Multiple Access Techniques
Multiple Access Techniques
Multiple access is a technique whereby many subscribers or local stations can share the use
of a communication channel at the same time or nearly so, despite the fact that there
individual transmissions may originate from widely different locations. Stated in another
way, a multiple-access technique permits the communication resources of the channel to
be shared by a large number of users seeking to communicate with each other.
Differences between Multiplexing and Multiple Access
Multiple access refers to the remote sharing of a communication channel such as a
satellite or radio channel by users in highly dispersed locations. On the other hand,
multiplexing refers to the sharing of a channel such as a telephone channel by users
confined to a local site.
In a multiplexed system, user requirements are ordinarily fixed. In contrast, in a
multiple-access system user requirements can change dynamically with time, in
which case provisions are necessary for dynamic channel allocation.
Time division multiple-access (TDMA): Each user is allocated the full spectral
occupancy of the channel but only for a short duration of time called time slot. Guard times
are also inserted between assigned timeslots to avoid interference.
Space Division Multiple access (SDMA): SDMA serves different users by using spot
beam antenna. These areas may be served by the same frequency or different frequencies.
However for limited co-channel interference it is required that the cells be sufficiently
separated. This limits the number of cells a region can be divided into and hence limits the
frequency re-use factor.
Spread Spectrum Multiple Access Techniques
Narrow-band Signals
The Narrow-band signals have the signal strength concentrated as shown in the following
frequency spectrum figure.
Following are some of its features −
Band of signals occupy a narrow range of frequencies.
Power density is high.
Spread of energy is low and concentrated.
Though the features are good, these signals are prone to interference.
The spread spectrum signals have the signal strength distributed as shown in the following
frequency spectrum figure.
With these features, the spread spectrum signals are highly resistant to interference or
jamming. Since multiple users can share the same spread spectrum bandwidth without
interfering with one another, these can be called as multiple access techniques.
Pseudo-Noise Sequence
A coded sequence of 1s and 0s with certain auto-correlation properties, called as Pseudo-
Noise coding sequence is used in spread spectrum techniques. It is a maximum-length
sequence, which is a type of cyclic code.
The frequencies of the data are hopped from one to another in order to provide a secure
transmission. The amount of time spent on each frequency hop is called as Dwell time.
For Example:
Suppose we have decided to have eight hopping frequencies.
This is extremely low for real applications and is just for illustration.
In this case, M is 8 and k is 3.
The pseudorandom code generator will create eight different 3-bit patterns.
These are mapped to eight different frequencies in the frequency table.
The pattern for this station is 101, 111, 001, 000, 010, 011, 100. Note that the
pattern is pseudorandom; it is repeated after eight hoppings. This means that at
hopping period 1, the pattern is 101. The frequency selected is 700 kHz; the
source signal modulates this carrier frequency.
The second k-bit pattern selected is 111, which selects the 900 kHz carrier; the
eighth pattern is 100, and the frequency is 600 kHz. After eight hoppings, the
pattern repeats, starting from 101 again.
In direct sequence spread spectrum (DSSS) technique, we replace each data bit with n
bits using a spreading code. In other words, each bit is assigned a code of n bits, called
chips, where the chip rate is n times that of the data bit.
Whenever a user wants to send data using this DSSS technique, each and every bit of the
user data is multiplied by a secret code, called as chipping code. This chipping code is
nothing but the spreading code which is multiplied with the original message and
transmitted. The receiver uses the same code to retrieve the original message.
For Example:
1. Let us consider the sequence used in a wireless LAN, the famous Barker sequence,
where n is 11.
2. We assume that the original signal and the chips in the chip generator use polar NRZ
encoding.
3. Figure shows the chips and the result of multiplying the original data by the chips to get
the spread signal.
4. The spreading code is 11 chips having the pattern 10110111000 (in this case).
5. If the original signal rate is N, the rate of the spread signal is 11N.
6. This means that the required bandwidth for the spread signal is 11 times larger than the
bandwidth of the original signal.
7. The spread signal can provide privacy if the intruder does not know the code.
8. It can also provide immunity against interference if each station uses a different code.
Suppose we have four stations; each has a sequence of chips which we designate as A, B,
C and D.
Cross-talk elimination
Better output with data integrity
Reduced effect of multipath fading
Better security
Reduction in noise
Co-existence with other systems
Longer operative distances
Hard to detect
Not easy to demodulate/decode
Difficult to jam the signals
Hard to find the user’s frequency at any User frequency, once allotted is always the
instant of time same
Power strength of the signal is high Power strength of the signal is low
It is cheaper It is expensive
This is the commonly used technique This technique is not frequently used