What happens in cdma systems, Computer Networking

Assignment Help:

Question:

(a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is R = 10 kb/s. You have the following alternatives:

i) A system based on TDMA with parameters
• Frequency reuse factor 1/7
• Each link divided into radio channels of 200 kHz
• Ten users per channel

ii) A system based on DS CDMA with parameters
• Frequency reuse factor 1
• Voice activity gain γv = 2.5
• No antenna sectorization
• The required signal-to-noise ratio Eb/I0 = 6 dB
• Other-cell relative interference factor f = 0.6

What alternative would you choose?

(b) You want to distribute the total transmission rate D among 10 users.

(i) How is this done in FDMA, a TDMA and a CDMA system?

(ii) How long should the parameters transmission rate DT, bandwidth BT and signal to noise ratio S/N be selected for each user and why?

(c)

(i) How does the near/far effect influence TDMA systems?

(ii) What happens in CDMA systems?

(iii) What are countermeasures in TDMA systems, what about CDMA systems?

(d)

(i) What is the main physical reason for the failure of many MAC schemes known from wired networks?

(ii) What is done in wired networks to avoid this effect?

(e) Which of the MAC schemes can give hard guarantees related to bandwidth and access delay?


Related Discussions:- What happens in cdma systems

Ipv6 - network layer and routing , IPv6 The  internet  engineering task...

IPv6 The  internet  engineering task force begin  the effort to develop a successor  protocols  to IPv4 in the early  1990 is an internet  layer protocols  for packet  switched

Configure the logical topology- ccna, Configure the Logical Topology S...

Configure the Logical Topology Step: Configure the host computers. Configure the static IP address, subnet mask, and gateway for every host computer.  Note: The followi

Introduction-pram algorithms, One of the most popular models for designing ...

One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

State briefly about fddi media, FDDI Media Class B or SAS (single-attac...

FDDI Media Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings. SASs is attached to the primary rin

Explain the routing table of solaris system, Question 1 Write a note on a)...

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

Determine the application areas of intranet, Determine the Application area...

Determine the Application areas of intranet The uses of an Intranet are only limited by imagination. Some of the larger sectors where the Intranet can be easily and success fu

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

Network Fundamentals BTech Telecommunication, Write a report on your chosen...

Write a report on your chosen topic that has been approved by your Lecturer. Your report should include appropriate figures, about 2000 words. Topics: 1 MAN- Metro Ethernet 2 Inte

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd