Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: Describe how a Mobile Terminating call, from a PSTN phone, is processed in a GSM network. Describe your answer with a proper diagram.

problem 2: Top-Net, a new telecommunication service provider wants to implement a 3G cellular network in Mauritius. They decide on using the chipping code 101101 for the code division multiplexing.

a) Supposing no scrambling code is used, what are the chipping sequences which can be derived from the original chipping code in order to encode four different data streams in a Top-Net 3G cell?

b) Supposing the data rate if the original chipping code is used is 512kbit/s and supposing a constant chipping rate of 3.84Mchip/s, what will be the new data rate for each of the four chipping sequences you computed above?

c) Describe on the result of problem (b) above; is the resultant data rate a reasonable value for typical 3G networks?

d) The Engineers at Top-Net are new to 3G as they have primarily worked on GSM networks before. They are worried regarding the effects like cell breathing, multi-path propagation and shadowing.  Describe each of these effects in brief.

e) What property of the architecture of 3G networks, inherently take care of the problems mentioned in problem (d) above? describe this property in brief.

f) Why is a 3G network usually more expensive to set up as compared to GPRS or GSM networks? How can the setting up costs be alleviated?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95941

Have any Question? 

Related Questions in Computer Engineering

Write an algorithm to settle the following question a bank

Write an algorithm to settle the following question: A bank account starts out with $10,000. Interest is compounded monthly at 6 percent per year (0.5 percent per month). Every month, $500 is withdrawn to meet college ex ...

We consider the long-term security of the advanced

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. ...

Assignmentcreate a four slide powerpoint presentation in

Assignment Create a four slide PowerPoint presentation in which you: 1. Slide 1: Insert a title slide including your name, course, quarter, and professor's name. 2. Slide 2: Insert a picture of the person or of something ...

Assume we have 20 hosts in a small as there are only four

Assume we have 20 hosts in a small AS. There are only four groups in this AS. Find the number of spanning trees in each of the following approaches: a. source-based tree b. group-shared tree

Consider the following rulesreachablex y - flightx

Consider the following rules: REACHABLE(X, Y) :- FLIGHT(X, Y) REACHABLE(X, Y) :- FLIGHT(X, Z), REACHABLE(Z, Y) where REACHABLE(X, Y) means that city Y can be reached from city X, and FLIGHT(X, Y) means that there is a fl ...

1 assume that you have 1 ss cpu how many cycles will it

1. Assume that you have 1 SS CPU. How many cycles will it take to execute these two threads? How many issue slots are wasted due to hazards? 2. Now assume you have 2 SS CPUs. How many cycles will it take to execute these ...

1 are idss similar to fi rewalls2 why are system intrusions

1. Are IDSs similar to fi rewalls? 2. Why are system intrusions dangerous? 3. Discuss the best approaches to implementing an effective IDS. 4. Can system intrusions be stopped? Support your response.

Using notepad write a program using pseudocode to solve

Using Notepad++ , write a program using Pseudocode to solve the following problem. Use the modular approach to solving the problem. Determine the median selling price of all homes in a subdivision named Botany Bay sold d ...

Implement a class cloud that contains an array list of

Implement a class Cloud that contains an array list of Point2D.Double objects. Support methods Draw each point as a tiny circle. Write a graphical application that draws a cloud of 100 random points.

1 why shouldnt an organization give an employee candidate a

1. Why shouldn't an organization give an employee candidate a tour of secure areas during the candidate's interview? 2. List and describe the typical relationships that organizations have with nonemployees. What are the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen