What happens in cdma systems, Computer Networking

Assignment Help:

Question:

(a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is R = 10 kb/s. You have the following alternatives:

i) A system based on TDMA with parameters
• Frequency reuse factor 1/7
• Each link divided into radio channels of 200 kHz
• Ten users per channel

ii) A system based on DS CDMA with parameters
• Frequency reuse factor 1
• Voice activity gain γv = 2.5
• No antenna sectorization
• The required signal-to-noise ratio Eb/I0 = 6 dB
• Other-cell relative interference factor f = 0.6

What alternative would you choose?

(b) You want to distribute the total transmission rate D among 10 users.

(i) How is this done in FDMA, a TDMA and a CDMA system?

(ii) How long should the parameters transmission rate DT, bandwidth BT and signal to noise ratio S/N be selected for each user and why?

(c)

(i) How does the near/far effect influence TDMA systems?

(ii) What happens in CDMA systems?

(iii) What are countermeasures in TDMA systems, what about CDMA systems?

(d)

(i) What is the main physical reason for the failure of many MAC schemes known from wired networks?

(ii) What is done in wired networks to avoid this effect?

(e) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay?


Related Discussions:- What happens in cdma systems

Types of wires, TYPES OF WIRES:  Cable used for wiring would match the...

TYPES OF WIRES:  Cable used for wiring would match the following: The intended speed The distance between computers The amount of noise Anticipated future r

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

What are the local network security issues, Q. What are the Local Network S...

Q. What are the Local Network Security Issues? Local Network Security Issues Password Protection - Encrypted username & password Group/Owner ID's - File Permissi

Process management, Bootstrapping all the processes and establishing correc...

Bootstrapping all the processes and establishing correct lines of communication is, by itself, the toughest aspect of this assignment. Before writing any code you should think care

What are the TCP services, Q. What are the TCP Services? TCP - Service...

Q. What are the TCP Services? TCP - Services Full Duplex Service Connection Oriented Service Reliable Service

Explain systolic array interconnection networks, Systolic Array : This inte...

Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm

Show the character-level encryption, Q. Show the Character-level Encryption...

Q. Show the Character-level Encryption? - Substitutional - Monoalphabetic - simplest form; also called Caesar cipher - Every character is replaced with another character

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

What is retransmission timer, Q. What is Retransmission timer? Retrans...

Q. What is Retransmission timer? Retransmission timer if an ACK is received previous to the timer goes off - destroy the timer if the timer goes off before ACK a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd