Find the capacity of the wcdma, Computer Network Security

Assignment Help:

Question:

(a) Describe the term interference in the space, time, frequency, and code domain.

(b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). Bandwidth allocated to each user in each link is 30 kHz and a 2G GSM network: 935-960 MHz(forward) , 890-915 MHz(reverse), Frequency Carrier: 200 kHz with TDMA of 8 time slots per frequency carrier.

(i) Calculate the number of user channels in both cases.

(ii) Consider re-use factor is 7 for AMPS and 3 for GSM, calculate the number of users per cell in both cases?

(c) Each channel of the ISI of the CDMA system IS-95 occupies 1.25 MHz of the spectrum of each one way link. Bands of 25 MHz are available in each direction. The maximum user rate R = 9.6 kbps. If a minimum acceptable Eb/I0 is 6 dB, determine the capacity of a CDMA system using

(i) Omnidirectional base station antenna and no voice activity detection

(ii) 3-sectored antennas at the base station with γa = 2.4 and γv = 2.6.

(d) For the WCDMA there are available bands of 1920-1980 MHz in reverse direction and 2110-2170 MHz in forward direction, that is, 60 MHz in each direction. The speech codec in WCDMA employs the AMR technique standardized in 1999. It has 8 source rates from 4.75 kbps up to 12.2 kbps. Each channel of the WCDMA system occupies 5 MHz of the spectrum on each link. Consider the user rate is 12.2 kbps. The other parameters are the same as in (c). Find the capacity of the WCDMA under the given conditions.


Related Discussions:- Find the capacity of the wcdma

Application layer protocol, Problem a) Give the destination IP address, up...

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

Explain the term quality of service in networks, QUESTION (a) One of th...

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

The Security Systems Development Life Cycle (SecSDLCtle.., #Under what circ...

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Udp interaction, UDP INTERACTION  UDP follows four kinds of interactio...

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

Structure of a typical frame relay, Problem a) Consider a 1000 Mbps Eth...

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Traditional network design approach, Question: a) Give two reasons why ...

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Explain about structure of management information, Question 1 a) What is a...

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Explain briefly how go-back-n operates, Question: a) There are two basi...

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd