Nt1310 Unit 3

Improved Essays
1) Cluster size is inversely proportional to channel capacity,larger the cluster size the smaller the number of users.Cluster size is also inversely proportional to co-channel interference i.e higher the cluster size less is co-channel interference.When capacity of the channel is increased the co-channel interference also increases.
2) The possible solutions to increase the capacity of cellular system are:
a) Cell Sectorization
b) Cell Splitting
c) Reduction of cluster size also increases capacity per cell
d) Sharing frequency bands 3) Hexagonal cellular structure are used for because of following reasons: a) It depicts that no area remain uncovered b) Hexagonal shape can be sub divided into micro hexagonal
…show more content…
5) Sectorization is used to reduce CCI by forming the sectors at 120 degree or 60 degree in the cells.In 120 degree the cell is divided into three equal parts and in 60 degree the cell is divided into six equal parts.It helps to reduce cluster size and CCI . 6) The overlaid system is one in which mobiles near base station are assigned to channels from small cluster size .It is because more number of users are nearby the base station so if cluster size is small then its capacity is more and it can handle large number of users.Also the hand off is frequent nearby the base station but away from base stations the quantity of users is very less and they can be easily satisfied with channels of large cluster size. 7)Adjacent Channel Interference (ACI) is the distortion caused by the cells of the adjacent channels. ACI is caused when two signals are transmit at same frequency in different channels.ACI can be reduced by not allocating same frequency to adjacent cells.It can also be reduced by using non linear filters at the

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 4

    • 1249 Words
    • 5 Pages

    The first part of the experiment was determining the resolution of the DAC in volts. Before a voltage was applied the noise was determined by measuring the DC offset, the reading of the DMM at an input of zero volts. This offset was removed from the recorded values in order to provide a more accurate reading of the resolution. These corrected values and their corresponding applied voltages can be found in Table 1 of the appendix. The lowest value recorded from the DMM was -9.968V and the highest value recorded was +9.968V making the range of the DMM about 19.94±0.01V. Using the equation for calculating resolution, the resolution was calculated for values of N from 10 to 18 in increments of 2 (recorded in Table 2).…

    • 1249 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 362 Words
    • 2 Pages

    The core objectives of this lab is to understand the concept of cell association of received power (Rx) and designing a modified network planning for an LTE services using multiple eNodeBs for an indoor premises (shopping complex). We are also going to compare the noise limited and interference limited systems along with its interference synchronization in radio access network. To accomplish these objectives, we are going to perform the following tasks: 1. To expand the indoor design of LTE service for the shopping complex, we are going to use seven femtocell and will perform the SINR (signal-to-interference-plus-noise ratio) and bit-rate using the simulation tool Wireless Insite and MATLAB for coding.…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 7

    • 507 Words
    • 3 Pages

    Famanga Ngobeh Prof. Saunders Review Question Lab September 23, 2015 1. Move copies data from one memory location or register to another. The term “move” is a misnomer because data values in the source location aren’t removed. They’re tested, and copies of these values are placed in the destination location. Therefore, a move operator is really a copy operator.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Requirements may be specified in a variety of ways. However there are some guidelines worth following: • Representation format and content should be relevant to the problem. • Information contained within the specification should be nested. 3.3.1.…

    • 87 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Questions On Filters

    • 756 Words
    • 4 Pages

    It’s more proficient than standard adequacy balance. Regarding both radio range and the force expended, it was the much compelling one. Question (3) The Multiplexing is a strategy that permits the synchronous transmissions of signs over a solitary information join. In this framework, "n" connections were shared the single transmission capacity join.…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Then faster chips came and allowed to do signal processing controlling ISI and transmission speeds increased accordingly. 2.3 Multipath propagation Multipath propagation is caused by multipath receptions of the same signal. in city environment or indoors signal travels along different path from transmitter (Tx) to receiver (Rx). * Signal components received at slightly different times (delay) * These components are combined at Rx * Results as a signal that varies widely in amplitude, phase or polarization 2.3.1…

    • 9531 Words
    • 39 Pages
    Great Essays
  • Great Essays

    log10d Carrier frequency: 150MHz≤ fc ≤1500MHz Base station antenna height (hte): 30m ≤ hb ≤ 200m Mobile unit antenna height (hre): 1m ≤ hm ≤ 10m Transmission distance (d):1km≤ d ≤ 20 km • The formulas have enhanced the practical value of Okumura Method but they do not include any path specific corrections. • This model approximates the Okumura model for distances d > 1 Km. Thus; it is a good model for first generation cellular systems. 4.…

    • 1189 Words
    • 5 Pages
    Great Essays