Nt1310 Unit 3

Improved Essays
1) Cluster size is inversely proportional to channel capacity,larger the cluster size the smaller the number of users.Cluster size is also inversely proportional to co-channel interference i.e higher the cluster size less is co-channel interference.When capacity of the channel is increased the co-channel interference also increases.
2) The possible solutions to increase the capacity of cellular system are:
a) Cell Sectorization
b) Cell Splitting
c) Reduction of cluster size also increases capacity per cell
d) Sharing frequency bands 3) Hexagonal cellular structure are used for because of following reasons: a) It depicts that no area remain uncovered b) Hexagonal shape can be sub divided into micro hexagonal
…show more content…
5) Sectorization is used to reduce CCI by forming the sectors at 120 degree or 60 degree in the cells.In 120 degree the cell is divided into three equal parts and in 60 degree the cell is divided into six equal parts.It helps to reduce cluster size and CCI . 6) The overlaid system is one in which mobiles near base station are assigned to channels from small cluster size .It is because more number of users are nearby the base station so if cluster size is small then its capacity is more and it can handle large number of users.Also the hand off is frequent nearby the base station but away from base stations the quantity of users is very less and they can be easily satisfied with channels of large cluster size. 7)Adjacent Channel Interference (ACI) is the distortion caused by the cells of the adjacent channels. ACI is caused when two signals are transmit at same frequency in different channels.ACI can be reduced by not allocating same frequency to adjacent cells.It can also be reduced by using non linear filters at the

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 1594 Words
    • 7 Pages

    My group had been given a specific task to investigate according to the lab manual1. We were employed by the Environmental Protection Agency as chemists. Our task is to identify an unknown compound that was found in a nearby landfill. In this laboratory, the unknown compound was given to us by our TA. The main goal of this experiment was to correctly identify the unknown compound.…

    • 1594 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    B. Steady-state phase: Data transmission starts; Nodes forward their data during their assigned TDMA slot to the CH. This transmission utilizes a minimum amount of energy (selected depending on the obtained strength of the CH advertisement). The radio of every non-CH node can be turned off until the nodes assigned TDMA…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1420 Unit 8

    • 512 Words
    • 3 Pages

    Complete the following problems. 1. Write C++ statements to do the following: a. Declare an array alpha of 15 components of type int. int[] alpha = new int[15]; b. Output the value of the 10th component of the alpha array. System.out.println(alpha[10]); c. Set the value of the 5th component of the alpha array to 35.…

    • 512 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Finally, the potential issues or risks while using the mobile wireless will be discussed. 1. the technical details of FDMA, TDMA and CDMA (1) FDMA Frequency Division Multiple Access (FDMA) bandwidth is divided into narrow frequency slots and is use to allocate a unique frequency band or channel that a user is free to transmit or receive all the time over the shared…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Then faster chips came and allowed to do signal processing controlling ISI and transmission speeds increased accordingly. 2.3 Multipath propagation Multipath propagation is caused by multipath receptions of the same signal. in city environment or indoors signal travels along different path from transmitter (Tx) to receiver (Rx). * Signal components received at slightly different times (delay) * These components are combined at Rx * Results as a signal that varies widely in amplitude, phase or polarization 2.3.1…

    • 9531 Words
    • 39 Pages
    Great Essays
  • Improved Essays

    Questions On Filters

    • 756 Words
    • 4 Pages

    It’s more proficient than standard adequacy balance. Regarding both radio range and the force expended, it was the much compelling one. Question (3) The Multiplexing is a strategy that permits the synchronous transmissions of signs over a solitary information join. In this framework, "n" connections were shared the single transmission capacity join.…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    RADIOWAVE OUTDOOR PROPAGATION MODELS General definition: • They are empirical mathematical formulation for the characterization of radio wave propagation as a function of frequency, distance and other conditions. • These models predict the path loss (i.e. the reduction in power density of an electromagnetic wave as it propagates through space or underground) of a transmitter and also the effective coverage area of transmitter. We know that when a signal travels from a wireless channel, it undergoes various types of Propagation Effects like – Reflection, Diffraction and Scattering because of the presence of obstructions like buildings, mountains, hills etc. Reflection is when the EM waves encroach on objects that are greater than the wavelength…

    • 1189 Words
    • 5 Pages
    Great Essays