SlideShare ist ein Scribd-Unternehmen logo
1 von 22
INTERNATIONAL INSTITUTE OF PROFESSIONAL STUDIES DAVV INDORE
Mobile and Wireless Computing
Internal Test III
Name - Anushka Shastri
Roll No - IT-2K17-09
Batch - MTech 2k17
Semester - VIII
Guided By - Ms. Manju Sachdeo Ma'am
Date - 24/05/2021
Demand Assigned Multiple
Access
24/05/2021
Multiple Access:
We do multiple access to enable satellite to
take or give signals from different stations at
time without any interference between them.
Multiple Access
Sometimes a satellite’s service
is present at a particular location
on the earth station and
sometimes it is not present. That
means, a satellite may have
different service stations of its
own located at different places
on the earth. They send carrier
signal for the satellite.
In this situation, we do multiple
access to enable satellite to take
or give signals from different
stations at time without any
interference between them.
FDMA
(Frequency Division Multiple Access)
TDMA
(Time Division Multiple Access)
CDMA
(Code Division Multiple Access)
What is DAMA ?
● Full form - Demand Assigned Multiple Access
● Channel Allocation Technique
● There are two channel allocation techniques -
○ PAMA - Permanent Assigned Multiple Access
○ DAMA - Demand Assigned Multiple Access
DAMA
DAMA is a technique used to
assign satellite channels to on
an as request basis.
The most multiple-access
systems use DAMA in which
the available channels are
allocated on an as required
basis to users.
DAMA
Demand Assigned Multiple Access (DAMA) is a technology used
to assign a to clients that don't need to use it constantly.
DAMA systems assign communication channels based on news
issued from user terminals to a network security system.
Channels are typically a pair of carrier frequencies (one for
transmit and one for receive), but can be other fixed bandwidth
resources such as timeslots in a TDMA burst plan or even
physical channels.
Once a channel is allocated to a given pair of nodes, it is not
available to other users in the network until their session is
finished.
How DAMA works ?
● Demand access systems require two types of a channel:
○ a common signaling channel (CSC) and
○ a communication channel.
● A user wishing to enter the communication network
○ first calls the controlling earth station using the CSC,
○ and the controller then allocates a pair of channels to that user.
● The CSC are located at the ends of the transponder bandwidth.
● When earth station wants to access the satellite, it transmits a control packet to satellite
on the CSC Frequency & waits for a reply.
How DAMA works ?
● The control packet is received by the hub earth station
and decoded.
● The control packet contains source address & destination
address also it includes cyclic redundancy check (CRC).
● The control station measures duration of the connection.
Advantages of DAMA
Prior
Reservation
A sender reserves
a future time-slot
Increased
Efficiency
Less
Collision
Reservation can
increase
efficiency to 80%
Sending within this
reserved time-slot is
possible without
collision
Reservation
Algorithms
Explicit Reservation
Implicit Reservation (PRMA)
Reservation-TDMA
Access method DAMA: Explicit Reservation
● Two modes:
○ ALOHA mode for reservation:
■ competition for small reservation slots, collisions possible
○ reserved mode for data transmission within successful
reserved slots (no collisions possible)
It is important for all stations to keep the reservation list consistent at
any point in time and, therefore, all stations have to synchronize from
time to time.
Access method DAMA: Explicit Reservation
PRMA
Packet Reservation
Multiple Access
● a certain number of slots form a
frame
● frames are repeated
● stations compete for empty slots
according to the slotted aloha
principle
● once a station reserves a slot
successfully, this slot is
automatically assigned to this
station in all following frames as
long as the station has data to
send
● competition for this slots starts
again as soon as the slot was
empty in the last frame
PRMA
Reservation-TDMA
every frame
consists of N
mini-slots and x
data-slots
every station has
its own mini-slot
and can reserve
up to k data-slots
using this mini-
slot (i.e. x = N *
k).
other stations can
send data in
unused data-slots
according to a
round-robin
sending scheme
(best-effort
traffic)
Uses of DAMA
Military for satellite
communications
(SATCOM)
Remote location Internet
access and mobile
maritime communications.
VSAT systems for point of
sale (POS) transactions
such as credit card, polling
or radio frequency
identification
How DAMA differs from Multiplexing?
Multiplexing
Divides a single
communication channel
into multiple channels
DAMA
Assigns a pair of
frequencies to a user
terminal
Multiplexing
Technical
process
DAMA
Administrative
process
Conclusion
DAMA assigns a pair of
frequencies to a user
terminal.
Then, the frequencies
are returned to a list, or
central pool, of
frequencies available to
other terminal users.
The number of transient
clients that use DAMA
network terminals
increases according to
efficient user
sequencing at specific
frequencies and
different timeslots.
Thus, DAMA is used
for infrequently-
used networks.
DAMA does not
require continuous
connection from
user terminals to a
network control
system.

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 

Was ist angesagt? (20)

TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Satellite ppt
Satellite pptSatellite ppt
Satellite ppt
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
CDMA
CDMACDMA
CDMA
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Wireless channels
Wireless channels Wireless channels
Wireless channels
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
TDMA
TDMATDMA
TDMA
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Satellite Subsystems
Satellite SubsystemsSatellite Subsystems
Satellite Subsystems
 

Ähnlich wie Demand Assigned Multiple Access

The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 

Ähnlich wie Demand Assigned Multiple Access (20)

multipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptxmultipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptx
 
Yogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptxYogendra Singh_16_TA2.pptx
Yogendra Singh_16_TA2.pptx
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
 
The mac layer
The mac layerThe mac layer
The mac layer
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Multiplexing
Multiplexing Multiplexing
Multiplexing
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Demand Assigned Multiple Access

  • 1. INTERNATIONAL INSTITUTE OF PROFESSIONAL STUDIES DAVV INDORE Mobile and Wireless Computing Internal Test III Name - Anushka Shastri Roll No - IT-2K17-09 Batch - MTech 2k17 Semester - VIII Guided By - Ms. Manju Sachdeo Ma'am Date - 24/05/2021
  • 3. Multiple Access: We do multiple access to enable satellite to take or give signals from different stations at time without any interference between them.
  • 4.
  • 5. Multiple Access Sometimes a satellite’s service is present at a particular location on the earth station and sometimes it is not present. That means, a satellite may have different service stations of its own located at different places on the earth. They send carrier signal for the satellite. In this situation, we do multiple access to enable satellite to take or give signals from different stations at time without any interference between them. FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access)
  • 6. What is DAMA ? ● Full form - Demand Assigned Multiple Access ● Channel Allocation Technique ● There are two channel allocation techniques - ○ PAMA - Permanent Assigned Multiple Access ○ DAMA - Demand Assigned Multiple Access
  • 7.
  • 8. DAMA DAMA is a technique used to assign satellite channels to on an as request basis. The most multiple-access systems use DAMA in which the available channels are allocated on an as required basis to users.
  • 9. DAMA Demand Assigned Multiple Access (DAMA) is a technology used to assign a to clients that don't need to use it constantly. DAMA systems assign communication channels based on news issued from user terminals to a network security system. Channels are typically a pair of carrier frequencies (one for transmit and one for receive), but can be other fixed bandwidth resources such as timeslots in a TDMA burst plan or even physical channels. Once a channel is allocated to a given pair of nodes, it is not available to other users in the network until their session is finished.
  • 10. How DAMA works ? ● Demand access systems require two types of a channel: ○ a common signaling channel (CSC) and ○ a communication channel. ● A user wishing to enter the communication network ○ first calls the controlling earth station using the CSC, ○ and the controller then allocates a pair of channels to that user. ● The CSC are located at the ends of the transponder bandwidth. ● When earth station wants to access the satellite, it transmits a control packet to satellite on the CSC Frequency & waits for a reply.
  • 11. How DAMA works ? ● The control packet is received by the hub earth station and decoded. ● The control packet contains source address & destination address also it includes cyclic redundancy check (CRC). ● The control station measures duration of the connection.
  • 12. Advantages of DAMA Prior Reservation A sender reserves a future time-slot Increased Efficiency Less Collision Reservation can increase efficiency to 80% Sending within this reserved time-slot is possible without collision
  • 14. Access method DAMA: Explicit Reservation ● Two modes: ○ ALOHA mode for reservation: ■ competition for small reservation slots, collisions possible ○ reserved mode for data transmission within successful reserved slots (no collisions possible) It is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time.
  • 15. Access method DAMA: Explicit Reservation
  • 16. PRMA Packet Reservation Multiple Access ● a certain number of slots form a frame ● frames are repeated ● stations compete for empty slots according to the slotted aloha principle ● once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send ● competition for this slots starts again as soon as the slot was empty in the last frame
  • 17. PRMA
  • 18. Reservation-TDMA every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini- slot (i.e. x = N * k). other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic)
  • 19.
  • 20. Uses of DAMA Military for satellite communications (SATCOM) Remote location Internet access and mobile maritime communications. VSAT systems for point of sale (POS) transactions such as credit card, polling or radio frequency identification
  • 21. How DAMA differs from Multiplexing? Multiplexing Divides a single communication channel into multiple channels DAMA Assigns a pair of frequencies to a user terminal Multiplexing Technical process DAMA Administrative process
  • 22. Conclusion DAMA assigns a pair of frequencies to a user terminal. Then, the frequencies are returned to a list, or central pool, of frequencies available to other terminal users. The number of transient clients that use DAMA network terminals increases according to efficient user sequencing at specific frequencies and different timeslots. Thus, DAMA is used for infrequently- used networks. DAMA does not require continuous connection from user terminals to a network control system.