Pr(n):

The throughput:RT 2Re

2

At n=0

Pure ALOHA

(9.11)V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 46: Multiple Access Techniques

46

In slotted ALOHA, time is divided into equal time slots of length greater than the packet duration . The subscribers have a synchronized time clock and transmit only at the beginning of the time slot.

The vulnerable period for slotted ALOHA is only one packet duration.

The probability that no other packets will be generated during the vulnerable period is .Re

The throughput:

RT Re

Slotted ALOHA

(9.12)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 47: Multiple Access Techniques

47

Fig(9.10) shows how ALOHA and slotted ALOHA systems trade-off throughput for delay

Fig(8.10)

ALOHA Vs. Slotted ALOHA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 48: Multiple Access Techniques

48

Example 9.6

Determine the maximum throughput that can be achieved using ALOHA and slotted ALOHA protocols.

Solution:The rate of arrival which maximizes the throughput for ALOHA is found by taking the derivative of Eq(9.11) and equating it to zero.

Maximum throughput achieved by using the ALOHA protocol is found by substituting in Eq(9.11), and this value can be seen as the maximum throughput in Fig(9.10)

2

1

0Re2

max

22

R

edR

dT RR

RT 2Re For ALOHA

Throughput = 0.5 exp (-1) = 18. 4%

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 49: Multiple Access Techniques

49

Thus the best traffic utilization one can hope for using ALOHA is 0.184 Erlangs.

Maximum throughput is found by substituting in Eq(9.12), and this value can be seen as the maximum throughput in Fig 9.10.

Notice that slotted ALOHA provides a maximum channel utilization of 0.368 Erlangs, double that of ALOHA.

The maximum throughput for slotted ALOHA is found by taking the derivative of Eq(9.12) and equating it to zero.

3679.01 eT

1

0Re

max

R

edR

dT RR

1839.02

1 1 eT

Example 9.6 (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 50: Multiple Access Techniques

50

CSMA protocols are based on the fact that each terminal on the network is able to monitor the status of the channel before transmitting information. If the channel is idle, then the user is allowed to transmit a packet based on a particular algorithm which is common to all transmitters on the network.

There are two important parameters for CSMA protocol:

1. Detection delay

2. Propagation delay

Carrier Sense Multiple Access(CSMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 51: Multiple Access Techniques

51

Detection delay: a function of the receiver hardware and is the time required for a terminal to sense whether or not the channel is idle.Propagation delay: a relative measure of how fast it takes for a packet to travel from a base station to a mobile terminal.

m

Rtt bp

d

: the propagation time in seconds

: the channel bit rate

: the expected number of bits in a data packet

: propagation delay in packet transmission unitsdt

pt

bR

m

Carrier Sense Multiple Access(CSMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 52: Multiple Access Techniques

52

There are several variations of the CSMA strategy:

•1-persistent CSMA: the terminal listens to the channel, and as soon as it finds channel idle it transmits its message

•Non-persistent CSMA: When a terminal receives a nack, it waits for a random period of time before retransmission. Popular in wireless applications, where packet transmission interval is much greater than the propagation delay to the farthest user

•p-persistent CSMA: used in slotted ALOHA. IF channel is detected to be idle, the packet is transmitted in first available slot with prob p, or in the next slot with prob (1-p)

•CSMA/CD: The user monitors its transmission for collisions. If 2 or more terminals start the transmission at the same time, a collision is detected and transmission aborted. This can be done if receiver has the capability of “listen while you transmit”

•DSMA—Data Sense Multiple Access

Carrier Sense Multiple Access (CSMA)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 53: Multiple Access Techniques

53

1. Reservation ALOHA: a packet access scheme based on time division multiplexing. In this protocol, certain packet slots are assigned with priority, and it is possible for users to reserve slots for the transmission of packets.

2. Packet Reservation Multiple Access (PRMA): it uses a discrete packet time techniques similar to reservation ALOHA and combines the cyclical frame structure of TDMA in a manner that allows each TDMA time slot to carry either voice or data, where voice is given priority.

Reservation Protocols

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 54: Multiple Access Techniques

54

Capture Effect in Packet Radio

Capture Effect in Packet Radio -------Near-far effect

•Advantage: a particular transmitter may capture an intended receiver, many packets may survive despite collision on the channel

•Disadvantage: a stronger transmitter which is attempting to communicate to the same receiver.

A useful parameter in analyzing the capture effects in packet radio protocols is the minimum power ratio of an arriving packet, relative to the other colliding packets. This radio is called the capture ratio, and is dependent upon the receiver and the modulation used.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 55: Multiple Access Techniques

55

Reference:

1. Wireless Communications—Theodore S.Rappaport

2. Introduction to Wireless system—P.Mohana Shankar

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 56: Multiple Access Techniques

56

Channel data rates are very high in CDMA systems. Consequently, the symbol(chip) duration is very short and usually much less than the channel delay spread. Since PN sequences have low autocorrelation, multipath which is delayed by more than a chip will appear as noise. A RAKE receiver can be used to improve reception by collecting time delayed versions of the required signal

back

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 57: Multiple Access Techniques

57

Soft handoff is performed by the MSC, which can simultaneously monitor a particular user from two or more base stations. The MSC may chose the best version of the signal at any time without switching frequencies.

back

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 58: Multiple Access Techniques

58

Self-jamming is a problem in CDMA system. Self-jamming arises from the fact that the spreading sequences of different users are not exactly orthogonal, hence in the despreading of a particular PN code, non-zero contributions to the receiver decision statistic for a desired user arise from the transmissions of other users in the system.

back

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 59: Multiple Access Techniques

59

Capacity of Cellular Systems

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 60: Multiple Access Techniques

60

Introduction

• Co-channel Interference

• Capacity of cellular system

• Comparison of the capacity of analog cellular system and digital cellular system

• Capacity of Cellular CDMA

• Power Control in CDMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 61: Multiple Access Techniques

61

Definition of Channel capacity

Channel capacity: Radio capacity, the maximum number of channels or users that can be provided in a fixed frequency band.This parameter is determined by the required carrier-to-interference ratio (C/I) and the channel bandwidth (Bc)The radio capacity of a cellular system is defined as:

NB

Bm

c

t radio channels/cell (9.19)

Where m is the radio capacity metric, Bt is the total allocated spectrum for the system, Bc is the channel bandwidth, and N is the number of cells in a frequency reuse pattern. N is relatedto the co-channel reuse factor (Q).V.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 62: Multiple Access Techniques

62

Co-channel Interference

Reverse channel interference: interference at a base station receiver comes from the subscriber units in the surrounding cells.Forward channel interference: interference from the surrounding co-channel base stations to a particular subscriber unit.

Co-channel reuse ratio: R

DQ (9.14)

The minimum ratio of D/R is required to provide a tolerable level of co-channel interference.

NQ 3For a hexagonal geometry:

N is the number of cells in a frequency reuse pattern

(9.20)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 63: Multiple Access Techniques

63

Carrier-to-Interference Ratio

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 64: Multiple Access Techniques

64min6

1

I

C

D

Rn

n0: path loss exponent in the desired cellD0: distance from the desired base station to the mobileDk: distance of the kth cell from the mobilenk: path loss exponent to the kth interfering base station

M

k

nk

n

kD

D

I

C

1

00

(9.15)

n

n

D

D

I

C

6

0 (9.16)

When D0=R, and for acceptable performance:n

I

CQ

/1

min

6

Co-channel Interference

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 65: Multiple Access Techniques

65

n

nc

t

c

t

IC

B

B

QB

Bm /2

min2/

2

36

3

n

I

CQ

/1

min

6

Radio capacity

When n=4:

min32

IC

B

Bm

c

t(9.22)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 66: Multiple Access Techniques

