Answer To: Q1 Page 1 of 4 ITECH2300 Mobile Network & Wireless Communication Assignment 2 – Semester 2 2020...
Amit answered on Oct 10 2021
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 10/10/2020
Table of Contents
1. Part -A 3
2. Question 1 3
3. Question 2 4
4. Question 3 8
5. Question 4 10
6. Part B: scanning wireless access points 11
7. References: 14
1. Part -A
2. Question 1
a)
The control which are required to handle the message sent operations are called MAC (Media access controls). The MAC are very important because:
· When identical circuit is used by different computers for message transmission.
· To maintain controlled access to messages and their contention.
· To assure that data transmission not occur during identical time by two systems.
b)
The required examples are pointed below:
· Control access method: In this method, the channel is being controlled by mainframe and channel allocation time is decided by it. For example FDMA.
· Contention based media access method: In this method, the transmission is only possible when the channel is free. Till that the node has to wait. For example, CSMA.
c)
The point showing conditional selection of access method in place of other are provided underneath:
· The resource allocation and required throughput helps in selection of access method.
· With small network which is having low chances of collision, then, contention method will be preferred. The polling delay can be afforded in such networks.
· But when network is large and high stability is required, then, controlled method will be selected. The high throughput with minimum chances of collision can be maintained with this method in large network.
d)
The technique of controlled access can be replaced by contention method when:
· Low uses small network is developed.
· When permission to perform transmission is not required.
· When waiting poll is not affecting the network performance.
3. Question 2
a)
The XNOR will be implemented for the spreading code and sent data. Thus, for first user (U1), it is given:
Thus,
Thus, first user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For second user (U2), it is given:
Thus,
Thus, second user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For third user (U3), it is given:
Thus,
Thus, third user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For fourth user (U4), it is given:
Thus,
Thus, forth user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
Thus, composite signal which will be received by all these four users will be:
-----------------------------------------------
b)
For first user (U1), it is given:
composite signal=
Thus,
Thus signal is received to user 1.
For second user (U2), it is given:
Thus signal is received to user 2.
For third user (U3), it is given:
Thus signal is received...