SlideShare a Scribd company logo
7
Most read
8
Most read
10
Most read
Multiple access in
wireless communication
Subject : Mobile Computing and Wireless Communication
CE-B
 Maulik togadiya
What is Multiple access?
 Multiple access method allows several terminals connected
to the same multi-point transmission medium to transmit
over it. Examples of shared physical media are wireless
networks, bus networks, ring networks and half
duplex point-to-point links.
 Multiple access schemes to allow many users to share
simultaneously a finite amount of radio spectrum resources.
2
3
Multiple Access Techniques
 Frequency division multiple access (FDMA)
 Time division multiple access (TDMA)
 Code division multiple access (CDMA)
 Space division multiple access (SDMA)
4
Frequency division multiple access
(FDMA)
 The frequency band is divided into channels of equal
bandwidth so that each conversation is carried on a
different frequency.
 A specific frequency band is given to one person, and it
will received by identifying each of the frequency on the
receiving end. It is often used in the first generation of
analog mobile phone.
 Each station assigned a fixed frequency.
5
 In FDMA system signaling dimensions are divided along
the frequency axis into non overlapping channels and
each end users assigned a different frequency channel as
shown in fig.
6
Time division multiple access
(TDMA)
 Time frame is divided into slots (channels). Each user is
allocated a particular time slot or channel.
 Time Division Multiple Access (TDMA) is a digital
cellular telephone communication technology. It facilitates
many users to share the same frequency without
interference. Its technology divides a signal into different
timeslots, and increases the data carrying capacity.
7
 In TDMA system signaling dimensions are divided along
the Time axis into non overlapping channels and each end
users assigned a different timeslot channel as shown in
fig.
8
Code division multiple access
(CDMA)
 Code division multiple access (CDMA) is a channel
access method used by various radio communication
technologies.
 CDMA is an example of multiple access , where
several transmitters can send information
simultaneously over a single communication channel.
 This allows several users to share a band of
frequencies. To permit this without undue interference
between the users, CDMA employs spread-spectrum
technology.
9
 In this system, a user has access to the whole bandwidth
for the entire duration. The basic principle is that
different CDMA codes are used to distinguish among the
different users.
10
Space division multiple access
(CDMA)
 If there are no separation in frequency or time or code
domain ,an alternative way of separating different users is
spatial separation
 SDMA is a MIMO -based wireless communication network
architecture, primarily suitable for mobile ad-hoc networks,
which enables access to a communication channel by
identifying the user location and establishing a one-to-one
mapping between the network bandwidth division and the
identified spatial location.
11
 This figure shows a satellite system that uses spatial division
multiple access (SDMA) technology. In this example, a single
satellite contains several directional antennas. Some of these
antennas use the same frequency. This allows a single satellite to
simultaneously communicate to two different satellite receivers that
operate on the same frequency.
12
Packet radio access
 Packet radio is a form of packet switching technology used
to transmit digital data via radio or wireless
communications links. It uses the same concepts of data
transmission via Datagram that are fundamental to
communications via the Internet.
 There are three medium access protocol appropriate for
packet radio networks: ALOHA, slotted ALOHA,
and Carrier Sense Multiple Access (CSMA).
13
Pure aloha
 In pure ALOHA, the stations transmit frames whenever they have data to
send.
 When two or more stations transmit simultaneously, there is collision and
the frames are destroyed.
 In pure ALOHA, whenever any station transmits a frame, it expects the
acknowledgement from the receiver.
 If acknowledgement is not received within specified time, the station
assumes that the frame (or acknowledgement) has been destroyed.
 If the frame is destroyed because of collision the station waits for a
random amount of time and sends it again.
14
 Therefore pure ALOHA dictates that when time-out period
passes, each station must wait for a random amount of time
before resending its frame. This randomness will help avoid more
collisions.
 Figure shows an example of frame collisions in pure ALOHA.
15
Slotted aloha
 Slotted ALOHA was invented to improve the efficiency of
pure ALOHA as chances of collision in pure ALOHA are very
high.
 In slotted ALOHA, the time of the shared channel is divided
into discrete intervals called slots.
 The stations can send a frame only at the beginning of the slot
and only one frame is sent in each slot.
 In slotted ALOHA, if any station is not able to place the frame
onto the channel at the beginning of the slot i.e. it misses the
time slot then the station has to wait until the beginning of the
next time slot. 16
 In slotted ALOHA, there is still a possibility of collision if
two stations try to send at the beginning of the same time
slot as shown in fig.
17
Carrier sense multiple access
 Carrier sense multiple access (CSMA) is a probabilistic
media access control (MAC) protocol in which a node
verifies the absence of other traffic before transmitting on
transmission medium.
 CSMA is set of rule that which the device attached to the
network first determine whether the channel or carrier is in
use or free and then act accordingly.
18
 Type of CSMA:
 Persistence CSMA
 Non-persistence CSMA
19
Multiple access collision avoidance
20
 Multiple Access with Collision Avoidance (MACA) is a
protocol for slotted media access control used in wireless
LAN data transmission. MACA is used to avoid data
collisions caused by hidden station problems as well as
simplifying known exposed station problems.
 In MACA, a wireless network node announces that it is
going to send the data frame, informing the other nodes to
remain silent. When a node intends to transmit the data
frame, it communicates using a signal known as Request-
To-Send (RTS) that includes the length of the data frame
to transmit. If the recipient permits the transmission, it
responds back to the sender with a signal known as Clear-
To-Send (CTS), which includes the length of the data
frame that it is about to receive.
 In the meantime, the nodes that listen to the RTS signal
must remain silent until the data is fully transmitted in
order to avoid conflict with CTS.
 WLAN data transmission collisions can still happen, and
MACA for Wireless (MACAW) is brought to extend the
functionality of MACA. It demands nodes to send
acknowledgments after every successful frame
transmission.
21
multiple access in wireless communication

More Related Content

PPTX
IS-95 Cdma
PPTX
Cellular system
PPTX
Basic cellular system
PPTX
WIRELESS TRANSMISSION
PPTX
cellular concepts in wireless communication
PPTX
Multiple access techniques for wireless communication
PPT
Cdma ppt for ECE
PPT
Multiple access techniques
IS-95 Cdma
Cellular system
Basic cellular system
WIRELESS TRANSMISSION
cellular concepts in wireless communication
Multiple access techniques for wireless communication
Cdma ppt for ECE
Multiple access techniques

What's hot (20)

PDF
05. Frequency Management and Channel Assignment.pdf
PPTX
Cellular network
PPT
Multiple Access in wireless communication
PPTX
Spread spectrum
PPT
SPACE DIVISION MULTIPLEXING (SDMA)
PDF
Multiple access techniques
PPTX
Concept of Diversity & Fading (wireless communication)
PPTX
CELLULAR MOBILE RADIO SYSTEMS
PPT
Code Division Multiple Access- CDMA
PDF
8. introduction to small scale fading
PPTX
Large scale path loss 1
PPTX
ASYNCHRONOUS TRANSFER MODE (ATM)
PPTX
Localization & calling
PPTX
Gprs architecture ppt
PPTX
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
PPT
Diversity Techniques in mobile communications
PPT
GSM Technology
PPTX
Demand Assigned Multiple Access
PPTX
05. Frequency Management and Channel Assignment.pdf
Cellular network
Multiple Access in wireless communication
Spread spectrum
SPACE DIVISION MULTIPLEXING (SDMA)
Multiple access techniques
Concept of Diversity & Fading (wireless communication)
CELLULAR MOBILE RADIO SYSTEMS
Code Division Multiple Access- CDMA
8. introduction to small scale fading
Large scale path loss 1
ASYNCHRONOUS TRANSFER MODE (ATM)
Localization & calling
Gprs architecture ppt
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Diversity Techniques in mobile communications
GSM Technology
Demand Assigned Multiple Access
Ad

Similar to multiple access in wireless communication (20)

PPT
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
PPTX
Wierless networks ch3 (1)
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
PPTX
Mobile Communication-Medium Access Control
PPTX
Unit_3_WSN.pptx
PPTX
MEDIUM ACCESS CONTROL
PPTX
Media Access Control (MAC Layer)
PDF
Computer Networks and Data Communication.pdf
PDF
specialized-mac-sdmafdmatdma-and-cdma.pdf
PPTX
Multiple Access Methods
PPT
Common protocols
PPTX
Media Access Control
PDF
UNIT-V Wireless Communication.pdf
PPTX
Lecture 10
PPT
Lecture 6
PPTX
Chapter_03_Data Link Layer and its protocols.pptx
PPT
Ch_12 of media acess protocol and other .ppt
PPT
CHAPTER 6 - NETWORKING Multiple Access .ppt
PPTX
Multiple access protocol
MULTIPLE ACCESS IN WIRELESS COMMUNICATION
Wierless networks ch3 (1)
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile Communication-Medium Access Control
Unit_3_WSN.pptx
MEDIUM ACCESS CONTROL
Media Access Control (MAC Layer)
Computer Networks and Data Communication.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
Multiple Access Methods
Common protocols
Media Access Control
UNIT-V Wireless Communication.pdf
Lecture 10
Lecture 6
Chapter_03_Data Link Layer and its protocols.pptx
Ch_12 of media acess protocol and other .ppt
CHAPTER 6 - NETWORKING Multiple Access .ppt
Multiple access protocol
Ad

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
PDF
composite construction of structures.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT 4 Total Quality Management .pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Model Code of Practice - Construction Work - 21102022 .pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................
composite construction of structures.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Lecture Notes Electrical Wiring System Components
Automation-in-Manufacturing-Chapter-Introduction.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
573137875-Attendance-Management-System-original
UNIT 4 Total Quality Management .pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
OOP with Java - Java Introduction (Basics)
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...

multiple access in wireless communication

  • 1. Multiple access in wireless communication Subject : Mobile Computing and Wireless Communication CE-B  Maulik togadiya
  • 2. What is Multiple access?  Multiple access method allows several terminals connected to the same multi-point transmission medium to transmit over it. Examples of shared physical media are wireless networks, bus networks, ring networks and half duplex point-to-point links.  Multiple access schemes to allow many users to share simultaneously a finite amount of radio spectrum resources. 2
  • 3. 3
  • 4. Multiple Access Techniques  Frequency division multiple access (FDMA)  Time division multiple access (TDMA)  Code division multiple access (CDMA)  Space division multiple access (SDMA) 4
  • 5. Frequency division multiple access (FDMA)  The frequency band is divided into channels of equal bandwidth so that each conversation is carried on a different frequency.  A specific frequency band is given to one person, and it will received by identifying each of the frequency on the receiving end. It is often used in the first generation of analog mobile phone.  Each station assigned a fixed frequency. 5
  • 6.  In FDMA system signaling dimensions are divided along the frequency axis into non overlapping channels and each end users assigned a different frequency channel as shown in fig. 6
  • 7. Time division multiple access (TDMA)  Time frame is divided into slots (channels). Each user is allocated a particular time slot or channel.  Time Division Multiple Access (TDMA) is a digital cellular telephone communication technology. It facilitates many users to share the same frequency without interference. Its technology divides a signal into different timeslots, and increases the data carrying capacity. 7
  • 8.  In TDMA system signaling dimensions are divided along the Time axis into non overlapping channels and each end users assigned a different timeslot channel as shown in fig. 8
  • 9. Code division multiple access (CDMA)  Code division multiple access (CDMA) is a channel access method used by various radio communication technologies.  CDMA is an example of multiple access , where several transmitters can send information simultaneously over a single communication channel.  This allows several users to share a band of frequencies. To permit this without undue interference between the users, CDMA employs spread-spectrum technology. 9
  • 10.  In this system, a user has access to the whole bandwidth for the entire duration. The basic principle is that different CDMA codes are used to distinguish among the different users. 10
  • 11. Space division multiple access (CDMA)  If there are no separation in frequency or time or code domain ,an alternative way of separating different users is spatial separation  SDMA is a MIMO -based wireless communication network architecture, primarily suitable for mobile ad-hoc networks, which enables access to a communication channel by identifying the user location and establishing a one-to-one mapping between the network bandwidth division and the identified spatial location. 11
  • 12.  This figure shows a satellite system that uses spatial division multiple access (SDMA) technology. In this example, a single satellite contains several directional antennas. Some of these antennas use the same frequency. This allows a single satellite to simultaneously communicate to two different satellite receivers that operate on the same frequency. 12
  • 13. Packet radio access  Packet radio is a form of packet switching technology used to transmit digital data via radio or wireless communications links. It uses the same concepts of data transmission via Datagram that are fundamental to communications via the Internet.  There are three medium access protocol appropriate for packet radio networks: ALOHA, slotted ALOHA, and Carrier Sense Multiple Access (CSMA). 13
  • 14. Pure aloha  In pure ALOHA, the stations transmit frames whenever they have data to send.  When two or more stations transmit simultaneously, there is collision and the frames are destroyed.  In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver.  If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed.  If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. 14
  • 15.  Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions.  Figure shows an example of frame collisions in pure ALOHA. 15
  • 16. Slotted aloha  Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high.  In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots.  The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.  In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. 16
  • 17.  In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. 17
  • 18. Carrier sense multiple access  Carrier sense multiple access (CSMA) is a probabilistic media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on transmission medium.  CSMA is set of rule that which the device attached to the network first determine whether the channel or carrier is in use or free and then act accordingly. 18
  • 19.  Type of CSMA:  Persistence CSMA  Non-persistence CSMA 19
  • 20. Multiple access collision avoidance 20  Multiple Access with Collision Avoidance (MACA) is a protocol for slotted media access control used in wireless LAN data transmission. MACA is used to avoid data collisions caused by hidden station problems as well as simplifying known exposed station problems.
  • 21.  In MACA, a wireless network node announces that it is going to send the data frame, informing the other nodes to remain silent. When a node intends to transmit the data frame, it communicates using a signal known as Request- To-Send (RTS) that includes the length of the data frame to transmit. If the recipient permits the transmission, it responds back to the sender with a signal known as Clear- To-Send (CTS), which includes the length of the data frame that it is about to receive.  In the meantime, the nodes that listen to the RTS signal must remain silent until the data is fully transmitted in order to avoid conflict with CTS.  WLAN data transmission collisions can still happen, and MACA for Wireless (MACAW) is brought to extend the functionality of MACA. It demands nodes to send acknowledgments after every successful frame transmission. 21