Find the capacity of the wcdma, Computer Network Security

Assignment Help:

Question:

(a) Describe the term interference in the space, time, frequency, and code domain.

(b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). Bandwidth allocated to each user in each link is 30 kHz and a 2G GSM network: 935-960 MHz(forward) , 890-915 MHz(reverse), Frequency Carrier: 200 kHz with TDMA of 8 time slots per frequency carrier.

(i) Calculate the number of user channels in both cases.

(ii) Consider re-use factor is 7 for AMPS and 3 for GSM, calculate the number of users per cell in both cases?

(c) Each channel of the ISI of the CDMA system IS-95 occupies 1.25 MHz of the spectrum of each one way link. Bands of 25 MHz are available in each direction. The maximum user rate R = 9.6 kbps. If a minimum acceptable Eb/I0 is 6 dB, determine the capacity of a CDMA system using

(i) Omnidirectional base station antenna and no voice activity detection

(ii) 3-sectored antennas at the base station with γa = 2.4 and γv = 2.6.

(d) For the WCDMA there are available bands of 1920-1980 MHz in reverse direction and 2110-2170 MHz in forward direction, that is, 60 MHz in each direction. The speech codec in WCDMA employs the AMR technique standardized in 1999. It has 8 source rates from 4.75 kbps up to 12.2 kbps. Each channel of the WCDMA system occupies 5 MHz of the spectrum on each link. Consider the user rate is 12.2 kbps. The other parameters are the same as in (c). Find the capacity of the WCDMA under the given conditions.


Related Discussions:- Find the capacity of the wcdma

History, how did slavery influence life in the colonies

how did slavery influence life in the colonies

Computer Security, I have an assignment of Computer Security to submit. Wil...

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Symmetric encryption-cryptography, Symmetric Encryption This encryption ...

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Hardware trojan detection, how to form the trojan integrated cirucit and wh...

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Feasibility studies-risk management, Feasibility Studies Before deciding...

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Configuration for 3des, (a) Explain the two possible configuration for 3DE...

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Ipv6 addressing, IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit...

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Identified issues in networks, The "Big Red Rocks" (BRR) mining company is ...

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd