Digital Modulation
Digital modulation is the process of modifying the amplitude, frequency, or phase of a carrier signal using the discrete states (On and Off) of a digital signal.
When modulating a carrier signal using a digital information signal, this causes rapid changes to the carrier wave. These rapid changes result in the creation of other signals that are usually undesirable. As a result, digital modulation usually includes a process of adjusting the maximum rate of change of the input signal (rounding the digital signal edges) and filtering out some of the unwanted signals that are created during the transition.
Figure 1 shows different forms of digital modulation. This diagram shows ASK modulation that turns the carrier signal on and off with the digital signal. FSK modulation shifts the frequency of the carrier signal according to the on and off levels of the digital information signal. The phase shift modulator changes the phase of the carrier signal in accordance with the digital information signal. This diagram also shows that advanced forms of modulation such as QAM can combine amplitude and phase of digital signals.
Data Compression
Data compression is a process that is used encoding information so that fewer data bits of information are required to represent a given amount of data. Compression allows the transmission of more data over a given amount of time and circuit capacity. It also reduces the amount of memory required for data storage.
Access Multiplexing
Access multiplexing is a process used by a communications system to coordinate and allow more than one user to access the communication channels within the system. There are four basic access multiplexing technologies used in wireless systems: frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access, (CDMA), and space division multiple access (SDMA). Other forms of access multiplexing (such as voice activity multiplexing) use the fundamentals of these access-multiplexing technologies to operate.
FDMA systems use a process of allowing mobile radios to share radio frequency allocation by dividing up that allocation into separate radio channels where each radio device can communicate on a single radio channel during communication. TDMA systems allow several users to share a single radio channel by dividing the channel into time slots. When a mobile radio communicates with a TDMA system, it is assigned a specific time position on the radio channel. By allow several users to use different time positions (time slots) on a single radio channel, TDMA systems increase their ability to serve multiple users with a limited number of radio channels. Code division multiple access (CDMA), a form of spread spectrum communication. CDMA is a method of spreading information signals (typically digital signals) so the frequency bandwidth of the radio channel is much larger than the original information bandwidth.
Some systems coordinate system access on the same radio channels that are used for communication and other systems use a separate (dedicated) control channel. When using a control channel to coordinate access to the system, it is called an access control channel. The access control channel coordinates the random requests for service that is received from users (mobile radios) in the system. The control channel may also transfer identification information that allows the system to determine if the user is authorized to receive access to the system.
Figure 2 shows the common types of channel-multiplexing technologies used in wireless systems. This diagram shows that FDMA systems have multiple communication channels and each user on the system occupies an entire channel. TDMA systems dynamically assign users to one or more time slots on each radio channel. CDMA systems assign users a unique spreading code to minimize the interference receive and cause with other users. SDMA systems focus radio energy to the geographic area where specific users are operating.
1 comment:
Thank you so Much very Nice explanation of Multiple Access techniques
Post a Comment