CDMA Technology Full Download Seminar Report and Paper Presentation
#5
[attachment=3890]


CDMA Technology
Presented By:

- Gudimetla Sri Latha
1/3 M.C.A II Semester

CDMA

The world is demanding more from wireless communication technologies than ever before as more people around the world are subscribing to wireless. Add in exciting Third-Generation (3G) wireless data services and applications - such as wireless email, web, digital picture taking/sending, assisted-GPS position location applications, video and audio streaming and TV broadcasting - and wireless networks are doing much more than just a few years ago.
This is where CDMA technology fits in. CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time, and it is the common platform on which 3G technologies are built.

Code-Division Multiple Access, a digital Cellular technology that uses spread-spectrum techniques. Unlike competing systems such as GSM, that use TDMA. CDMA does not assign a specific frequency to each user. Instead, every Channel uses the full available spectrum. Individual conversations are encoded with a pseudo random digital sequence, but give the right to use both to all users simultaneously. To do this, it uses a technique known as Spread Spectrum. In effect, each user is assigned a code which spreads its signal bandwidth in such a way that only the same code can recover it at the receiver end. This method has the property that the unwanted signals
with different codes get spread even more by the process, making them like noise to the receiver.
Spread Spectrum
Spread Spectrum is a mean of transmission where the data occupies a larger bandwidth than necessary. Bandwidth spreading is accomplished before the transmission through the use of a code, which is independent of the transmitted data. The same code is used to demodulate the data at the receiving end. The following figure illustrate the spreading done on the data signal x(t) by the spreading signal c(t) resulting in the message signal to be transmitted, m(t).

Originally for military use to avoid jamming (interference created on purpose to make a communication channel unusable), spread spectrum modulation is now used in personal communication systems for its superior performance in an interference-dominated environment.

Processing Gain

In spread spectrum, the data is modulated by a spreading signal, which uses more bandwidth than the data signal. Since multiplication in the time domain corresponds to convolution in the frequency domain, a narrow band signal multiplied by a wide band signal ends up being wide band. One way of doing this is to use a binary waveform as a spreading function, at a higher rate than the data signal.

Here the three signals corresponds to x(t), c(t) and m(t) discussed above. The first two signals are multiplied together to give the third waveform.
Bits of the spreading signal are called chips. On the above figure, Tb represents the period of one data bit and Tc represents the period of one chip. The chip rate, 1/Tc, is often used to characterize a spread spectrum transmission system.
The Processing Gain or sometimes called the Spreading Factor is defined as the ratio of the information bit duration over the chip duration:
PG = SF = Tb / Tc
Hence, it represents the number of chips contained in one data bit. Higher Processing Gain (PG) means more spreading. High PG also means that more codes can be allocated on the same frequency channel (more on that later).
Pseudo-Noise Sequences

So far we haven't discussed what properties we would want the spreading signal to have. This depends on the type of system we want to implement. Let's first consider a system where we want to use spread spectrum to avoid jamming or narrow band interference.
If we want the signal to overcome narrow band interference, the spreading function needs to behave like noise. Random binary sequences are such functions. They have the following important properties:
Balanced: they have an equal number of 1's and 0's
Single Peak auto “ correlation function
In fact, the auto-correlation function of a random binary sequence is a triangular waveform as in the following figure, where TC is the period of one chip:

Hence the spectral density of such a waveform is a sin function squared, with first zeros at ± 1/TC
PN sequences are periodic sequences that have a noise like behavior. They are generated using shift registers, modulo-2 adders (XOR gates) and feedback loops. The following diagram illustrates this:

The length of the register and the configuration of the feedback network determine the maximum length of a PN sequence. An N bits register can take up to 2N different combinations of zeros and ones. Since the feedback network performs linear operations, if all the inputs (i.e. the content of the flip-flops) are zero, the output of the feedback network will also be zero. Therefore, the all zero combination will always give zero output for all subsequent clock cycles, so we do not include it in the sequence. Thus, the maximum length of any PN sequence is 2N-1 and sequences of that length are called Maximum-Length Sequences or m-sequences. They are useful because longer sequences have better properties. PN sequences are therefore periodic noise like binary functions generated by a network of feedback loops, modulo-2 adders and flip-flops. Maximum length PN functions have a period of 2N-1.

Advantages of CDMA

The advantage of CDMA for personal communication services is its ability to accommodate many user on the same frequency at the same time. As we mentioned earlier, a specific code is assigned to each user and only that code can demodulate the transmitted signal.
There are two ways of separating users in CDMA:
¢ Orthogonal Multiple Access
¢ Non-orthogonal Multiple Access or Asynchronous CDMA
Orthogonal Multiple Access
Each user is assigned one or many orthogonal waveform derived from an orthogonal code. Since the waveforms are orthogonal, users with different codes do not interfere with each other. Orthogonal-CDMA or O-CDMA requires synchronization among the users, since the waveforms are orthogonal only if they are aligned in time.
Orthogonal Codes
An important set of orthogonal code is the Walsh set. Walsh functions are generated using an iterative process of constructing a Hadamard matrix. starting with H1 = [0]. The Hadamard matrix is built by:

For example, here are the Walsh-Hadamard codes of length 2 and 4 respectively:

From the corresponding matrix, the Walsh-Hadamard code words are given by the rows. Note that we usually map the binary data to polar form so we can use real numbers arithmetic when computing the correlations. So 0's are mapped to 1's and 1's are mapped to -1.
Walsh-Hadamard codes are important because they form the basis for orthogonal codes with different spreading factors. This property becomes useful when we want signals with different Spreading Factors to share the same frequency channel. The codes that posses this property are called Orthogonal Variable Spreading Factor (OVSF) codes. To construct such codes, it is better to use a different approach than matrix manipulation. Using a Tree “ Structure allows better visualization of the relation between different code length and orthogonality between them.
For example, let's see if the second codeword of W2 which we will denote W2.2 and the third codeword of W4, W4.3, are orthogonal. Since they are of different length, we repeat W2.2 to match the length of W4.3. Hence we get the following two code words, in polar form:
W2.2 => (1 -1 | 1 -1) and W4.3 => (1 1 -1 -1)
Computing the orthogonality, we get: (multiplying elements by elements)
(1 x 1) + (-1 x 1) + (1 x -1) + (-1 x -1) = 1 - 1 - 1 + 1 = 0
Hence, W2.2 and W4.3 are orthogonal.
However, the auto-correlation function of Walsh-Hadamard code words does not have good characteristics. It can have more than one peak and therefore, it is not possible for the receiver to detect the beginning of the codeword without an external synchronization scheme. The cross - correlation can also be non-zero for a number of time shifts and un-synchronized users can interfere with each other. This is why Walsh-Hadamard codes can only be used in synchronous CDMA.
Walsh-Hadamard codes do not have the best spreading behavior. They do not spread data as well as PN sequences does because there power spectral density is concentrated in a small number of discrete frequencies.
Non-Orthogonal CDMA

The concept behind this is to give up orthogonality among users and reduce the interference by using spread spectrum techniques. PN sequences are used to spread the spectrum. The family of PN sequences, called Gold sequences are in particular popular for non-orthogonal CDMA. Gold sequences have only three cross-correlation peaks, which tend to get less important as the length of the code increases. They also have a single auto-correlation peak at zero, just like ordinary PN sequences.
Gold sequences (codes) are constructed from the modulo-2 addition of two maximum length preferred PN sequences. By shifting one of the two PN sequence, we get a different Gold sequence. This property can be use to generate codes which will permit multiple access on the channel.
The use of Gold sequences permits the transmission to be asynchronous. The receiver can synchronize using the auto-correlation property of the Gold sequence.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hawkeye technology seminar report, download project seminar for multimedia acess control on cdma, cdma full report, seminar presentation ppt for ismell technology, crocodile clips, seminar on 3g and 4g technology pdf, seminar report on imod technology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: CDMA Technology Full Download Seminar Report and Paper Presentation - by computer science topics - 28-06-2010, 11:03 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,983 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,845 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  LAMP TECHNOLOGY (LINUX,APACHE,MYSQL,PHP) seminar class 1 3,534 04-04-2018, 04:11 PM
Last Post: Guest
  imouse full report computer science technology 3 26,006 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,719 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,108 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,339 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,523 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,660 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,445 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: