Define what is meant by power efficiency
Course:- Operating System
Reference No.:- EM13943016

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Operating System

Answer the following questions. Explain your answer and show your work in a logical manner. Use any needed formula -- show the formula, the substitutions made, and explain why.

1. A TDMA cellular system uses a 200 KHz bandwidth carrier, which carries 8 channels. What defines or determines each channel, and how much bandwidth does each channel occupy and why?

2. Define what is meant by power efficiency and spectral efficiency for a modulation scheme? What is the measure used for each?

3. Order the following modulation types in terms of spectral efficiency (best to worse) and explain why (be specific, show a number and how you got it): 64-QAM, QPSK, 8-PSK, and BPSK. Assume that the r=0, perfect filtering.

4. Propagation in a wireless channel is sometimes modeled using the propagation index n. Explain how the propagation index n varies and why. If there are two channels, where n=2 for the first one and n=3 for the second one (as for both the same power is transmitted and the same modulation/coding is used), in which channel will the signal be detectable further away and why?

5. Describe why multipath occurs in wireless. Describe fast fading, and some technique to counter it.

6. Describe how direct sequence spread spectrum (DSSS) suppresses interference from other transmissions in the same frequency band.

7. A telephone switching board can handle 120 phones. Assuming the following, determine the outgoing traffic intensity and the number of channels:

* On average 5 calls/hour per phone

* 60% of all calls made are external

* Average call duration time is 4 minutes

* QoS = 0.9%

Please refer to the attachment for multiple choice questions.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Operating System) Materials
Create a job description of the role and responsibilities of a network administrator. Provide a detailed list of personal traits and skills necessary for a person to be a high
Clusters can be implemented by leveraging many operating systems and applications. In a report of 1-2 pages, complete the following: Identify an operating system and applicat
Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing
One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide
multitasking and one to one relationship between user level threads and kernel level threads which allows one or more threads from a process to issue blocking system calls w
Increase size of memory so it contains four page frames for public use. Using same page request as above and FIFO, do another page trace analysis and calculate the failure a
Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing
Implement a framework for CPU scheduling with three scheduling algorithms: FIFO, round robin, and shortest job first (SJF). Jobs arrive at the CPU scheduler at arbitrary tim