66

Comparison of different system

Bc: bandwidth of a particular system(C/I)min: tolerable value for the same systemBc’: channel bandwidth for a different system(C/I)eq: minimum C/I value for the different system

2

'min

c

c

eq B

B

I

C

I

C (9.23)

'min

log20)()(c

c

eq B

BdB

I

CdB

I

C

Let Bc= 6.25, C/I=9 dB for Bc’=12.5 , C/I eq=3dB so more capacity

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 67: Multiple Access Techniques

67

Example 9.7

Evaluate four different cellular radio standards, and choose the

one with the maximum radio capacity.

dBICkHzBASystem c 18)/(,30:_ min dBICkHzBBSystem c 14)/(,25:_ min

dBICkHzBCSystem c 12)/(,5.12:_ min dBICkHzBDSystem c 9)/(,25.6:_ min

Solution to Example 9.7: Consider each system for 6.25kHz bandwidth, and use Eq.(9.23)

Based on comparison, the smallest value of (C/I)eq should be selected for maximum capacity in Eq.(9.22). System D offers the best capacity.

dBICkHzBASystem eqc 62.31)25.6/30log(2018)/(,25.6:_ dBICkHzBBSystem eqc 25)25.6/25log(2014)/(,25.6:_

dBICkHzBDSystem eqc 9)25.6/25.6log(209)/(,25.6:_ dBICkHzBCSystem eqc 15)25.6/5.12log(2012)/(,25.6:_

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 68: Multiple Access Techniques

68

Digital cellular system

Rb: channel bit rate Eb: energy per bitRc: rate of the channel code Ec: energy per code symbol

I

RE

I

RE

I

C ccbb (9.24)

2'

''

c

c

cc

cc

eq

B

B

IRE

IRE

IC

IC

(9.25)

Rc and Bc is always linear, if the I is the same in the mobile environment for two different digital systems, then

3'

'

c

c

c

c

B

B

E

E(9.26)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 69: Multiple Access Techniques

69

Comparison between FDMA and TDMA

bbREC cBII 0FDMA:

'' bbREC '' 0 cBII TDMA:

IC

M

B

Bm

t

t

32

Radio capacity for FDMA:

Eb: Energy per bit, I0: interference power per Herz

Rb: radio transmission rates Bc: Channel bandwidth

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 70: Multiple Access Techniques

70

Example 9.8

Consider an FDMA system with three channels, each having a bandwidth of 10kHzand a transmission rate of 10kbps. A TDMA system has three time slots, channelbandwidth of 30kHz, and a transmission rate of 30 kbps. For the TDMA scheme, thereceived carrier-to-interference ration for a single user is measured for 1/3 of the timethe channel is in use. For example, C’/I’ can be measured in 333.3 ms in one second.Thus C’/I’ is given by:

IkHzIBII

CERs

bitsEREC

c

bbb

bb

330''

33333.0

10'

00

4

It can be seen that the received carrier-to-interference ratio for a user in this TDMA system C’/I’ is the same as C/I for a user in the FDMA system. Therefore, for this example, FDMA and TDMA have the same radio capacity and consequently the same spectrum efficiency. However, the required peak power for TDMA is 10logk higher than FDMA, where k is the number of time slots in a TDMA system of equal bandwidth. V.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 71: Multiple Access Techniques

71

Capacity of Digital Cellular TDMA

In practice, TDMA systems improve capacity by a factor of 3 to6 times as compared to analog cellular radio system.

1. Powerful error control2. Speech coding3. Mobile assisted handoff (MAHO)4. Adaptive channel allocation (ACA)

How to improve capacity in digital cellular TDMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 72: Multiple Access Techniques

72

Table 9. 3 Comparison of AMPS with Digital TDMA based Cellular Systems[Rai91]

Parameter AMPS GSM USDC PDC

Bandwidth(MHz) 25 25 25 25

Voice Channels 833 1000 2500 3000

Frequency Reuse(Cluster sizes)

7 4 or 3 7 or 4 7 or4

Channels/Site 119 250 or 333 357 or 625 429 or 750

Traffic(Erlangs/sq.km) 11.9 27.7 or 40 41 or 74.8 50 or 90.8

Capacity Gain 1.0 2.3 or 3.4 3.5 or 6.3 4.2 or 7.6

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 73: Multiple Access Techniques

73

Capacity of Cellular CDMA

How to reduce interference in CDMA:- Use multi-sectorized antennas- Operate in a discontinuous transmission mode (DTX) In DTX, the transmitter is turned off during the periods of silence in speech.

1. The capacity of CDMA system is interference limited, while it is bandwidth limited in TDMA/FDMA.

2. The capacity of CDMA system is soft while the capacity of TDMA/FDMA system is hard.

3. While TDMA/FDMA reuse frequencies depending on the isolation between cells provided by the path loss in terrestrial radio propagation, CDMA can reuse the entire spectrum for all cells, and this results in a increase of capacity by a large percentage over the normal frequency reuse factor.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 74: Multiple Access Techniques

74

Start by considering a single cell with N users who share the cell:

)1(

1

)1(

NSN

SSNRSignal-to-Noise Ratio:

Bit energy-to-noise ratio:1

/

)/)(1(

/

0

N

RW

WSN

RS

N

Eb

R: base-band information bit rate; W: total RF bandwidth

Considering the background thermal noise η in the spread bandwidth

)/()1(

/

0 SN

RW

N

Eb

)/(/

/1

0

SNE

RWN

b

The number of users:

W/R: processing gain

Capacity of Cellular CDMA (Cont’d)

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 75: Multiple Access Techniques

75

How to increase the capacity in CDMA

♠ Antenna sectorization♠ Incorporate a voice activity monitor Monitoring of voice activity such that each transmitter is switched off during periods of no voice activity.

Using these two technique, the new Eb/N0’ within a sector is:

)/()1(

/

'0 SN

RW

N

E

s

b

The number of users:

'

/11

0NE

RWN

bs

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 76: Multiple Access Techniques

76

Antenna sectorization

N0’=1/3N0

N’=3NN0 is the interferenceN is the number of user

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 77: Multiple Access Techniques

77

Incorporate a voice activity monitor

Monitor voice activity and switch off transmitter during periods of no voice activity.When we speak, we normally use pauses between words, and by turning off the transmitter when no voice activity is detected, we can reduce the effective number of interfering users. It is known that speakers are active only 35-40% of the time.

Designate α as the voice activity factor, the interference termbecomes (Ns-1) α, where Ns is the number of users per sector.

The typical value of voice activity factor α is assumed to be 3/8.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 78: Multiple Access Techniques

78

Example 9.9

If W=1.25MHz, R=9600bps, and a minimum acceptable is found to be 10dB, determine the maximum number of users that can be supported in a single-cell CDMA system using (a) omni-directional base station antennas and no voice activity detection, and (b) 3-sectors at the base station and activity detection with =3/8. Assume the system is interference limited.

0/ NEb

Solution to Example 9.9 (a) using Eq. (9.31)

1402.13110

9600/1025.11

6

N

(b) Using Eq. (9.33) for each sector we can find Ns

7.3510

9600/1025.1

375.0

11

6

sN

The total number of users is given by 3Ns, since three sectors existWithin a cell; therefore N=3*35.7=107users/cell.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 79: Multiple Access Techniques

79

CDMA Power Control

Why use power control?♦ Since all the mobile users transmit over the same frequency band, power control is essential to overcome near-far problems.♦ In CDMA, the system capacity is maximized if each mobile transmitter power level is controlled so that its signal arrives at the cell site with the minimum required signal-to-interference ratio.♦ Power control also plays a role in conserving transmitted signal power, thereby increasing the battery recharge cycle.

How to implement power control?☻forward power control-sampling the RSSI levels ☻open-loop method☻closed-loop method

Power control is a key technique in CDMA systemV.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 80: Multiple Access Techniques

80

Reference

1. Wireless communications principles & practice, Theodore S. Rappaport

2. Introduction to wireless communication systems, P. Mohana Shankar

3. Mobile Communications Enginnering Theory and Applications, Willian C. Y. Lee

4. http://www.anlian.com/trainingonline.htm

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 81: Multiple Access Techniques

81

Capacity of CDMA with Multiple Cells

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 82: Multiple Access Techniques

82

1. CDMA 2. Capacity of Cellular Systems3. Capacity of Cellular CDMA4. Compare single cell CDMA with Multiple cell CDMA5. Capacity of CDMA with Multiple Cells

(i) Frequency reuse factor, f(ii) Impact of Propagation Pathloss on Frequency reuse of CDMA systems(iii) Weighing Factor(iv) CDMA Capacity

6. Conclusions7. References

Contents

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 83: Multiple Access Techniques

83

CDMA

CDMA : is a “spread spectrum” technology, which spreadsthe information contained in a particular signal of interestover a much greater bandwidth than the original signal.

This is achieved by multiplying the signal by a very large bandwidth signal called the spreading signal.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 84: Multiple Access Techniques

84

1. All The users in CDMA share the same carrier frequency and may transmit simultaneously

2. Each user has its own pseudorandom codewordwhich is approximately orthogonal to all other codewords.

3. The receiver needs to know this codeword used bythe transmitter and it performs time correlation to

detect only the specific desired signal.

Features

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 85: Multiple Access Techniques

85

4. The near-far problem occurs at a CDMA receiver if an undesired user has a high detected power as compared to the desired user. To combat the near-far problem a power control is used in most CDMA implementations.

5. Capacity: There is no absolute limit on the number of users in CDMA. But as the number of users in the CDMA system increase the system performance decreases. The system performance increases as the number of users dec- rease.

Features

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 86: Multiple Access Techniques

86

Capacity of Cellular SystemsChannel Capacity: of a radio system is defined as the maximum number of channels or users that can be provided in a fixed frequency band.

Spectrum efficiency of a wireless system is determined by its “radio capacity”, which depends on the requiredCarrier-to-interference ratio (C/I) and the channel band-width (Bc).

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 87: Multiple Access Techniques

87

InterferenceInterference in a cellular system can be due to the surroun-ding base stations or due tothe surrounding subscriber units. That is there are two kinds of interferences:

1. Forward channel interference: This is the interference due to the surrounding co-channel base stations.

2. Reverse channel interference: This is the interference due to the surrounding subscriber units.

Interference damages the performance of the system, it can be tolerated to a certain extent that is given by the “co-channel reuse ratio”.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 88: Multiple Access Techniques

88

Capacity of Cellular CDMAThere is no absolute limit on the capacity of CDMA, but there is a tradeoff between the capacity and performance.

The capacity of CDMA is interference limited, which is unlike that TDMA and FDMA, which are bandwidthlimited. So to increase the capacity of CDMA we shouldreduce the interference.

Interference reducing techniques:1. Using Multisectorized antenna2. Operating in discontinues transmission mode

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 89: Multiple Access Techniques

89

1. Using Multisectorized antenna: In this technique we reduce the interference by using a directional antenna

which spatially isolates the users by receiving signals from only a fraction of the current users.

2. Discontinues Transmission Mode(DTX): This techn-ique takes advantage of the intermittent nature of speech.

Here the transmitter is turned off during the period of silence. If the voice activity factor is “ ”, then the

average bit-energy to noise density ratio, without apply- DTX is

Interference Reduction Technique

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 90: Multiple Access Techniques

90

Where

is the background noise, B is the bandwidth, R

R is the information bit rate.

With the application of the sectorization, DTX techniques the bit energy to noise density ratio

)/()1(

// 0 SN

RWNEb

That is reduces the interference term from (N-1) to This increases the bit energy ratio by almost a factor of 8

)1( N

)/()1(

// 0 SN

RWNEb

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 91: Multiple Access Techniques

91

Single Cell CDMA vs Multicell CDMA Multicell Single cell

1. All the base stations The base stations are inde-are interconnected by pendent.the mobile switchingcenter.

2. The weighting factors of The weighting factors of allall the users are not equal. the users are equal.

3. We need power control In the forward link no power in both the forward and control is required. Since for reverse links. a subscriber any interference

caused by the other subscriber remains at the same level as

desired signal.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 92: Multiple Access Techniques

92

Capacity of CDMA With Multiple Cells

In CDMA cellular system each base station can only cont-rol the transmit power of each of its own in-cell users, but itcan not control the power of users in the neighboring cells.

These neighboring users add to the noise floor and decreasethe capacity of the particular cell of interest.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 93: Multiple Access Techniques

93

Frequency reuse factorFrequency reuse factor (f): is determined by the amount of out-of-cell interference. It is defined as

iaii NUN

Nf

0

0

WhereN0: is the total interference power received from

the N-1 usersUi : is the number of users in the i th adjacent cell

Nai: is the average received power from users in the adjacent

cellsV.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 94: Multiple Access Techniques

94

Frequency reuse efficiency

Frequency reuse efficiency (F): is the percentage of frequ-ency reuse factor

F= f x 100%

Average received power (Nai ): is defined as follows

j i

ijai U

NN

Where NiJ is the power received at the base station of int-erest from the j th user in the i th cell.

Each adjacent cell may have different number of users and hence may receive different levels of interference. ThereforeNai is different for each cell user

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 95: Multiple Access Techniques

95

Impact of propagation path loss on the frequency reuse

Recursive geometric technique: This technique is also called “concentric circle cellular geometry”. It considers that

1. All cells have equal geographic area.2. Cell of interest is circular and located at the center of

all the surrounding cells.3. Interference cells are wedged shaped and are arranged

in layers around the center cell of interest.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 96: Multiple Access Techniques

96

Concentric circle cellular geometry

FigV.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 97: Multiple Access Techniques

97

1. R: is the radius of the cell of interest2. d0: is the minimum distance, such that users in the

center are located no closer than this distance3. d: is the distance from the base station at which all

the users in the center cell of interest are located, suchthat

Rdd 0

Capacity of CDMA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 98: Multiple Access Techniques

98

First layer of adjacent interfering cells is found onRdR 3

Second layer is located on

RdR 53 The i th interfering layer is located on

RidRi )12()12( The area A of the cell of interest is

220

2 RdRA

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 99: Multiple Access Techniques

99

If A1 denotes the entire area of the region. If each cell have the same area A, then there should be M1

cells that each span a particular angle ( ), such that:1

11

2

M

Solving the above equations gives M1=8 and 01 45

In general: Ai=Mi A=i. MiA= i.8A 1i

ii 41

1

=

AMRRA 122

1 )3(

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 100: Multiple Access Techniques

100

SectorsInterfering layers can be broken into two sublayers, an inner sublayer which is on

outer sublayer which is on

02)12( diRdRi

RiddiR )12(2 0

Partitioning of layers provide two sectors within each Wedge shaped cell in a given layerInner sector: Which contain a small fraction of area of The area of the cell and hence fewer usersOuter sector: Which contain much greater fraction of the area of the cell and hence more users

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 101: Multiple Access Techniques

101

Weighing FactorsWeighing Factors: are used to redistribute the users in theinner and outer sectors of an adjacent cell, since there is a wide range of user distributions in the interfering layers.

If K is the user density then the number of users (U) withinthe center cell is given be

U=KA.

In the first surrounding layer, the inner and outer sectors ofeach cell have areas given byInner sector:

8/38/))2((/ 2211 ARMA in

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 102: Multiple Access Techniques

102

Outer sector:

8/58/)2()3((/ 2211 ARMA out

For each first layer cell to possess U=KA users, weighingfactors for the user densities within the inner (W1in) and outer (W1out) sectors may be applied such that

111111 /)(/)( MAKWMAKWKAU outoutinin

)8/58/3( 11 outin WWKAKAU

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 103: Multiple Access Techniques

103

ConditionsOptimistic conditions: for frequency reuse (or upperbound) is seen when W1in=1 and W1out=1, then 3/8 of theusers will be in the inner sectors and 5/8 of the users will be in the outer sector and will offer smaller levels of interf-erence to the center cell.

Worst case: In this case all the users in each of the first layer cells would be located in the inner sector. The weighfactors in this case are W1in=8/3 and W1out=0

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 104: Multiple Access Techniques

104

Concentric circle geometry to find CDMA Capacity

To find the capacity of a multicell CDMA system, the con-centric circle geometry is used along with a propagation path loss model to determine the interference from the adjacent cell users.

We can find the frequency reuse factor from

iaii NUN

Nf

0

0

Where N0 is given by

KAPUPUPN 0000 )1( Where P0 is the power received from any of the users in thecenter cell V.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 105: Multiple Access Techniques

105

In the adjacent cells, each subscriber is power controlledwithin its own cell and at a distance d’ from its own base station .

Since propagation path loss are based on all distances greaterThan d0, a small forbidden zone having a width 2d0 is assu-med to exist in all surrounding rings.

This forbidden zone occupies negligible area and provides virtually the same interference results as of the case when there is no forbidden region

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 106: Multiple Access Techniques

106

Interference PowerInterference Power ( ): At the center of the cell from thethe j th user in the i th interfering cell is given by

nnjiji ddddPNdrP )/()/(),,( 00

'0,0,,0

jiP ,,0

To evaluate this expression we need to calculate d’

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 107: Multiple Access Techniques

107

FigV.Parthipan Sangeetha

AP/CSE ,TEC,Kanchipuram

Page 108: Multiple Access Techniques

108

Using the law of cosines it can be shown that, within anycell in the i th layer

Evaluating d’

20

22' )cos2(sin ddRidd 02)12( diRdRi For

20

22' )cos2(sin ddRidd For RiddiR )12(2 0

Inner sublayer:

Outer sublayer:

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 109: Multiple Access Techniques

109

Using d’, we can determine the interface power( ) as

jiP ,,0

nnjiji ddddPNdrP )/()/(),,( 00

'0,0,,0

Where n is the propagation path loss exponent. Using this power we can evaluate the average received power (Nai)

from

j i

ijai U

NN

Using which we can evaluate the frequency reuse factor (f)

iaii NUN

Nf

0

0

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 110: Multiple Access Techniques

110

Conclusions1. The two factors, voice activity and spatial isolation thro-

ugh the use of multibeam or multisectorized antennas, are sufficient to render CDMA capacity atleast double that of FDMA and TDMA under similar assumptions.

2. CDMA can reuse the same (entire) spectrum for all thecells, thereby increasing the capacity by a large percent-

age of the normal frequency reuse factor. The net increasein capacity due to the above factors in CDMA over

digital TDMA or FDMA is of the order of 4 to 6 and cu-rrent analog FM/FDMA it is nearly a factor of 20.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 111: Multiple Access Techniques

111

Space Division Multiple Access

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 112: Multiple Access Techniques

112

Directional Programmable Antenna

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 113: Multiple Access Techniques

113V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram

Page 114: Multiple Access Techniques

114

References1. Theodore S.Rappaport, “ Wireless Communications”,

Principles and Practice.

2. Jerry D.Gibson, “Mobile Communications”, Handbook,second edition.

3. T.S. Rappoport, “Effect of Radio Propagation Path Losson DS-CDMA Cellular Frequency Reuse Efficiency forthe Reverse Channel, IEEE Vehicular Technology,

Vol.41, Aug 19924. Klien S. Gilhousen, “On the capacity of a cellular CDMA

system”, IEEE Vehicular Technology,Vol.40, May 1991.

V.Parthipan Sangeetha AP/CSE ,TEC,Kanchipuram