Unit 3 WMC
Unit 3 WMC
Communication (KEC-076)
1. Linear Equalizers
• Linear equalizers apply a linear filter to the received signal to
mitigate the effects of ISI.
➢ Simpler Design:
– Easy to implement mathematically due to the
linearity of the channel inversion process.
Drawbacks of Zero Forcing
Equalizer
➢ Noise Amplification:
– In channels with deep fades (where H(f) approaches zero),
G(f) becomes large, amplifying noise significantly.
➢ Practical Limitations:
– Requires accurate knowledge of the channel impulse
response, which is challenging in fast-varying wireless
channels.
➢ Computational Complexity:
– Channel inversion in the frequency domain or solving large
matrix equations for the weights can be computationally
intensive.
Performance of ZF Equalizer
Noise Considerations:
• The ZF equalizer does not account for noise in its design.
It only focuses on eliminating ISI, which leads to noise
enhancement in poor channel conditions.
3. Kalman Filtering:
➢A probabilistic approach that uses state-space
modeling.
➢Excellent for highly dynamic systems but requires
significant computational resources.
Advantages of Adaptive Equalizers
➢ Dynamic Channel Adaptation: Tracks and
compensates for variations in the channel.
Unit-3 Lecture : 03
Advantages:
➢ Efficient utilization of bandwidth.
➢ Suitable for digital communication.
Drawbacks:
➢ Synchronization issues between sender and receiver.
➢ Limited by the channel's capacity.
Advantages:
➢ High data security.
➢ Resilient to interference.
Drawbacks:
➢ High computational complexity.
➢ Code synchronization is challenging.
➢ Advantages:
▪ Extremely high data rates.
▪ Efficient utilization of fiber-optic bandwidth.
Unit-3 Lecture : 04
2. Interference:
• Frequency interference due to poor filtering or adjacent
channel leakage.
3. Scalability Issues:
• Limited by the number of available frequency bands, which
makes it less suitable for dense networks.
Applications of FDMA
➢ 1G Cellular Networks:
Used in analog systems like Advanced Mobile Phone Systems
(AMPS).
➢ Satellite Communication:
Efficient for allocating distinct frequency bands to different
satellite links.
3. Data Transmission:
• During a user’s time slot, their data is transmitted or received.
• Other users remain idle until their time slots arrive.
2. Idle Periods:
• Users must wait for their time slots, which can lead to idle periods
and increased latency.
3. Scalability Issues:
• Performance degrades with an increased number of users, as more
slots are required per frame.
4. Guard Times:
• Guard times are needed between slots to account for propagation
delays, reducing spectral efficiency.
Applications of TDMA
➢ Second-Generation (2G) Cellular Networks:
– Used in systems like GSM (Global System for
Mobile Communications).
➢ Satellite Communication:
– Efficient for scheduling transmissions among
multiple users.
➢ Digital Cordless Telephony:
– Used in standards like DECT (Digital Enhanced
Cordless Telecommunications).
Code Division Multiple Access
(CDMA)
➢ Code Division Multiple Access (CDMA) is a multiple
access technique where multiple users share the same
frequency spectrum simultaneously by encoding their
signals with unique, orthogonal spreading codes.
➢ The subcarrier signals are demodulated to retrieve the original data streams.
Orthogonal Frequency Division Multiple Access (OFDMA)
Advantages of OFDMA
➢ High Spectral Efficiency: Simultaneous transmission of multiple users’
data over orthogonal subcarriers maximizes spectrum utilization.
➢ Support for Multiple Users: Allows multiple users to share the same
spectrum without overlapping interference.
Unit-3 Lecture : 05
➢ Satellite Communications:
– Enables multiple users to share the same satellite
transponder bandwidth.
➢ IoT Networks:
– Supports large-scale IoT systems by accommodating
numerous devices.
IDMA vs CDMA
➢ Its reliance on interleaving and iterative decoding makes it a robust and efficient
choice for modern communication systems.
Hybrid Multiple Access Schemes
➢ Hybrid multiple access schemes combine features from
different basic multiple access techniques (FDMA,
TDMA, CDMA, OFDMA, SC-FDMA, and others) to
leverage their respective advantages while mitigating
their individual limitations.
➢ Power Control:
– Power disparities among users in the same frequency
band can lead to the "near-far problem.“
➢ Synchronization Requirements:
– High precision synchronization is needed for effective
code orthogonality.
Applications of FCDMA
➢ Satellite Communication: Efficiently manages shared
bandwidth among multiple ground stations.
Unit-3 Lecture : 06
2. Synchronization:
– The transmitter and receiver must be synchronized in both the spreading
code and the frequency hopping pattern to ensure proper decoding.
3. Receiver Functionality:
– The receiver first tracks the hopping pattern to identify the correct
frequency band.
– The received signal is then despread using the user-specific code to
recover the transmitted data.
Features of DS/FH-MA
➢ Enhanced Security:
– The combination of spreading and hopping makes the
system highly resistant to interception and jamming.
2. Code Division:
➢ Within each time slot, users are further differentiated using unique
pseudo-random codes, as in CDMA.
➢ These codes enable multiple users to occupy the same time slot and
frequency band simultaneously without interference.
3. Hybrid Access:
➢ By combining time and code division, TCDMA achieves a higher
degree of resource utilization and supports a larger number of users
than either TDMA or CDMA alone.
Operation of TCDMA
➢ Time Slot Assignment: The available bandwidth is divided into
discrete time slots, which are cyclically assigned to users.
➢ Code Assignment: Within each assigned time slot, users are
distinguished using orthogonal codes (e.g., Walsh codes or Gold
codes).
➢ Signal Transmission: Each user's signal is spread across the
frequency spectrum using its unique code and transmitted in the
designated time slot.
➢ Signal Recovery at the Receiver: The receiver synchronizes to
the specific time slot and despreads the signal using the
corresponding code to recover the transmitted data.
Features of TCDMA
➢ Increased Capacity: TCDMA supports more users by
utilizing both time and code resources for multiplexing.
Application of TDFH
➢ Military Communications:
➢ Cellular Networks:
➢ Satellite Communication:
(v) FDMA-TDMA Hybrid
➢ Concept: Combines Frequency Division Multiple Access
(FDMA) with Time Division Multiple Access (TDMA).
➢ Path Detection: The receiver identifies distinct signal paths using a delay
spread and estimates the time delays of these paths.
➢ Correlation: Each finger of the Rake Receiver correlates the received signal
with the spreading code for a particular multipath component. This isolates the
contribution of that path.
➢ Weighting: The outputs from each finger are weighted based on their signal
strength or Signal-to-Noise Ratio (SNR). Paths with higher strength are given
more weight.
➢ Combining: The weighted signals from all fingers are combined coherently
(phase-aligned) to form the final output. This improves the overall signal quality
by enhancing constructive interference and minimizing destructive interference.
Architecture of Rake Receiver
The Rake Receiver consists of the following components:
➢ Antenna: Captures the transmitted signal, which includes multiple
delayed versions of the original signal.
➢ Delay Estimator:
– Determines the delays of the significant multipath components.
– Often uses autocorrelation techniques to identify delay spreads.
➢ Fingers (Correlators):
– Each finger corresponds to a specific multipath component.
– It correlates the received signal with the spreading code, isolating the
energy of the intended signal for that path.
➢ Weighting Block: Assigns weights to the signals from each finger based
on the channel conditions and the strength of the signal.
➢ Combiner: Combines the weighted outputs of all fingers coherently to
form the final output.
Mathematical Model
Advantages of Rake Receiver
➢ Exploits Multipath Diversity: Instead of treating multipath as
interference, the Rake Receiver turns it into an advantage, improving
signal quality.
➢ Importance:
✓ Wireless systems typically involve multiple users contending for
the same channel.
✓ Protocols ensure that resources are used effectively while
minimizing packet loss, delays, and errors.
Challenges:
A. ALOHA-Based Protocols
ALOHA protocols are among the earliest and simplest random access
techniques. They operate on the principle of sending packets whenever
ready and resolving collisions through retransmission.
I. Pure ALOHA:
1. Non-Persistent CSMA:
– Mechanism: Users sense the channel. If busy, they wait for
a random time before trying again.
– Advantage: Reduces collision probability.
– Limitation: Increased delay compared to persistent
CSMA.
2. 1-Persistent CSMA:
3. P-Persistent CSMA:
A. Polling Protocols
➢ Advantages:
➢No collisions as each user has a separate frequency.
➢Simple implementation.
➢ Limitations:
➢Fixed allocation may lead to underutilization of resources.
C. Code Division Multiple Access (CDMA):
➢ Mechanism: Users share the same frequency and time but are
separated by unique spreading codes.
➢ Advantages:
✓ High user capacity.
✓ Robust against interference.
➢ Limitations:
✓ Complex implementation.
✓ Requires precise code management.
D. Orthogonal Frequency Division Multiple Access (OFDMA):
➢ Advantages:
✓ High spectral efficiency.
✓ Scalable for modern systems like LTE and 5G.