Describe the omni-directional and the directional antennas, Computer Networking

Assignment Help:

Question:

a) Describe the following two approaches used towards wireless frequency regulation.

i. Regulated Band
ii. Unlicensed Band

b) An antenna is an electrical conductor or system of conductors to send and receive radio signals. Describe the omni-directional and the directional antennas.

c) Radiations after leaving an antenna are propagated by using one of the three modes of propagation.

i. List down and explain the different signal propagation behaviours that radio waves exhibit.

ii. Which technique is used for cellular phone communication, submarine communication and amateur radio?

iii. Describe two transmission effects that affect the technique used for cellular phone communication you presented in section ii above.

d) In wireless systems, just like wired systems, the users of channels need special mechanisms to avoid interference and collisions.

Describe the following three common mechanisms.

i. Frequency Division Multiple Access
ii. Code Division Multiple Access
iii. Time Division Multiple Access


Related Discussions:- Describe the omni-directional and the directional antennas

What is the role of ieee in computer networking, What is the role of IEEE i...

What is the role of IEEE in computer networking? IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manage

Wideband digital cross connects, Wideband Digital Cross Connects A SONE...

Wideband Digital Cross Connects A SONET  cross  connect  accepts  various  optical  carries  rates accesses the  STS signals  and switches at this level . it  is idally used at

Topology, bus topology disadvantage?

bus topology disadvantage?

Explain about the intranet hardware and software, Explain about the Intrane...

Explain about the Intranet hardware and software Intranets not only provide a secure environment for companies but also provide an excellent working environment that is full of

How does a firewall protect, How Does a Firewall Protect Firewalls work...

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

What is the difference among tftp and ftp application, What is the differen...

What is the difference among TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) permits a local host to get files from a remote host but does n

Working of internet, As discussed in the earlier section each computer link...

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

Define pptp (point-to-point tunneling protocol), Can you define PPTP (Point...

Can you define PPTP (Point-to-Point Tunneling Protocol)?

Virtual private network vpns, Virtual Private Network  ( VPNs) When we ...

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd