Receiver decide which symbol was originally sent

Assignment Help Computer Networking
Reference no: EM13162685

1.a) If a mobile radio link operates with a 9 dB SNR and uses a 200 KHz channel, find the theoretic maximum data capacity based on noise/bandwidth (Shannon formula).

  SNR=0.9

Max data rate =   ? 185Kbps

b) If the same channel uses GMSK modulation (a binary scheme), what is the maximum data capacity based on number of symbols/bandwidth (Nyquist formula)?

GMSK n = 1 bits/symbol= m=2

Max data rate = 2 2 * 200,000 Hz = 400 Kbps

c) How do these numbers compare to the GSM (DCS-1900) standard which uses a 200 KHz channel, GMSK, and offers a data rate of 270.8 Kbps? Explain why there is a difference.

Max data rate = = 270.8 *1000 bps =

S/N= 0.407

We can see from the above calculation, GSM(DCS-1900)s' SNR is lower than

Max data rate = 2bps = 270.8*1000 bps= 2* 400,000 bps

M= symbols = 0.204

2. A certain area is covered by a cellular radio system with 84 cells and a cluster size of N. 300 voice channels are available in the system. Users are uniformly distributed over the area covered by the cellular system, and the offered traffic per user is 0.06 Erlang. Assume that blocked calls are cleared and the designated blocking probability is 1%.

  1. Determine the maximum carried traffic per cell if cluster size N = 4 is used. Repeat for cluster sizes of 7 and 12.

Maximum carried traffic per cell = 300 / 84?4 channels

 

  1. Determine the maximum number of users that can be served by the system for a blocking probability of 1% and cluster size of N = 4. Repeat for cluster sizes of 7 and 12.

    If cluster size if N=4

    There are 84/4=21 clusters in system

    Maximum carried traffic per clusters= 4*4= 16 channels A=U=1%*16=U0.06 => U?3

    Maximum number of users= 3*21=63 users

    If cluster size if N=7

    There are 84/7=12 clusters in system

    Maximum carried traffic per cluster= 4*7 = 28 channels A=U=1%*28=U0.06=> U?5

    Maximum number of users=5*12=60 users

    If cluster size if N=12

    There are 84/12=7 clusters in system

    Maximum carried traffic per cluster= 4*12 = 48 channels A=U=1%*48=U0.06=> U=8

    Maximum carried traffic per cluster=8*7=56 users

3. Think of a phase diagram and the points representing valid symbols for a PSK scheme (see figure 2.29).

a) How can a receiver decide which symbol was originally sent when a received "point" lies somewhere in between other points in the diagram?

b) In regards to error detection/correction, why is it difficult to code more and more bits per phase shift?

4.

a) Explain how handoffs are initiated in first generation cellular systems.

b) Explain how handoffs are initiated in second generation (and later) cellular systems.

c) Why is MAHO possible for second-generation cell phones but not for first generation phones?

5. Assume we have a single branch of a Rayleigh fading signal and that the average Signal to Noise Ratio (SNR) is 25 dB.

a) Calculate the probability that the instantaneous SNR drops below 10 dB.

b) Repeat the calculation for a number of branches M = 2, 3, and 4.

c) Do increases in branches of diversity follow the law of diminishing returns? Explain why or why not.

(The law of diminishing returns says that you get a smaller and smaller return (benefit) as you invest more and more. An example would be: if you spend $100 on insulating your home, you might save $100 on heating costs. Then if you spend another $100, you might only save $50 (because all the major leaks were sealed using the first $100). If you spend yet another $100, you might get no return or benefit from your investment. So the returns gets smaller and smaller ($100, $50, $0) with each addition of resources. Sometimes the law of diminishing returns holds and sometimes it does not.)

 

Reference no: EM13162685

Questions Cloud

Write a program to accept a number representing : Write a program to accept a number representing how many first names the user willenter from the command line (5 names maximum), and the actual first names, fromthe command line. Create an array dynamically that has the same size as number ofnames.
Add a sentinel command to stop the loop : add a sentinel command to stop the loop. When the program is compiled, It'll ask the user to type in a palindrome. I want the user to type EXIT to end the loop.
Required value for the move command : Shape_index is a required value for the move command. It is the index of the shape in the shape data arrays that you wish to move. It should range between 0 and MAX_SHAPES - 1. Be sure to validate the index.
Write a function that takes a list of integers as argument : Write a function that takes a list of integers as argument and returns a pair consisting of the sum of the even positions and the sum of the odd positions of the list. You should not use any auxiliary functions.
Receiver decide which symbol was originally sent : How can a receiver decide which symbol was originally sent when a received "point" lies somewhere in between other points in the diagram?
Program to translates a number into the closest letter grade : Write a program that translates a number into the closest letter grade. For example, the number 2.8 (which might have been the average of several grades) would be converted to B-. Break ties in favor of the better grade
Program should assign a seat in the first class : If a person enters 1, your program should assign a seat in the first class (rows 1 - 3). If a person enters 2, your program should assign a seat in business class (rows 4 - 7). If a person enters 3, your program should assign a seat in economy class ..
Write a version of sumpairs : Write a version of sumPairs  that sums each component of the pairs separately, returning a pair consisting of the sum of the first components and the sum of the second components. So basically [(3,1)(10,3)] would return (13,4).
The program reads in names : Write a program and include the following methods. The program reads in names and ages (use 2 parallel arrays, maximum size 50) from a file called Stuff.dat.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd