Opportunity Driven Multiple Access

Opportunity Driven Multiple Access

Opportunity-Driven Multiple Access (ODMA) is a UMTS communications relaying protocol standard first introduced by the European Telecommunication Standards Institute (ETSI) in 1996. ODMA has been adopted by the 3rd-Generation Partnership Project, 3GPP to improve the efficiency of UMTS networks using the TDD mode. One of the objectives of ODMA is to enhance the capacity and the coverage of radio transmissions towards the boundaries of the cell. While mobile stations under the cell coverage area can communicate directly with the base station, mobile stations outside the cell boundary can still access the network and communicating with the base station via multihop transmission. Mobile stations with high data rate inside the cell are used as multihop relays.

The initial concept of Opportunity Driven Multiple Access (ODMA) was conceived and patented in South Africa by David Larsen and James Larsen of SRD Pty Ltd in 1978

The ODMA standard was tabled by the 3GPP committee in 1999 due to complexity issues. The technology continues to be developed and enhanced by IWICS who holds the key patents describing the methods employed in ODMA to effect opportunity driven communications.

Read more about Opportunity Driven Multiple Access:  ODMA Technology, See Also

Famous quotes containing the words opportunity, driven, multiple and/or access:

    Much of the success of life depends upon keeping one’s mind open to opportunity and seizing it when it comes.
    Alice Foote MacDougall (1867–1945)

    “Nor should she be too rich, because the rich
    Are driven by wealth as beggars by the itch,”
    Beggar to beggar cried, being frenzy-struck,
    “And cannot have a humorous happy speech.”
    William Butler Yeats (1865–1939)

    Creativity seems to emerge from multiple experiences, coupled with a well-supported development of personal resources, including a sense of freedom to venture beyond the known.
    Loris Malaguzzi (20th century)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)