Find the capacity of the wcdma, Computer Network Security

Assignment Help:

Question:

(a) Describe the term interference in the space, time, frequency, and code domain.

(b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). Bandwidth allocated to each user in each link is 30 kHz and a 2G GSM network: 935-960 MHz(forward) , 890-915 MHz(reverse), Frequency Carrier: 200 kHz with TDMA of 8 time slots per frequency carrier.

(i) Calculate the number of user channels in both cases.

(ii) Consider re-use factor is 7 for AMPS and 3 for GSM, calculate the number of users per cell in both cases?

(c) Each channel of the ISI of the CDMA system IS-95 occupies 1.25 MHz of the spectrum of each one way link. Bands of 25 MHz are available in each direction. The maximum user rate R = 9.6 kbps. If a minimum acceptable Eb/I0 is 6 dB, determine the capacity of a CDMA system using

(i) Omnidirectional base station antenna and no voice activity detection

(ii) 3-sectored antennas at the base station with γa = 2.4 and γv = 2.6.

(d) For the WCDMA there are available bands of 1920-1980 MHz in reverse direction and 2110-2170 MHz in forward direction, that is, 60 MHz in each direction. The speech codec in WCDMA employs the AMR technique standardized in 1999. It has 8 source rates from 4.75 kbps up to 12.2 kbps. Each channel of the WCDMA system occupies 5 MHz of the spectrum on each link. Consider the user rate is 12.2 kbps. The other parameters are the same as in (c). Find the capacity of the WCDMA under the given conditions.


Related Discussions:- Find the capacity of the wcdma

Fragmentation format, FRAGMENTATION Fragmentation information is kept...

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

Deploying host-based idss, Deploying Host-Based IDSs -Proper implementat...

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Ping command , In the early days when there were some dozen computers machi...

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern

Udp encapsulation, UDP ENCAPSULATION As given in the figure below, UDP...

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Threat identification-risk management, Threat Identification After ident...

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Define checksum, The method used to check errors is checksum . In this m...

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd