What happens in cdma systems, Computer Networking

Assignment Help:

Question:

(a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is R = 10 kb/s. You have the following alternatives:

i) A system based on TDMA with parameters
• Frequency reuse factor 1/7
• Each link divided into radio channels of 200 kHz
• Ten users per channel

ii) A system based on DS CDMA with parameters
• Frequency reuse factor 1
• Voice activity gain γv = 2.5
• No antenna sectorization
• The required signal-to-noise ratio Eb/I0 = 6 dB
• Other-cell relative interference factor f = 0.6

What alternative would you choose?

(b) You want to distribute the total transmission rate D among 10 users.

(i) How is this done in FDMA, a TDMA and a CDMA system?

(ii) How long should the parameters transmission rate DT, bandwidth BT and signal to noise ratio S/N be selected for each user and why?

(c)

(i) How does the near/far effect influence TDMA systems?

(ii) What happens in CDMA systems?

(iii) What are countermeasures in TDMA systems, what about CDMA systems?

(d)

(i) What is the main physical reason for the failure of many MAC schemes known from wired networks?

(ii) What is done in wired networks to avoid this effect?

(e) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay?


Related Discussions:- What happens in cdma systems

Cells vs packets, ATM designers select cells over packets because of the fo...

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

Different kinds of firewall architectures, What are the different kinds of ...

What are the different kinds of firewall architectures?

What are the communication tools, What are the Communication tools ? Voic...

What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications

Explain priority and reservation of token passing, Priority and Reservation...

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

Ip checksum, This code properly implements the IP checksum function on a 32...

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

What is redirector in networking, What is redirector in Networking? Red...

What is redirector in Networking? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer

Illustrate about OSI architecture, Explain ISO's OSI Architecture The O...

Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication among two end users in a network. It is used in developing

Two routers running igrp to communicate their routes, What must be true for...

What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number

Explain the authentication header (ah) protocol, Can you explain the Authen...

Can you explain the Authentication Header (AH) Protocol?

Illustrate the products based on socks protocol, Illustrate the products ba...

Illustrate the products based on Socks protocol There are a number of products based on SOCKS specifications such as Auto SOCKS available in the market. The latest version is S

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd