SlideShare uma empresa Scribd logo
1 de 26
Wireless Communications Spread Spectrum....& more about CDMA
Spread Spectrum:  DS-SS, FH-SS, Coding Gain, Fading Margins
Key Digital Modulation Techniques: OFDM
Spread spectrum
Spread-spectrum ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Spread spectrum ,[object Object],[object Object],[object Object],[object Object]
Freq Hop Time Hop
Bandwidth Usage in CDMA 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Transmissions characteristics of cdma2000 (FDD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Walsh codes ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
CDMA uses spread spectrum Technology. cdmaOne™ identifies 2G and 2.5G cellular, PCS and wireless local loop (WLL) services based on the IS-95A and IS-95B CDMA air interface standards. IS-95A supports data delivery up to 14.4 kbps while IS-95B offers up to 115 kbps. CDMA2000 is an ITU-approved, IMT-2000 (3G) standard CDMA2000 1X can double voice capacity and delivers data rates up to 307 kbps CDMA2000 1xEV is optimized for high-speed data: CDMA2000 1xEV-DO uses a designated channel for data at speeds of up to 2.4 Mbps in a single carrier CDMA2000 1xEV-DV integrates voice and data on a single channel with speeds of up to 4.8 Mbps CDMA: the present and future
CDMA – Multiple Users
OFDM ,[object Object],[object Object],[object Object],[object Object],[object Object]
OFDM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overall spectrum of the simple OFDM signal shown with four subcarriers within. Note that the zero crossings all correspond to peaks of adjacent subcarriers .
conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effects of Fading
Irreducible Bit Error Rate due to multipath
Simulation of Fading and Multipath
Irreducible BER due to fading
Irreducible BER due to fading
BER due to fading & multipath

Mais conteúdo relacionado

Mais procurados

Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
Amit Gaikwad
 
An overwiew of cdma
An overwiew of cdmaAn overwiew of cdma
An overwiew of cdma
saimun1992
 
Basic cdma for 2 g and 3g
Basic cdma for 2 g and 3gBasic cdma for 2 g and 3g
Basic cdma for 2 g and 3g
trimba
 

Mais procurados (20)

Cdma
CdmaCdma
Cdma
 
Cdma pdf
Cdma pdfCdma pdf
Cdma pdf
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Cdma presentation final
Cdma presentation finalCdma presentation final
Cdma presentation final
 
CDMA Presentation
CDMA PresentationCDMA Presentation
CDMA Presentation
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
An overwiew of cdma
An overwiew of cdmaAn overwiew of cdma
An overwiew of cdma
 
Cdma me
Cdma meCdma me
Cdma me
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
Basic cdma for 2 g and 3g
Basic cdma for 2 g and 3gBasic cdma for 2 g and 3g
Basic cdma for 2 g and 3g
 
Cdma
CdmaCdma
Cdma
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Ons training day 1
Ons training day 1Ons training day 1
Ons training day 1
 
CDMA Introducton
CDMA IntroductonCDMA Introducton
CDMA Introducton
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
Ai Cdma
Ai CdmaAi Cdma
Ai Cdma
 
CDMA
CDMACDMA
CDMA
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 

Destaque

MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?
Alpen-Adria-Universität
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Swapnil Salunke
 

Destaque (18)

Spread spectrum communications and CDMA
Spread spectrum communications and CDMASpread spectrum communications and CDMA
Spread spectrum communications and CDMA
 
MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?MPEG (Systems) standards: where are we today?
MPEG (Systems) standards: where are we today?
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
 
Jpeg 2000
Jpeg 2000Jpeg 2000
Jpeg 2000
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Hw2
Hw2Hw2
Hw2
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Cdma
CdmaCdma
Cdma
 
Dct and adaptive filters
Dct and adaptive filtersDct and adaptive filters
Dct and adaptive filters
 
Dsss final
Dsss finalDsss final
Dsss final
 
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 
Digital Communication Techniques
Digital Communication TechniquesDigital Communication Techniques
Digital Communication Techniques
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Jpeg2000
Jpeg2000Jpeg2000
Jpeg2000
 
Compression
CompressionCompression
Compression
 
Coding and testing in Software Engineering
Coding and testing in Software EngineeringCoding and testing in Software Engineering
Coding and testing in Software Engineering
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 

Semelhante a cdma

Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
Sidra Mallick
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
Adams Firdaus
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
getvibha
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
IOSR Journals
 

Semelhante a cdma (20)

Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdfTech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
 
Overview of Wireless Communications
Overview of Wireless CommunicationsOverview of Wireless Communications
Overview of Wireless Communications
 
wireless communication
wireless  communicationwireless  communication
wireless communication
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Report
ReportReport
Report
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systems
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
W cdma
W cdmaW cdma
W cdma
 
OFDM.ppt
OFDM.pptOFDM.ppt
OFDM.ppt
 
MODERN WIRELESS NETWORKS
MODERN WIRELESS NETWORKSMODERN WIRELESS NETWORKS
MODERN WIRELESS NETWORKS
 
ofdm
ofdmofdm
ofdm
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 

Último

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

cdma

Notas do Editor

  1. Fig. 2.12
  2. Fig. 2.13
  3. Fig. 2.14
  4. Fig. 2.16
  5. Fig. 2.16
  6. Fig. 2.16
  7. Fig. 2.16