The dictionary meaning of rake is to gather or collect together something and actually is a garden tool to collect leaves. But in the terms of computer network, it is for the purpose of collecting signals from multiple paths arriving at the receiver end and used specially in CDMA cellular systems.
A Rake Receiver is a radio receiver which is designed for the purpose to counter the effects of multipath fading. Due to reflections from multiple obstacles in the environment, the radio channel can consist of multiple copies of the transmitted signal having different amplitude, phases or delays.
A rake receiver can resolve this issue and combine them. For this purpose, several sub-receivers are used which are known as “fingers”. The idea of a basic rake receiver was first proposed by Price and Green.
When the transmitter transmits the signal then it travels through the environment which consists of various obstacles and the transmitted signal is reflected by them and is received by the rake receiver from multiple paths. Rake receiver then feeds them to different fingers (correlators). The delays in each received signal are compensated and are feeded to the Combiner, Integrator and Comparator which combines them suitably with different appropriate time delays.
Compensates with the multipath fading occurring in CDMA and W-CDMA.
- Improved efficiency and performance.
- Improved SNR (Signal-to-Noise ratio).
- Increased Cost of the whole system.
- Makes the system more complex.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Sliding Window Protocol | Set 2 (Receiver Side)
- 14 Most Common Network Protocols And Their Vulnerabilities
- Difference between McAfee and Windows Defender
- Difference between WEP and WPA
- Web Scripting and its Types
- Managing your Digital Footprint
- Difference between VPN and APN
- Difference between WiMax and LTE
- Difference between Hardware Firewall and Software Firewall
- Hosting a Web Application on Microsoft Azure in IAAS
- Advantages and Disadvantages of Star Topology
- Tor Browser
- Difference between OSPF and IS-IS
- Protection Against Spam
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.