Find the capacity of the wcdma, Computer Network Security

Assignment Help:

Question:

(a) Describe the term interference in the space, time, frequency, and code domain.

(b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). Bandwidth allocated to each user in each link is 30 kHz and a 2G GSM network: 935-960 MHz(forward) , 890-915 MHz(reverse), Frequency Carrier: 200 kHz with TDMA of 8 time slots per frequency carrier.

(i) Calculate the number of user channels in both cases.

(ii) Consider re-use factor is 7 for AMPS and 3 for GSM, calculate the number of users per cell in both cases?

(c) Each channel of the ISI of the CDMA system IS-95 occupies 1.25 MHz of the spectrum of each one way link. Bands of 25 MHz are available in each direction. The maximum user rate R = 9.6 kbps. If a minimum acceptable Eb/I0 is 6 dB, determine the capacity of a CDMA system using

(i) Omnidirectional base station antenna and no voice activity detection

(ii) 3-sectored antennas at the base station with γa = 2.4 and γv = 2.6.

(d) For the WCDMA there are available bands of 1920-1980 MHz in reverse direction and 2110-2170 MHz in forward direction, that is, 60 MHz in each direction. The speech codec in WCDMA employs the AMR technique standardized in 1999. It has 8 source rates from 4.75 kbps up to 12.2 kbps. Each channel of the WCDMA system occupies 5 MHz of the spectrum on each link. Consider the user rate is 12.2 kbps. The other parameters are the same as in (c). Find the capacity of the WCDMA under the given conditions.


Related Discussions:- Find the capacity of the wcdma

Parsing ipv6 headers, PARSING IPv6 HEADERS Base header is fixed in siz...

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Need assignemnt help in information security assignemnt, Need Assignemnt he...

Need Assignemnt help in Information security assignemnt

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Point to point transmission(ppp), Normal 0 false false fals...

Normal 0 false false false EN-US X-NONE X-NONE

Virtual packets, VIRTUAL PACKETS These data packets serve same reason ...

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Information security policy practices and standards, INFORMATION SECURITY P...

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Unguided media, Unguided Media This is the wireless media that transfe...

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd