Você está na página 1de 2

National Institute Of Technology Kurukshetra Training Report On CDMA in Telecommunication

Submitted by: Anurag Joshi Section: EC1 Roll: 109062 Contents: 1. Introduction In telecommunications scenario, the main concern is of user mobility which asks for a Multiple Access meaning that multiple, simultaneous users can be supported with radio interface. It is easier to understand CDMA if it is compared with ot her multiple access technologies. The following sections describe the fundamenta l differences between a Frequency Division Multiple Access Analog technology (FD MA), a Time Division Multiple Access Digital technology (TDMA) and a Code Divisi on Multiple Access Digital technology (CDMA). FDMA - Frequency Division Multiple Access In FDMA each user is assigned a discrete slice of the RF spectrum. FDMA permits only one user per channel since it allows the user to use the channel 100% of th e time. Therefore, only the frequency "dimension" is used to define channels. TDMA - Time Division Multiple Access The key point to make about TDMA is that users are still assigned a discrete sli ce of RF spectrum, but multiple users now share that RF carrier on a time slot b asis. Each of the users alternates their use of the RF channel. A user is assign ed a particular time slot in a carrier and can only send or receive information at those times. They are re-assembled at the receiving end, and appear to provid e continuous data because the process is repeated many times per second. CDMA - Code Division Multiple Access CDMA is a "spread spectrum" technology, which means that it spreads the informat ion contained in a particular signal of interest over a much greater bandwidth t han the original signal. The effect of spreading is achieved using codes of much higher rate than the data signal so that a narrow band data is spread over a la rge bandwidth. The standard data rate of a CDMA call is 9600 bits per second (9. 6 kilobits per second). This initial data is "spread," including the application of digital codes to the data bits, up to the transmitted rate of about 1.23 meg abits per second. The data bits of each call are then transmitted in combination with the data bits of all of the calls in the cell. At the receiving end, the d igital codes are separated out, leaving only the original information which was to be communicated. At that point, each call is once again a unique data stream with a rate of 9600 bits per second. Traditional uses of spread spectrum are in military operations. Because of the wide bandwidth of a spread spectrum signal, it is very difficult to jam, difficult to interfere with, and difficult to ident ify. This is in contrast to technologies using a narrower bandwidth of frequenci es. Since a wideband spread spectrum signal is very hard to detect, it appears a s nothing more than noise and interference without knowing the code that spread it. With other technologies, the power of the signal is concentrated in a narrow er band, which makes it easier to detect. Increased privacy is inherent in CDMA technology. CDMA phone calls will be secure from the casual eavesdropper since, unlike an analog conversation, a simple radio receiver will not be able to pick individual digital conversations out of the overall RF radiation in a frequency

band.

NETWORK If there were only three or four telephones in a locale, it would make sense to connect each phone to all other phones and find a simple method of selecting the desired one. However, if there are three or four thousand phones in a locale, s uch a method is not useful. Then it is appropriate to connect each phone to some centrally located office and perform switching there. This switching could be a simple manual operation using plugs and sockets or could be done with electrome chanical devices or with electronics. In any case, this central office solution is the one that has been chosen by the telecommunications industry. As we connect each of these thousands of telephones to the central office, we have what is cal led a star configuration; all lines are particular to one and only one station, and all terminate on the nucleus of this starthe central office (CO). These conne ctions are called the local exchange plant, and the telephone company handling t his function is called the local exchange carrier (LEC). The connections themsel ves are often called the local loop. In more technical terms, the section closest to the customers premises is called the distribution plant and that section close st to the central office, the feeder plant. To connect one city or state or coun try to another, these central offices are to be connected to higher echelon cent ral offices. This forms a number of levels of central offices known as hierarchy of switching on which actually the telecommunication industry depends. The Hierarchy of Switching Systems in ItsMost Basic Form Consists of Five Classes of Offices Here, the only office that has consumers as its subscribers is the Class-5 offic e. The other officesin this hierarchy have lower-level central offices as their s ubscribers. Those lines connectingswitching offices to switching offices, rather than to subscribers, are called trunks. The sectionleading upward from the Class -5 offices is handled not by the LECs, but by the interexchangecarriers (IXCs), the long-distance carriers. The total network is called the public switched

Você também pode gostar