SlideShare uma empresa Scribd logo
1 de 22
By : Nur Azlin Binti Razali
         Nur Fadzilah Binti Johar
Nur Fattahiah Binti Haslauhuddin
 Siti Norhidayah Binti Kamarudin
Introduction to CDMA
   CDMA (Code-Division Multiple Access) refers to any of several protocols
    used in so-called second-generation (2G) and third-generation (3G) wireless
    communications.

   As the term implies, CDMA is a form of multiplexing, which allows numerous
    signals to occupy a single transmission channel, optimizing the use of
    available bandwidth. The technology is used in ultra-high-frequency (UHF)
    cellular telephone systems in the 800-MHz and 1.9-GHz bands.

   All users can use same carrier frequency and may transmit simultaneously.
    Each user in a CDMA system uses a different code to modulate their signal.

   The best performance will occur when there is good separation between the
    signal of a desired user and the signals of other users.

   The separation of the signals is made by correlating the received signal with
    the locally generated code of the desired user. If the signal matches the
    desired user's code then the correlation function will be high and the system
    can extract that signal.
How CDMA works?
 The words "code" and "division" are important parts of
  how CDMA works.
 CDMA uses codes to convert between analog voice
  signals and digital signals and also uses codes to
  separate (or divide) voice and control data into data
  streams called "channels."
 CDMA converts speech into digital information, which is
  transmitted as a radio signal over wireless network.
 The unique about CDMA is that it uses a unique code to
  distinguish each different call, thus enabling many
  people to share the airwaves simultaneously; it thereby
  eliminates cross talk and interference.
 CDMA is also used in data technology apart from voice
  technology.
      There are five steps in generating a CDMA signal :
i)     analog to digital conversion
ii)    vocoding
iii)   encoding and interleaving
iv)    channelizing the signals
v)     conversion of the digital signals to a Radio Frequency
       (RF) signals
Analog to digital conversion
   The first step of CDMA signal generation
    is analog to digital conversion,
    sometimes called A/D conversion.
    CDMA uses a technique called Pulse
    Code Modulation (PCM) to accomplish
    A/D conversion.
Vocoding
   The second step of CDMA signal generation is voice compression
   Vocoder : to accomplish voice compression.
   The term "vocoder" is a contraction of the words "voice" and "code.
   Vocoders are located at the BSC and in the phone. People pause between
    syllables and words when they talk. CDMA takes advantage of these
    pauses in speech activity by using a variable rate vocoder. A CDMA vocoder
    varies compression of the voice signal into one of four data rates based on
    the rate of the user's speech activity.
Encoding and interleaving




   encoding and interleaving that is built into the
    BTS and the phones

    The purpose of the encoding and interleaving is
    to build redundancy into the signal so that
    information lost in transmission can be recovered
 The type of encoding done at this stage is
  called "convolutional encoding.
 A digital message consists of four bits (A, B, C,
  D) of vocoded data. Each bit is repeated three
  times. These encoded bits are called symbols.
 The decoder at the receiver uses a majority
  logic rule. Thus, if an error occurs, the
  redundancy can help recover the lost
  information.
 A burst error is a type of error in received
  digital telephone signals. Burst errors occur in
  clumps of adjacent symbols. These errors are
  caused by fading and interference. Encoding
  and interleaving reduce the effects of burst
  errors.
   Interleaving is a simple but powerful method of reducing the effects of burst
    errors and recovering lost bits. In the example shown here the symbols from
    each group are interleaved (or scrambled) in a pattern that the receiver knows.
    De-interleaving at the receiver unscrambles the bits, spreading any burst errors
    that occur during transmission.
   The encoded voice data is further encoded to separate
    it from other encoded voice data. The encoded symbols
    are then spread over the entire bandwidth of the CDMA
    channel. This process is called channelization. The
    receiver knows the code and uses it to recover the voice
    data.
Channelizing
 CDMA uses two important types of
  codes to channelize users.
 Walsh codes channelize users on the
  forward link (BTS to mobile).
 Pseudorandom Noise (PN) codes
  channelize users on the reverse link
  (mobile to BTS)
Conversion of the digital signals to a
    Radio Frequency (RF) signals


   The BTS combines channelized data from all
    calls into one signal. It then converts the
    digital signal to a Radio Frequency (RF)
    signal for transmission.
Architecture of CDMA
A CDMA network consists of the following
  components :

   Mobile Station (MS )
   Base Station ( BS )
   Base Station Controller ( BSC )
   Mobile Switching Center ( MSC )
   Home Location Register ( HLR )
   Visitor Location Register ( VLR )
   Authentication Center (AC)
   Operation and Administration (OAM)
cCOMPONENT                         FUNCTION
Mobile station                     The CDMA mobile station (or mobile phone) communicates with other parts of the system through
                                   the base station system.

Base station (BS)                  The base station (BS) handles the radio interface to the mobile station. The base station is the radio
                                   equipment (transceivers and antennas).

Base station Controller (BSC)      The BSC provides the control functions and physical links between the MSC and BTS. It provides
                                   functions such as hand cover, cell configuration data and control of RF power levels in as transceiver
                                   stations.

Mobile      switching     center The MSC performs the telephony switching functions of the system. Its also performs such functions
(MSC)                              as toll ticketing, network interfacing ,common channel signaling, and others.

Home location register (HLR)       The HLR database is used for storage and management of subscriptions. The home location register
                                   stores permanent data about subscribers, including a subscriber’s service profile, location
                                   information, and activity status.

Visitor location register (VLR) The VLR database contains temporary information about subscribers that is needed by the mobile
                                   services switching center (MSC) in order to service visiting subscribers. When a mobile station
                                   roams into a new mobile services switching center (MSC)
                                   Area, the visitor location register (VLR) connected to that MSC will request data about the mobile
                                   station from the HLR, reducing the need for interrogation of the home location register (HLR).


Authentication (AC)          The AC provides authentication and encryption parameters that verify the user’s identity and ensure
                             the confidentiality of each call. The authentication center (AUC) also protects network operators
                             from fraud.
Operation and administration The OAM is the functional entity from which the network operator monitors and control the system.
(OAM)                        The purpose of operation and support system is to offer support for centralized, regional and local
                             operational and maintenance activities that are required for a CDMA network.
Architecture of CDMA
Example CDMA 2nd Generation:
Architecture of CDMA
Example CDMA 3rd Generation:
CDMA Applications :
   One of the early applications for code division multiplexing
    is in GPS. This predates and is distinct from its use
    in mobile phones.
   The Qualcomm standard IS-95, marketed as cdma One.
   The Qualcomm standard IS-2000, known as CDMA2000.
    This standard is used by several mobile phone
    companies, including the Global star satellite
    phone network.
   The UMTS 3G mobile phone standard, which uses W-
    CDMA.
   CDMA has been used in the Omni TRACS satellite
    system for transportation logistic

Advantages of CDMa                     Disadvantages of CDMA

   more advanced digital interface
    technology                                one major problem in CDMA
                                               technology is channel
   the transmission power is
    extremely small, so conversation           polution,where signals from too
    is not only less radiation,                many cell sites are present in
                                               the subscriber’s phone but
    also longer battery life mobile
    phones.                                    none of them is dominant.(the
                                               quality of the audio degrades)
   better call quality, almost no noise
    when making a call,                       limited to North America and a
   there is no health adverse effects         few other places, GSM is
    because its radiation is negligible        worldwide
   faster download speeds                    limited variety of the handset
   best privacy (spread spectrum),            because at present the major
                                               mobile companies use GSM
   hardest to crack (the AIR
                                               technologies.
    INTERFACE)
   cost of calls is cheaper than in
    GSM.
ADVANTAGES                                 DISADVANTAGES



CDMA   •Increased cellular communications         •Due to its proprietary
       security.                                  nature, all of cdma’s
       •Simultaneous conversations                flaws are not known
       •Increased efficiency                      •CDMA is relatively new,
       •Smaller phones                            and all the network is not
       •Low power requirements and little cell-   as mature as GSM.
       to-cell coordination needed by             •Cannot offer
       operators.                                 international roaming
       •Extended reach
GSM    •Already used worldwide                    •Lack of access to
       •Permits international roaming             burgeoning American
       •More stable network                       market.
       •Smart cards that provide security data
       encryption
Frequency hopping CDMA
There are two kinds of frequency hopping ;
 Slow Frequency Hopping (SFH)
  In this case one or more data bits are
  transmitted within one hop. An advantage is
  that coherent data detection is possible. Often,
  systems using slow hopping also employ
  (burst) error control coding to restore loss of
  (multiple) bits in one hop.
 Fast Frequency Hopping (FFH)
  One data bit is divided over multiple hops. In
  fast hopping, coherent signal detection is
  difficult, and seldom used. Mostly, FSK or
  MFSK modulation is used.
Direct sequence CDMA
   In Direct Sequence spread spectrum transmission, the
    user data signal is multiplied by a code sequence. Mostly,
    binary sequences are used. The duration of an element in
    the code is called the "chip time". The ratio between the
    user symbol time and the chip time is called the spread
    factor. The transmit signal occupies a bandwidth that
    equals the spread factor times the bandwidth of the user
    data.
   As despreading is the same operation as spreading a
    possible narrowband jammer signal in the radio channel
    is spread before the detector. Thus, the jam signal is
    attenuated by the spread factor ("spreading gain").

Mais conteúdo relacionado

Mais procurados

Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
Kaushal Kabra
 

Mais procurados (20)

Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
TDMA
TDMATDMA
TDMA
 
Antenna system
Antenna systemAntenna system
Antenna system
 
Lecture5 teletraffic
Lecture5 teletrafficLecture5 teletraffic
Lecture5 teletraffic
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
EIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular SystemEIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular System
 
FDMA & TDMA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
 
Trunking Theory
 Trunking Theory Trunking Theory
Trunking Theory
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Indoor propagation model (IPM)
Indoor propagation model (IPM)Indoor propagation model (IPM)
Indoor propagation model (IPM)
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Smart antenna
Smart antennaSmart antenna
Smart antenna
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
 

Destaque

CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1
Tempus Telcosys
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
Amit Gaikwad
 

Destaque (15)

Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
CDMA
CDMACDMA
CDMA
 
Cdma system
Cdma systemCdma system
Cdma system
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
CDMA
CDMACDMA
CDMA
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Cdma Anjan V1
Cdma  Anjan V1Cdma  Anjan V1
Cdma Anjan V1
 
Cd
CdCd
Cd
 
Cdma
CdmaCdma
Cdma
 
Cdma introduction pr
Cdma introduction prCdma introduction pr
Cdma introduction pr
 
CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1CDMA 1x Introduction to Power Control Issue2.1
CDMA 1x Introduction to Power Control Issue2.1
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
Ai Cdma
Ai CdmaAi Cdma
Ai Cdma
 

Semelhante a Cdma : mobile

My Seminar
My SeminarMy Seminar
My Seminar
anoop_wi
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
Adams Firdaus
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
kkkseld
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
sachi100
 
Gsm1
Gsm1Gsm1

Semelhante a Cdma : mobile (20)

Celluler telephone 2
Celluler telephone 2Celluler telephone 2
Celluler telephone 2
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
My Seminar
My SeminarMy Seminar
My Seminar
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
GSM
GSMGSM
GSM
 
Gsm
Gsm Gsm
Gsm
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
Unit 1
Unit 1Unit 1
Unit 1
 
G second generation network
G second generation networkG second generation network
G second generation network
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
Pawan..bsnl
Pawan..bsnlPawan..bsnl
Pawan..bsnl
 
Gsmadvanced
GsmadvancedGsmadvanced
Gsmadvanced
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Gsm1
Gsm1Gsm1
Gsm1
 
Gsm is
Gsm isGsm is
Gsm is
 
2g,3g,4g, technology Dialog axiata
2g,3g,4g, technology Dialog axiata2g,3g,4g, technology Dialog axiata
2g,3g,4g, technology Dialog axiata
 
Gsm technology. final seminar reportdocx
Gsm technology. final seminar reportdocxGsm technology. final seminar reportdocx
Gsm technology. final seminar reportdocx
 

Mais de Azlin lolin (11)

Conical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cstConical horn antenna with parabolic reflector using cst
Conical horn antenna with parabolic reflector using cst
 
Engineers in society
Engineers in societyEngineers in society
Engineers in society
 
nilai2 islam dlm agama lain
nilai2 islam dlm agama lainnilai2 islam dlm agama lain
nilai2 islam dlm agama lain
 
Design of a rectangular patch antenna
Design of a rectangular patch antennaDesign of a rectangular patch antenna
Design of a rectangular patch antenna
 
A better tomorrow
A better tomorrowA better tomorrow
A better tomorrow
 
humidity sensor project
humidity sensor projecthumidity sensor project
humidity sensor project
 
Burst
BurstBurst
Burst
 
Ese563
Ese563 Ese563
Ese563
 
Dato bahaman intro
Dato bahaman introDato bahaman intro
Dato bahaman intro
 
Control capacitive measurement
Control capacitive measurementControl capacitive measurement
Control capacitive measurement
 
Capacitive sensor
Capacitive sensorCapacitive sensor
Capacitive sensor
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cdma : mobile

  • 1. By : Nur Azlin Binti Razali Nur Fadzilah Binti Johar Nur Fattahiah Binti Haslauhuddin Siti Norhidayah Binti Kamarudin
  • 2. Introduction to CDMA  CDMA (Code-Division Multiple Access) refers to any of several protocols used in so-called second-generation (2G) and third-generation (3G) wireless communications.  As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands.  All users can use same carrier frequency and may transmit simultaneously. Each user in a CDMA system uses a different code to modulate their signal.  The best performance will occur when there is good separation between the signal of a desired user and the signals of other users.  The separation of the signals is made by correlating the received signal with the locally generated code of the desired user. If the signal matches the desired user's code then the correlation function will be high and the system can extract that signal.
  • 3. How CDMA works?  The words "code" and "division" are important parts of how CDMA works.  CDMA uses codes to convert between analog voice signals and digital signals and also uses codes to separate (or divide) voice and control data into data streams called "channels."  CDMA converts speech into digital information, which is transmitted as a radio signal over wireless network.  The unique about CDMA is that it uses a unique code to distinguish each different call, thus enabling many people to share the airwaves simultaneously; it thereby eliminates cross talk and interference.  CDMA is also used in data technology apart from voice technology.
  • 4. There are five steps in generating a CDMA signal : i) analog to digital conversion ii) vocoding iii) encoding and interleaving iv) channelizing the signals v) conversion of the digital signals to a Radio Frequency (RF) signals
  • 5. Analog to digital conversion  The first step of CDMA signal generation is analog to digital conversion, sometimes called A/D conversion. CDMA uses a technique called Pulse Code Modulation (PCM) to accomplish A/D conversion.
  • 6. Vocoding  The second step of CDMA signal generation is voice compression  Vocoder : to accomplish voice compression.  The term "vocoder" is a contraction of the words "voice" and "code.  Vocoders are located at the BSC and in the phone. People pause between syllables and words when they talk. CDMA takes advantage of these pauses in speech activity by using a variable rate vocoder. A CDMA vocoder varies compression of the voice signal into one of four data rates based on the rate of the user's speech activity.
  • 7. Encoding and interleaving  encoding and interleaving that is built into the BTS and the phones  The purpose of the encoding and interleaving is to build redundancy into the signal so that information lost in transmission can be recovered
  • 8.  The type of encoding done at this stage is called "convolutional encoding.  A digital message consists of four bits (A, B, C, D) of vocoded data. Each bit is repeated three times. These encoded bits are called symbols.  The decoder at the receiver uses a majority logic rule. Thus, if an error occurs, the redundancy can help recover the lost information.  A burst error is a type of error in received digital telephone signals. Burst errors occur in clumps of adjacent symbols. These errors are caused by fading and interference. Encoding and interleaving reduce the effects of burst errors.
  • 9. Interleaving is a simple but powerful method of reducing the effects of burst errors and recovering lost bits. In the example shown here the symbols from each group are interleaved (or scrambled) in a pattern that the receiver knows. De-interleaving at the receiver unscrambles the bits, spreading any burst errors that occur during transmission.
  • 10. The encoded voice data is further encoded to separate it from other encoded voice data. The encoded symbols are then spread over the entire bandwidth of the CDMA channel. This process is called channelization. The receiver knows the code and uses it to recover the voice data.
  • 11. Channelizing CDMA uses two important types of codes to channelize users.  Walsh codes channelize users on the forward link (BTS to mobile).  Pseudorandom Noise (PN) codes channelize users on the reverse link (mobile to BTS)
  • 12. Conversion of the digital signals to a Radio Frequency (RF) signals  The BTS combines channelized data from all calls into one signal. It then converts the digital signal to a Radio Frequency (RF) signal for transmission.
  • 13. Architecture of CDMA A CDMA network consists of the following components :  Mobile Station (MS )  Base Station ( BS )  Base Station Controller ( BSC )  Mobile Switching Center ( MSC )  Home Location Register ( HLR )  Visitor Location Register ( VLR )  Authentication Center (AC)  Operation and Administration (OAM)
  • 14. cCOMPONENT FUNCTION Mobile station The CDMA mobile station (or mobile phone) communicates with other parts of the system through the base station system. Base station (BS) The base station (BS) handles the radio interface to the mobile station. The base station is the radio equipment (transceivers and antennas). Base station Controller (BSC) The BSC provides the control functions and physical links between the MSC and BTS. It provides functions such as hand cover, cell configuration data and control of RF power levels in as transceiver stations. Mobile switching center The MSC performs the telephony switching functions of the system. Its also performs such functions (MSC) as toll ticketing, network interfacing ,common channel signaling, and others. Home location register (HLR) The HLR database is used for storage and management of subscriptions. The home location register stores permanent data about subscribers, including a subscriber’s service profile, location information, and activity status. Visitor location register (VLR) The VLR database contains temporary information about subscribers that is needed by the mobile services switching center (MSC) in order to service visiting subscribers. When a mobile station roams into a new mobile services switching center (MSC) Area, the visitor location register (VLR) connected to that MSC will request data about the mobile station from the HLR, reducing the need for interrogation of the home location register (HLR). Authentication (AC) The AC provides authentication and encryption parameters that verify the user’s identity and ensure the confidentiality of each call. The authentication center (AUC) also protects network operators from fraud. Operation and administration The OAM is the functional entity from which the network operator monitors and control the system. (OAM) The purpose of operation and support system is to offer support for centralized, regional and local operational and maintenance activities that are required for a CDMA network.
  • 15. Architecture of CDMA Example CDMA 2nd Generation:
  • 16. Architecture of CDMA Example CDMA 3rd Generation:
  • 17. CDMA Applications :  One of the early applications for code division multiplexing is in GPS. This predates and is distinct from its use in mobile phones.  The Qualcomm standard IS-95, marketed as cdma One.  The Qualcomm standard IS-2000, known as CDMA2000. This standard is used by several mobile phone companies, including the Global star satellite phone network.  The UMTS 3G mobile phone standard, which uses W- CDMA.  CDMA has been used in the Omni TRACS satellite system for transportation logistic 
  • 18. Advantages of CDMa Disadvantages of CDMA  more advanced digital interface technology  one major problem in CDMA technology is channel  the transmission power is extremely small, so conversation polution,where signals from too is not only less radiation, many cell sites are present in the subscriber’s phone but  also longer battery life mobile phones. none of them is dominant.(the quality of the audio degrades)  better call quality, almost no noise when making a call,  limited to North America and a  there is no health adverse effects few other places, GSM is because its radiation is negligible worldwide  faster download speeds  limited variety of the handset  best privacy (spread spectrum), because at present the major mobile companies use GSM  hardest to crack (the AIR technologies. INTERFACE)  cost of calls is cheaper than in GSM.
  • 19.
  • 20. ADVANTAGES DISADVANTAGES CDMA •Increased cellular communications •Due to its proprietary security. nature, all of cdma’s •Simultaneous conversations flaws are not known •Increased efficiency •CDMA is relatively new, •Smaller phones and all the network is not •Low power requirements and little cell- as mature as GSM. to-cell coordination needed by •Cannot offer operators. international roaming •Extended reach GSM •Already used worldwide •Lack of access to •Permits international roaming burgeoning American •More stable network market. •Smart cards that provide security data encryption
  • 21. Frequency hopping CDMA There are two kinds of frequency hopping ;  Slow Frequency Hopping (SFH) In this case one or more data bits are transmitted within one hop. An advantage is that coherent data detection is possible. Often, systems using slow hopping also employ (burst) error control coding to restore loss of (multiple) bits in one hop.  Fast Frequency Hopping (FFH) One data bit is divided over multiple hops. In fast hopping, coherent signal detection is difficult, and seldom used. Mostly, FSK or MFSK modulation is used.
  • 22. Direct sequence CDMA  In Direct Sequence spread spectrum transmission, the user data signal is multiplied by a code sequence. Mostly, binary sequences are used. The duration of an element in the code is called the "chip time". The ratio between the user symbol time and the chip time is called the spread factor. The transmit signal occupies a bandwidth that equals the spread factor times the bandwidth of the user data.  As despreading is the same operation as spreading a possible narrowband jammer signal in the radio channel is spread before the detector. Thus, the jam signal is attenuated by the spread factor ("spreading gain").