What happens in cdma systems, Computer Networking

Assignment Help:

Question:

(a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is R = 10 kb/s. You have the following alternatives:

i) A system based on TDMA with parameters
• Frequency reuse factor 1/7
• Each link divided into radio channels of 200 kHz
• Ten users per channel

ii) A system based on DS CDMA with parameters
• Frequency reuse factor 1
• Voice activity gain γv = 2.5
• No antenna sectorization
• The required signal-to-noise ratio Eb/I0 = 6 dB
• Other-cell relative interference factor f = 0.6

What alternative would you choose?

(b) You want to distribute the total transmission rate D among 10 users.

(i) How is this done in FDMA, a TDMA and a CDMA system?

(ii) How long should the parameters transmission rate DT, bandwidth BT and signal to noise ratio S/N be selected for each user and why?

(c)

(i) How does the near/far effect influence TDMA systems?

(ii) What happens in CDMA systems?

(iii) What are countermeasures in TDMA systems, what about CDMA systems?

(d)

(i) What is the main physical reason for the failure of many MAC schemes known from wired networks?

(ii) What is done in wired networks to avoid this effect?

(e) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay?


Related Discussions:- What happens in cdma systems

What are the disadvantages of bus topology, What are the disadvantages of b...

What are the disadvantages of bus topology? The disadvantages of bus topology are: a. The bus networks are dissimilar to reconfigure, especially when the acceptable number o

Integrated services digital network service, The entire idea of ISDN is to ...

The entire idea of ISDN is to digitize the telephone network to allow the transmission of video, audio and text over existing telephone lines. The reason of the ISDN is to provide

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

What is meant by asymmetrical protocols, What is meant by Asymmetrical prot...

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

State the uses of groupware, State the uses of groupware With the use o...

State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

Command structure in distributed enrollment protocol , Command Structure: ...

Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex

How to connect remote lans, Q. How to connect Remote LANs? - Remote br...

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

Assignment, Name the three ways or wireless data to be propagated.

Name the three ways or wireless data to be propagated.

What is the purpose of a default route, A default route is used if there is...

A default route is used if there is not a particular entry in the routing table for the destination.

Ip checksum, This code properly implements the IP checksum function on a 32...

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd