What happens in cdma systems, Computer Networking

Assignment Help:

Question:

(a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is R = 10 kb/s. You have the following alternatives:

i) A system based on TDMA with parameters
• Frequency reuse factor 1/7
• Each link divided into radio channels of 200 kHz
• Ten users per channel

ii) A system based on DS CDMA with parameters
• Frequency reuse factor 1
• Voice activity gain γv = 2.5
• No antenna sectorization
• The required signal-to-noise ratio Eb/I0 = 6 dB
• Other-cell relative interference factor f = 0.6

What alternative would you choose?

(b) You want to distribute the total transmission rate D among 10 users.

(i) How is this done in FDMA, a TDMA and a CDMA system?

(ii) How long should the parameters transmission rate DT, bandwidth BT and signal to noise ratio S/N be selected for each user and why?

(c)

(i) How does the near/far effect influence TDMA systems?

(ii) What happens in CDMA systems?

(iii) What are countermeasures in TDMA systems, what about CDMA systems?

(d)

(i) What is the main physical reason for the failure of many MAC schemes known from wired networks?

(ii) What is done in wired networks to avoid this effect?

(e) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay?


Related Discussions:- What happens in cdma systems

Process management in pvm, Process Management int pvm_mytid( void ...

Process Management int pvm_mytid( void ) Returns the tid of the calling process.  tid values less than zero indicate an fault. int pvm_exit( void ) T

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Calculate the total latency, a) Consider that a host is sending a frame of ...

a) Consider that a host is sending a frame of 1200 bytes to another host found 20 Kilometers away. (Assume that switching delay is negligible) i) Calculate the total latency (

Security - fundamentals of networks, Security Security  is the  protec...

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

Virtual private network vpns, Virtual Private Network  ( VPNs) When we ...

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

Network Layer and Routing , Network Layer and Routing As discussed in...

Network Layer and Routing As discussed in previous  chapters the physical  layer  provides   connection sand services to the  data link  layer while the  data link layer is

Write a long note on internet and privacy, Question 1 Write a long note on...

Question 1 Write a long note on computers in television development Question 2 Write a long note on the ‘Steadicam' Question 3 Write a long note on Internet and pr

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

What is meant by middleware, Middleware is distributed software required to...

Middleware is distributed software required to support interaction among clients and servers. In short, it is the software that is in the middle of the Client/Server systems and it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd