Académique Documents
Professionnel Documents
Culture Documents
(c) How does DCA influence the frequencies available in other cells? Answer:
(6 points) Whether or not DCA depends on the current load. It can react upon sudden increase in traffic by borrowing capac-
ity from other cells. However the ”borrowed” frequency must then be blocked in neighboring cells.
(b) What happens to the transmission quality of connections if the load gets higher in a cell, i.e., how does an additional user
influence the other users in the cell, for both TDM/FDM and CDM systems?
Answer:
(8 points) The system can always accept an additional user. However, the noise level may then increase above a certain
threshold where transmission is impossible. In TDM/FDM systems additional users, if accepted, do not influence other users
as users are separated in time and frequency( well, there is some interference; however,this can be neglected in this context).
In CDM systems, each additional user decreases transmission quality of all other users.
(b) What happens in CDMA systems with respect to the near/far effect?
Answer:
(6 points) The signal could drown others as the signals are not separated in times.
(c) What are the countermeasures in TDMA systems, what about CDMA systems?
Answer:
(4 points) In TDMA systems,terminals adapt transmission power and send signals in advance depending on the distance to
the receiver.
(4 points) In CDMA systems, terminals in CDMA systems have to adapt their transmission power very often so that all signal
received, e.g., at a base station, have almost the same strength.
(b) How are collisions avoided during data transmission, why is the probability of collisions lower compared to classical ALOHA?
Answer:
(8 points) Compared to classical Aloha the collision probability is lower because the contention period is kept short com-
pared to the contention-free period where transmission take place.
(5 points) Use the example of F igure3.10 in the textbook. At the beginning, the mobile station C is in the detection range
of A. So C received the CTS from the A. But after a while C is moving out of the detection range of the A. It still consider there is
no permission to send signal. So the exposed terminal happens.