Find the capacity of the wcdma, Computer Network Security

Assignment Help:

Question:

(a) Describe the term interference in the space, time, frequency, and code domain.

(b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). Bandwidth allocated to each user in each link is 30 kHz and a 2G GSM network: 935-960 MHz(forward) , 890-915 MHz(reverse), Frequency Carrier: 200 kHz with TDMA of 8 time slots per frequency carrier.

(i) Calculate the number of user channels in both cases.

(ii) Consider re-use factor is 7 for AMPS and 3 for GSM, calculate the number of users per cell in both cases?

(c) Each channel of the ISI of the CDMA system IS-95 occupies 1.25 MHz of the spectrum of each one way link. Bands of 25 MHz are available in each direction. The maximum user rate R = 9.6 kbps. If a minimum acceptable Eb/I0 is 6 dB, determine the capacity of a CDMA system using

(i) Omnidirectional base station antenna and no voice activity detection

(ii) 3-sectored antennas at the base station with γa = 2.4 and γv = 2.6.

(d) For the WCDMA there are available bands of 1920-1980 MHz in reverse direction and 2110-2170 MHz in forward direction, that is, 60 MHz in each direction. The speech codec in WCDMA employs the AMR technique standardized in 1999. It has 8 source rates from 4.75 kbps up to 12.2 kbps. Each channel of the WCDMA system occupies 5 MHz of the spectrum on each link. Consider the user rate is 12.2 kbps. The other parameters are the same as in (c). Find the capacity of the WCDMA under the given conditions.


Related Discussions:- Find the capacity of the wcdma

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Http protocol, Question (a) Name 3 popular electronic mail access prot...

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Effective legal and ethical frameworks, All references using actual quotes,...

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

Computer security, Assume that the RSA problem is hard, prove that the RSA ...

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Describe how ethernet deals with collisions, Problem (a) The IEEE 802 seri...

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Name the various layers of the osi model, Problem (a) Name the various ...

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Sending an arp message, Normal 0 false false false EN-U...

Normal 0 false false false EN-US X-NONE X-NONE

Explain in des data encryption standard, Explain in DES Data Encryption Sta...

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

Describe the role of dns root servers in network, QUESTION (a) Describ...

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd