Calculated link margin

Assignment Help Computer Networking
Reference no: EM132387124

Case Study Assignment

Designing a High speed Wireless Data Link - Line of Sight Link Budget Analysis

Several major factors that can impact the performance of a radio system are

  • Available/permitted output power,
  • Bandwidth,
  • Receiver sensitivity,
  • Antenna gains
  • Environmental conditions

In this case study, the students will be required to calculate the link budget for a LOS Wireless link. Read through the following to understand some of the aspects and elements that need to be considered when calculating a Link Budget.

Received Power -

If the estimated/calculated received power is sufficiently large (relative to receiver sensitivity), the link budget is sufficient for sending data.

Received Power (dBm) = Transmitted Power (dBm) + Gains (dB) - Losses (dB)

Gains(dB) = Transmit Antenna gain+ Receiver Antenna Gain

Receiver sensitivity is the lowest power level at which the receiver can detect an RF signal and demodulate data.

Link Margin/Fade Margin -

The amount by which the received power exceeds receiver sensitivity is called the link margin/fade margin.

In wireless systems, multipath propagation results in multiple copies of a signal to arrive at different signal phases at the receiver. If these signals add up destructively, the resulting signal power can be lower by a factor of 100 or 1000 (20 or 30 dB). The signal level relative to the noise declines making signal detection at the receiver more difficult. It is therefore highly recommended to keep a link margin of 30 dB when designing a wireless system.

Link Margin=Received Power-Receiver sensitivity

Losses -

In a line-of-sight wireless system, losses are mainly due to free-space path loss (FSPL). Other losses are due to antenna cabling and connectors. Generally, 0.25dB loss per connector and 0.25dB loss for every 3-ft of antenna cable should be included in the link budget calculations. However, for the sake of simplicity, you can neglect these losses for your calculations.

FSPL(dB) = 10log10(4πdf/c)2

In dB's the path loss when the distance (d is in km) and the frequency (f is in MHz) can be simplified as follows:

FPSL(dB) = 20log10(d) + 20log10(f) + 32.45

(a) Calculate the FSPL in dB for a distance of 8Km and 16 Km for two different frequencies 3.6GHz, 4.2GHz and construct a table as follows:

 

FSPL (dB)

Distance (Km)

3.6 GHz

4.2 GHz

8

 

 

16

 

 

(b) For the information given below, calculate the link budget analysis for the wireless system, which will involve calculating the following:

  • Received Power
  • Link Margin

Distance: 8 km

Frequency: 4.2 GHz

Link Type: Point-to-Point, Line-of-Sight

Tx power: +23dBm

Antenna gain is 24dBi

Assume negligible loss for cabling and connectors

Receiver Sensitivity: -72dBm

Assume that we are using the same antennas at the transmitter and the receiver side, the link budget calculations will be the same as the link budget in both directions is expected to be symmetrical. In cases where 2 types of antenna systems with different transmit power are used, we must perform two link budget analysis, one in each direction.

(c) For the calculated Link Margin at 8Km what can you say about the availability/reliability of the link based on the following Table which shows the relationship between the available link margin and link availability as a percentage of time.

Time Availability (Percentage)

Link/Fade Margin

90

8

99

18

99.9

28

99.99

38

99.999

48

Reference no: EM132387124

Questions Cloud

Do you believe it continues to be essential to study : Do you believe it continues to be essential to study diversity?
Interlocking structures of oppression : Patricia Hill Collins refers to race, class, gender, etc. as "interlocking structures of oppression." Implied in that statement is that while some are oppressed
Describe family dynamics from the functionalist : Describe your family dynamics from the functionalist, conflict, and symbolic interactionist perspectives.
Discuss the ways in which these two levels differ and merge : Discuss the ways in which these two levels differ and merge. When working in the profession, when might it be necessary to utilize both simultaneously?
Calculated link margin : Designing a High speed Wireless Data Link - Line of Sight Link Budget Analysis - Calculate the FSPL in dB for a distance of 8Km and 16 Km for frequencies
Seven theories of crime and deviance : Using one of the seven theories of crime and deviance, explain why a 14 year old would go on a mass robbing spree and why he would turn to a life of crime
Overthrow the capitalist economic system : Weber believed that the workers would eventually overthrow the capitalist economic system.
What are the computer graphics system main components : What are the computer graphics system main components? Give example on each component. Generate the necessary vertex table Edge Table and surface Table
Explicit and exaggerated about flouting gender rules : How do gender performances that are explicit and exaggerated about flouting gender rules (as in drag shows or Halloween costumes) relate to the gender binary?

Reviews

Write a Review

Computer Networking Questions & Answers

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  Determine the throughput for file transfer

Assume Host A wishes to send large file to Host B. Path from Host A to Host B has three links, of rates R1=500kbps, R2=2Mbps, and R3=1Mbps. Suppose no other traffic in network, Determine the throughput for file transfer.

  What is voip and how is it different from pots

Voice over the Internet Protocol (VoIP). What is VoIP and how is it different from the Plain Old Telephone Service (POTS)? What are some issues an organization (not individuals) should analyze when evaluating the move from a traditional phone sy..

  Security concerns that a web designer

What are the security concerns that a web designer must address and be aware of? How much of the responsibility for securing the site lies with the host, and how much lies with the designer? How can you, as a web designer, implement good security ..

  Explain human factors in achieving business

MN503 Overview of Internetworking Assessment - Network requirement analysis and plan, Melbourne Institute, Explain human factors in achieving business

  What are congestion window size after a period of time

Iif both C1 and C2 at time t0 have congestion window of 10 segments what are their congestion window size after 2200 msec

  What settings might be considered via group policy

What technology will be implemented to provide secure remote access for users and who should have remote access?

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  Wide area network by using frame relay technology

Site networks are connected to form wide area network using frame relay technology. Webservers located at each site provide access to information resources.

  Identify problems with maintaining legacy systems

COIT20246 - ICT Services Management - cq university - Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google

  Mac destination address in ethernet header-arp payload

Describe the difference between MAC Destination Address in Ethernet header and one found in ARP payload.

  What is the subnet mask called in linux

What command is used to find out where a file comes from?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd