13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.1 PRINCIPLES OF MULTIPLE ACCESSAs an illustration, consider a satellite transponder <strong>of</strong> B b<strong>and</strong>width with nchannels as shown in Fig. 5.1. When the transponder is in an operational stateat any time t i , each channel amplifies every carrier f i <strong>of</strong> the earth terminals ES i(where i ¼ 1; 2; ...; n). If no safeguards are in place, it is likely that severalcarriers will occupy a particular channel simultaneously <strong>and</strong> will mutuallyinterfere.To avoid such mutual interference, it is important that the receivers <strong>of</strong>other earth terminals be able to discriminate among the received carriers.Discrimination can be achieved by any <strong>of</strong> three techniques: filtering, temporalgating, or signature assignment [1].1. Filtering. Take for instance the carrier energies to be in the frequencydomain. If we subdivide the available channel b<strong>and</strong>width into a number, say n,as shown in Fig. 5.1, <strong>and</strong> assign a subchannel to each user upon that user’srequest, then the receiver can discriminate among carriers by filtering. Thismultiple-access method is the principle <strong>of</strong> multiple access by frequencydivision (FDMA). It is commonly used in wireline channels to accommodatemultiple users for voice <strong>and</strong> data transmission.2. Temporal gating. If, for instance, we subdivide the frame duration T sinto, say, n nonoverlapping subintervals, each <strong>of</strong> duration T s =n, <strong>and</strong> assigneach user to a particular time slot within each frame, then several carrierenergies can be received sequentially by the receiver. The receiver can thusFIGURE 5.1Principle <strong>of</strong> multiple access.Copyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!