WT - Module 1
WT - Module 1
Wireless communication refers to the transmission of information between two or more points
without the use of a physical conductor, such as wires or optical fibers. Instead, wireless systems
rely on electromagnetic waves—primarily radio frequency (RF)—to enable voice, data, and
multimedia communications. This concept, while commonplace today, revolutionized the way
humans share information, drastically impacting industries, social interactions, and global
connectivity.
One of the earliest experiments in wireless communication can be traced back to Guglielmo
Marconi’s work on radio transmission in the late 19th century. At that time, radio signals offered
a miraculous capability: the ability to transmit Morse code between ships and shore stations,
helping avert disasters and improving maritime communication. Over the last century, these
humble beginnings evolved into a world where billions of people carry personal smartphones,
access high-speed internet on the move, and maintain uninterrupted connectivity.
The significance of wireless communication in the modern world is immense. From improving
public safety through instant communication for emergency services, to powering global
commerce by enabling on-the-go business transactions, wireless technologies serve as a
foundation for modern digital infrastructure. Complex operations such as telemedicine, online
education, and remote work environments all rely heavily on reliable wireless networks.
Moreover, emerging applications including the Internet of Things (IoT), self-driving cars, and
smart cities hinge on robust, widespread wireless connectivity to function effectively.
1.2 Evolution of Wireless Communication
The journey of wireless communication has been marked by rapid innovation. Early wireless
systems focused on basic voice communication and had significant limitations in terms of signal
quality, coverage, and data throughput. With the arrival of cellular networks—especially the
analog First Generation (1G) networks—wireless phones became commercially viable, though
data services were minimal or non-existent. Successive generations improved security, data rates,
spectral efficiency, and overall capacity.
Advantages:
1. Mobility and Convenience: Perhaps the most obvious benefit is the freedom from
physical constraints. Users can connect anytime, anywhere within the coverage area,
facilitating seamless communication and internet access on the move.
2. Rapid Deployment: Wireless networks can be deployed much faster than wired
networks, especially in regions lacking traditional telecom infrastructure. This rapid
deployment aids in disaster recovery scenarios and in bringing connectivity to remote,
underdeveloped locations.
Disadvantages:
1. Limited Spectrum and Interference: The radio frequency spectrum is finite and heavily
regulated. As more devices come online, interference and congestion can become
significant challenges.
2. Security Concerns: Wireless signals propagate through the air, making them susceptible
to eavesdropping and unauthorized access if robust security measures (encryption,
authentication) are not employed.
3. Signal Degradation: Environmental conditions such as weather, obstacles (buildings,
walls, foliage), and distance from the transmitter can degrade signal quality and reduce
data throughput.
4. Energy Consumption: Mobile devices must manage limited battery power while
maintaining constant connectivity. Similarly, base stations consume considerable power,
especially in dense cellular deployments.
5. Agriculture (Smart Farming): Drones for field monitoring, IoT sensors for soil
moisture and temperature, and automated irrigation systems require robust wireless
connections.
6. Public Safety: Emergency services and disaster relief efforts depend heavily on wireless
networks for rapid communication and coordination, especially when fixed infrastructure
is disrupted.
Principle of Operation
In FDMA, the total available frequency band is divided into narrower frequency channels (sub-
bands). Each user is assigned a dedicated frequency channel for a set duration, ensuring minimal
interference from other users. Early analog cellular systems (e.g., 1G systems like AMPS in the
United States) widely employed FDMA.
• Frequency Division Multiple Access (FDMA):
o Once a user’s frequency band is allocated, that user can transmit continuously in
that band (until reassignment or the end of the call/session).
o The “Guard Time” or “Guard Band” depicted ensures that there is a safety margin
between one user’s frequency band and the next. This margin is important to
mitigate interference that might arise due to imperfect filtering or overlap in real-
world scenarios.
o Real transmitters and receivers cannot instantly “cut off” transmissions at a hard
frequency boundary. There is always some spectral spread.
o The diagram’s labeling of “guard time” suggests it might also be illustrating the
concept of transitions between frames or bursts, but the essential principle is the
same: a gap is needed to prevent collisions.
Advantages
Limitations
2. Poor Scalability: Adding users may require more frequency bands, quickly exhausting
the limited spectrum.
Real-World Example
Maritime and aviation communication systems often still use FDMA for narrowband voice
channels because of its simplicity and reliability.
Principle of Operation
TDMA divides the transmission timeline into time slots. Each frequency channel is further
subdivided into multiple time slots, and each user is allocated one or more of these slots. Users
transmit in bursts during their assigned time slots. This approach allows multiple users to share
the same frequency channel sequentially.
• Time-Division Principle:
o Unlike FDMA (Frequency Division Multiple Access) where each user is assigned
a unique frequency band simultaneously, TDMA systems assign users different
time slots within a shared frequency.
o The diagram visually emphasizes that, for both uplink and downlink, users
transmit or receive in an orderly, time-based sequence—thus avoiding overlap on
the same frequency.
• Synchronization:
o Each frame and time slot must be precisely synchronized among the base station
and user devices. The guard time helps ensure that any minor timing mismatch
does not cause interference between adjacent slots.
1. Efficient Spectrum Utilization: The time slot reuse allows for a larger number of users
to share the same frequency band.
Limitations
2. Bursty Transmission: Since users transmit in allocated time slots, the signal can have
high peak power demands.
Real-World Example
Second-generation (2G) cellular systems like GSM (Global System for Mobile Communications)
use TDMA. In GSM, the carriers are subdivided into time slots, and each slot is assigned to a
single user for voice or data transmission.
2.3 Code Division Multiple Access (CDMA)
Principle of Operation
CDMA employs spread-spectrum techniques, where each user’s signal is spread over a wider
bandwidth using unique pseudo-random codes. Multiple users share the same frequency band
simultaneously, and each user’s signal is distinguished at the receiver by correlating with the
known code.
• Each user’s data is “spread” using a pseudo-random or orthogonal code. This code
modulates the user’s signal over a broader bandwidth.
• At the receiver side, the correct code is used to “de-spread” and recover the desired user’s
signal. Signals with other codes remain uncorrelated and appear as low-level noise.
• Because every station uses a different code, multiple signals can overlap without severe
interference—provided the codes are well chosen (orthogonal or pseudo-orthogonal) and
the system design ensures sufficient signal-to-noise ratio.
• CDMA also offers robust interference rejection. Narrowband interference tends to get
“spread out” and diminished during the de-spreading process.
Advantages
1. High Capacity and Robustness: CDMA systems can accommodate many users over the
same bandwidth, and the spread-spectrum nature provides resilience to interference.
2. Soft Handoffs: Allows for seamless transition of a mobile user between different base
stations with minimal dropped calls.
Limitations
1. Complex Receiver Design: Decoding multiple signals spread across the same frequency
band requires sophisticated correlation and interference cancellation techniques.
Real-World Example
3G technologies like CDMA2000 and WCDMA (Wideband CDMA) utilize CDMA as their core
multiple access strategy, enabling higher data rates and better voice capacity compared to
TDMA-based 2G systems.
Principle of Operation
OFDMA is an extension of Orthogonal Frequency Division Multiplexing (OFDM). The
available spectrum is divided into multiple narrow subcarriers that are orthogonal to each other.
Users are assigned subsets of these subcarriers in time-frequency blocks, allowing for flexible
bandwidth allocation and high spectral efficiency.
OFDM Diagram
• Axes
o The diagram shows time along one axis (front to back with symbols labeled Sym
0, Sym 1, etc.) and frequency along another (left to right).
o The vertical dimension represents the FFT bins (subcarriers) in the frequency
domain for each OFDM symbol.
• IFFT/FFT Operation
o At the transmitter, subcarrier data are mapped in the frequency domain and
converted to a time-domain signal via an Inverse Fast Fourier Transform (IFFT).
o At the receiver, a Fast Fourier Transform (FFT) is used to separate the combined
signal back into individual subcarriers, recovering each subcarrier’s data stream.
o Each OFDM symbol includes a guard interval (often a cyclic prefix) inserted
before the main data block.
o This prefix helps absorb multipath echoes and prevents inter-symbol interference,
improving reliability in real-world channels.
• Concatenated Symbols
o Symbols (Sym 0, Sym 1, etc.) flow in time, each containing multiple orthogonal
subcarriers. The guard interval is repeated before every symbol.
o This structure supports high data rates and robustness to frequency-selective
fading, making OFDM central to technologies like Wi-Fi, LTE, and 5G.
Advantages
3. Dynamic Resource Allocation: The base station can dynamically assign different sets of
subcarriers to users depending on real-time traffic and channel conditions.
Limitations
1. Peak-to-Average Power Ratio (PAPR): OFDM signals can have high PAPR, requiring
linear and efficient power amplifiers.
Real-World Example
4G LTE (Long-Term Evolution) and 5G New Radio (NR) use OFDMA for the downlink,
leveraging its ability to serve large numbers of users with different bandwidth requirements
effectively.
3. Spread Spectrum Techniques
Spread spectrum techniques are employed to improve signal robustness against interference,
enhance security, and allow multiple users to share the same frequency band with minimal
mutual disruption. The two dominant forms are Direct Sequence Spread Spectrum (DSSS) and
Frequency Hopping Spread Spectrum (FHSS).
Principle of Operation
In DSSS, each data symbol is multiplied (or “spread”) by a pseudo-random spreading code at a
much higher rate than the original data rate. This process increases the signal’s bandwidth
substantially. At the receiver, correlation with the same pseudo-random code “de-spreads” the
signal, reconstructing the original data. Unwanted signals that do not match the code remain
spread over a wide bandwidth and appear as low-level noise.
o The top row shows a binary data stream (bits 0 and 1). These bits change at a
certain rate (the data rate).
o Just below, a pseudo-noise (PN) code is shown at a much higher rate (the “chip
rate”). Each data bit is effectively split into multiple “chips.”
o The third row illustrates the transmitted signal, formed by multiplying (or
XORing) the data (A) with the PN code (B).
o Because the PN code runs faster, it “spreads” the energy of each data bit over a
wider bandwidth.
4. Received Signal
o After traveling through the channel (where noise or interference may be added),
the spread signal arrives at the receiver.
o By multiplying (or correlating) the incoming signal with this code, the original
data is “despread” back into a narrowband form. Other signals not using the exact
PN code remain spread out as noise.
o The final row shows the recovered binary data stream, which matches the original
input bits at the top.
Key Point:
• The high-rate PN code spreads the signal in frequency. At the receiver, using the
identical code despreads the signal, allowing the intended data to stand out from noise or
jamming signals. This provides robustness against interference and a level of security,
since only a receiver using the correct code can reliably decode the transmission.
Real-World Example
The IEEE 802.11b Wi-Fi standard uses DSSS at 2.4 GHz. Although newer Wi-Fi standards use
OFDM, DSSS laid the groundwork for early reliable wireless LAN communications.
3.2 Frequency Hopping Spread Spectrum (FHSS)
Principle of Operation
FHSS rapidly switches the carrier frequency among multiple frequency channels in a pseudo-
random sequence. The transmitter and receiver synchronize their hopping patterns so that, at any
given time, both are on the same frequency.
o On the left, columns labeled f0 through f7 represent the set of possible frequency
channels the system can occupy.
o The notation at the top (e.g., binary codes or decimal equivalents) indicates how
each hop is determined by a pseudo-random sequence.
o The bar chart suggests each channel is available for transmission, with “Energy”
on the vertical axis indicating that only one channel is used at any given hop.
o The grid on the right has Frequency on the vertical axis (f0 to f7) and Time on the
horizontal axis.
o Each orange square indicates which frequency is being used in each specific time
slot.
o Notice the frequency changes in a sequence (e.g., first using f5, then f7, then f1,
etc.)—this “hopping” is dictated by the pseudo-random hop pattern.
3. Hopping Sequence
o The binary or numeric values at the top (e.g., 101 111 001 ...) define the hop
pattern: they map each time slot to one of the available frequency channels.
o Both the transmitter and receiver follow this same hopping pattern in sync so that
communication remains intelligible, despite rapidly switching frequencies.
o Security: An eavesdropper would need to know the hopping code and timing to
reliably intercept the signal.
o Spectral Efficiency: Frequency hopping can also help distribute load across
multiple channels, reducing the chance of congestion on any single frequency.
In essence, the diagram shows that in each short time interval, the system “hops” to a new
frequency from a defined set (f0–f7), following a pseudo-random sequence known to both
transmitter and receiver. This is the core principle of Frequency Hopping Spread Spectrum
(FHSS).
Real-World Example
Early Bluetooth specifications used FHSS in the 2.4 GHz ISM band. Military communications
also commonly employ FHSS due to its robust anti-jamming properties.
1G networks, deployed in the 1980s, were purely analog systems designed primarily for voice
services. Key characteristics include:
• Technology: Analog Frequency Modulation (e.g., AMPS in the U.S., NMT in Nordic
countries).
• Data Rate: Limited to around 2.4 kbps for signaling (though not extensively used for
data).
• Security: Minimal to none—susceptible to eavesdropping due to analog signals.
• Coverage: Sparse, with low cell densities and high power requirements.
Despite their limitations, 1G networks laid the foundation for mobile telephony and proved the
viability of large-scale wireless voice communication.
With digital technology adoption in the early 1990s, 2G networks improved capacity, security,
and introduced limited data services. Common 2G standards include GSM and IS-95 (a CDMA-
based standard).
• Data Rate: GSM initially provided around 9.6 kbps for data, later enhanced by GPRS
(General Packet Radio Service) and EDGE (Enhanced Data rates for GSM Evolution) to
offer up to 384 kbps.
• Security: Encryption mechanisms (A5/1, A5/2) for voice calls.
2G ushered in text messaging (SMS) and basic mobile data. Its high spectral efficiency and more
reliable voice service made it a commercial success worldwide.
Introduced in the early 2000s, 3G networks delivered significant improvements in data speed and
network capacity, targeting multimedia and internet access on mobile devices.
• Data Rate: Speeds up to a few Mbps (e.g., UMTS Release 99 provided ~384 kbps,
HSPA+ later reached up to 42 Mbps).
• Coverage: Global adoption, though incremental rollout faced challenges due to spectrum
licensing and infrastructure upgrades.
3G facilitated the explosion of mobile internet usage, enabling services like mobile email, web
browsing, and streaming—albeit at lower resolutions compared to modern standards.
Launched around 2010, 4G technologies aimed for a fully IP-based network with significantly
higher data rates, reduced latency, and scalable architectures.
• Multiple Access: OFDMA for downlink and SC-FDMA (Single-Carrier FDMA) for
uplink in LTE.
• Data Rate: Initial LTE releases offered 100 Mbps downlink and up to 50 Mbps uplink,
with LTE-Advanced pushing theoretical speeds into the 1 Gbps range.
• Key Improvements: All-IP architecture, improved spectral efficiency, and lower latency.
• Coverage: Rapid expansion, though mmWave deployments are initially limited to dense
urban hotspots.
5G marks the transition to networks capable of supporting everything from industrial automation
(Industry 4.0) and autonomous vehicles, to immersive VR/AR experiences.
5. 5G Technology
While 4G focused heavily on higher data rates and an improved mobile broadband experience,
5G targets three broad categories of use cases often summarized as eMBB (Enhanced Mobile
Broadband), mMTC (massive Machine-Type Communications), and URLLC (Ultra-Reliable
Low Latency Communications). Understanding these requirements, alongside the enabling
technologies like Massive MIMO, is crucial to grasp the full potential of 5G.
4. Spectrum Efficiency
o Efficiently utilize low-band (below 1 GHz), mid-band (1–6 GHz), and high-band
mmWave spectrum (>24 GHz).
o Employ techniques like dynamic spectrum sharing, carrier aggregation, and
beamforming.
5. Network Slicing
o Partition the physical network into multiple virtual “slices” tailored to different
service requirements. For example, one slice could prioritize high data rate
eMBB, another could cater to ultra-reliable industrial control.
2. Autonomous Vehicles
3. Industry 4.0
5. Healthcare
o Telemedicine with real-time remote diagnostics and even robotic surgery under
precise latency constraints.
Concept of MIMO
Multiple Input, Multiple Output (MIMO) technology uses multiple antennas at both the
transmitter and receiver to exploit multipath propagation for higher throughput and improved
reliability. By transmitting different data streams or coded signals over multiple antennas, MIMO
systems can achieve higher spectral efficiency compared to single-antenna systems.
What is Massive MIMO?
Massive MIMO goes a step further by deploying dozens or even hundreds of antenna elements in
an array at the base station. These large antenna arrays create highly directional, customizable
beams (beamforming) aimed at individual users or groups of users. Key advantages include:
1. Increased Capacity: By focusing energy into narrower beams, more users can be served
simultaneously with higher throughput.
2. Improved Coverage: Beamforming techniques can direct signals towards specific
coverage areas, reducing interference and extending range.
o The transmit power is distributed over a wide sector, meaning all users share the
same radiated signal with limited ability to focus energy on individual devices.
o Coverage and capacity can be adequate but less adaptive: the base station cannot
dynamically optimize signal beams for different users or channel conditions.
o Integrates dozens or even hundreds of antenna elements into the same base
station array.
o Key Benefits:
▪ Higher Throughput: Multiple data streams can be transmitted at once,
boosting overall cell capacity.
In essence, the diagram highlights how Massive MIMO harnesses a large antenna array to
deliver targeted, high-capacity transmissions, whereas legacy antenna systems employ a
single broad coverage beam with more limited efficiency and flexibility.
• Channel Estimation: Estimating channel conditions for so many antennas in real time is
computationally intensive.
Real-World Example
Many early 5G rollouts use Massive MIMO on mid-band frequencies (e.g., 2.5 GHz, 3.5 GHz) to
achieve improved capacity. Operators often deploy 64T64R (64 transmit and 64 receive) antenna
arrays in base stations to deliver enhanced coverage and throughput in urban environments.
6. Conclusion
Wireless communication has transformed nearly every aspect of modern life. What began as
simple analog voice transmission has evolved into sophisticated digital networks capable of
delivering high-speed data, multimedia, and mission-critical services. The continuous innovation
in multiple access and spread-spectrum techniques has pushed the boundaries of spectral
efficiency and reliability. Each new generation of wireless technology—from 1G to 5G—has
built upon the advances of its predecessor, incorporating more efficient modulation schemes,
better error correction, and robust network architectures.
Today, 5G stands at the forefront of this revolution, expanding the role of wireless networks
beyond personal communication into an age of interconnected devices, intelligent transportation,
and immersive experiences. Concepts like Massive MIMO, millimeter-wave deployments, and
network slicing illustrate how the industry is adapting to meet exponentially growing data
demands and new application domains. Going forward, these technologies will lay the
groundwork for future wireless innovations—encompassing 6G and beyond—where artificial
intelligence and integrated sensing will likely become central components in smart networks that
communicate, compute, and sense the environment in a unified manner.
For students and professionals in telecommunications, understanding the fundamentals of
wireless communication—ranging from foundational multiple access techniques to the latest 5G
innovations—is crucial. This chapter provided an overview of how these technologies
developed, how they operate, and why they matter for the next wave of digital transformation.
Whether one is designing next-generation wireless systems or simply using a smartphone, the
principles discussed form the backbone of the global wireless infrastructure that connects billions
of people and devices every day.
• Dahlman, E., Parkvall, S., & Sköld, J. (2020). 5G NR: The Next Generation Wireless
Access Technology. Academic Press.