$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Strength And Weakness Of The Antenna

tag 0 Download5 Pages 1,041 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


1.Different antenna, such as yagi, horn, and celluar antennas, etc. has different merits. Research these technologies in details and pay specific attention to how they are used as well their strengths and weakness.
2.Compare and contrast the multiplexing techniques CDMA and FDMA in the area of wireless networking?


1.Different types of Antennas are:

Horn Antennas

A horn antenna is also called microwave horn antenna. It is used in many applications for microwaves where level of reasonable directives is needed. There are different types of horn antennas available including conical horn, pyramid horn antenna and the corrugated horn antenna. The antenna is used in the reception and transmission of RF microwave signal and it is usually used in conjunction with waveguide feeds (Mizoguchi et al ., 2016). A horn antenna is a form of antenna that consist mainly flared waveguide which is in the shape of a horn. It has that effect that enables a transition between the free space and the wave guide and it also directs wave in a beam.


The following are the strength of the antenna.

  • Impedance matching is good.
  • Greater directivity.
  • Standing waves are avoided.
  • Small minor lobes are formed
  • Narrow beam width (Ekti et al., 2016)


The following are the weakness of the antenna.

Flare angle and length of the flare should not be very small

Designing of the flare angle, decides the directivity.

Yagi – Uda Antenna

The yagi – uda antenna is the most commonly used antenna for TV reception over the last few decades. This type of antenna is the easiest to use and popular antenna with a good performance. This type of antenna is famous for its directivity and high gain. The frequency range in which the antenna works is around 30 MHz to 3GHz which belong to the UHF and VHF bands ok frequency.


The following are the strength of the antenna.

  • High directives is achieved
  • Easy of handling and maintenance
  • Less amount of power is needed.
  • Broader coverage of frequency
  • High gain is achieved.


The following are the weakness of the antenna.

This type of antenna is prone to atmospheric effects.
This type of antenna is prone to noise.

Helical Antenna

Helical antenna is an example of wire antenna as it forms the shape of a helix. The operation frequency of the helical antenna is around 30 MHz to 3 GHz. This antenna works in the UHF and VHF ranges. It is one of the simplest antennas which provide polarized waves circularly (Wong et al.,2017). This type of antenna is usually used in extra terrestrial communication which involves satellite relays etc



The following are the strength of the antenna.

  • Simple design
  • Wider bandwidth
  • Highest directivity
  • Can be used at HF and VHF bands also.
  • Circular polarization can be achieved (Skinner, 2016).


The following are the weakness of the antenna.

  • The antenna size is large so it requires more space.
  • Efficiency decreases with the number of turns.

Future prospective

The helical antenna would be a dominant player in the near future because of its mode of operation. There are two modes of operation

Normal or perpendicular mode of radiation

In this mode of radiation, the radiation field of the helix is normal. The radiated waves are polarized circularly. This is obtained if the dimension of the helix is small when compared to wavelength.

Axial or beam mode of operation

In this mode of radiation, the field of radiation is in the end- fire direction along the helical axis and the wave is circular or circularly polarized. The radiation is broad and the directional along the beam axis producing minor lobes at oblique angles (Skinner, 2016).

2.Compare and contrast the multiplexing techniques CDMA and FDMA

Code Division Multiple Access (CDMA) is a method access normally used for 3G radio communication and some other technology. The technicality of CDMA technology has given significant advantages over other parallel technologies which are in term of spectrum efficiency and overall performance (Rogers, Richard & Noortje, 2016).

Frequency Division Multiple Access (FDMA) is one of the most common analog multiple access methods .the bandwidth is divided into channel of equal bandwidth as a result of which each conversation is carried on a different frequency

In code division multiple accesses each user is assigned a different pseudorandom binary sequence that modulates the carrier, with respect to the waveform it is spreading across the spectrum and gives each user a unique code pattern. With frequency division multiple access different signals are assigned to the frequency channel. A frequency is a channel. Frequency is mainly a basic technology in the analog advanced mobile phone system (AMPS) (Rogers, Richard & Noortje, 2016). In FDMA each channel can be assigned to only one user at each time. FDMA can also be used in Total access Communication system. The broad difference between CDMA and FDMA are as follows:

CDMA (code division multiple access)

  • Every narrow signal is multiplied by wideband spreading signal usually known as codeword.
  • Only the desired codeword is detected by the receiver rest appear as a noise.
  • Every user has a different pseudo-code which is orthogonal to others
  • Same frequency is used by every user and simultaneous transmission occurs
  • It is mandatory for the receiver to know about the transmitters codeword

FDMA (Frequency Division multiple access)

  • Bandwidth of channel is relatively narrow which is known as narrow band system
  • Tight filtering is needed in order to minimize interference
  • Little or no equalization for spreading symbol is needed.
  • Bandwidth of the channel is not in use.
  • Analog links are suitable for FDMA (Etzkowitz, 2016).


Mizoguchi, F., Yamauchi, T., Ishihara, Y., & Ishikawa, K. (2016). U.S. Patent Application No. 15/387,044.

Ekti, A. R., Shakir, M. Z., Serpedin, E., Qaraqe, K. A., & Imran, M. A. (2016). On the Traffic Offloading in Wi-Fi Supported Heterogeneous Wireless Networks. Journal of Signal Processing Systems, 83(2), 225-240.

Wong, V. W., Schober, R., Ng, D. W. K., & Wang, L. C. (2017). 1 Overview of New Technologies for 5G Systems. Key Technologies for 5G Wireless Systems, 1.

Skinner, B. F. (2016). The technology of teaching. BF Skinner Foundation.

Etzkowitz, H. (2016). The evolution of technology transfer.

Rogers, Richard, and Noortje Marres. "Landscaping climate change: A mapping technique for understanding science and technology debates on the World Wide Web." Public Understanding of Science (2016).


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Strength And Weakness Of The Antenna. Retrieved from

"Strength And Weakness Of The Antenna." My Assignment Help, 2018,

My Assignment Help (2018) Strength And Weakness Of The Antenna [Online]. Available from:
[Accessed 17 January 2020].

My Assignment Help. 'Strength And Weakness Of The Antenna' (My Assignment Help, 2018) <> accessed 17 January 2020.

My Assignment Help. Strength And Weakness Of The Antenna [Internet]. My Assignment Help. 2018 [cited 17 January 2020]. Available from:

At, we understand that when students get stuck with tough assignments, they look for affordable services. To assist students with complex assignments, we have built a team of skilled cheap essay writers. has become one stop solution for all students who often look for answers related to their search similar to do my essay at the cheap rate or who can write my essay at affordable prices. Students prefer hiring us as we have the best provisions to render services related to do my essay online at a reasonable rate.

Latest It Write Up Samples

MN502-Impact Of Ransom Eare In The Society

Download : 0 | Pages : 8

Answer: Introduction Ransom ware is a subset of the malicious software also known as malware invented from the cryptovirology which is designed to threaten the general public on account of stealing of data saved on either, computer or tablets. This software blocks the data of the person and the same is handed over to the person back once the money is received in the form of ransom [1]. The consequences of not giving the ransom can be so bad t...

Read More arrow

BLDG2015 Building Information Management

Download : 0 | Pages : 3

Answer: The Quality Assurance (QA) process would primarily consist of four kinds of distinct stages. These stages are mainly responsible for the controlling of errors and information redundancy within the Business Information Modelling (BIM) Process. Scope Verification Meeting– After the assigning of the project, the Project Manager should request the scope of the project and a particular copy of the scoped documents. These documents ...

Read More arrow

HI5019-Strategic Analysis Of WesFarmers Limited

Download : 0 | Pages : 13

Answer: Introduction This report aims to provide a detailed strategic analysis of the company, WesFarmers Limited. The essential analysis is completed with the help of PESTLE analysis, Porter’s Five Forces analysis and the threats and opportunities of the company is discussed.  A detailed report of a discussion about the resources of the firm is discussed. The capabilities of the organisation is discussed and the capabilities are e...

Read More arrow

MN504-Bitcoin And Ethereum Security And Privacy

Download : 0 | Pages : 8

Answer: Introduction: The Blockchain technology is a new emerging technology in the field of security solutions. The blockchain technology is based on the cryptography securities [1]. The blockchain technology was announced for supporting the crypto-currency for the security related issues but now the blockchain technology used by many sectors including some business sector also. This type of blockchain is named as private blockchain. Other t...

Read More arrow

ITECH7402-Ethical Responsibilities In This Case Study

Download : 0 | Pages : 7

Answer: Introduction An organization requires various ethical practices. This helps the employees to stay disciplined and well mannered. It also helps in smooth running of the activities under a particular system. Good ethical practices help the organization to maintain a good working environment (Morris, 2016). In the provided case study, an organization named NewAge Pty Ltd produces operating systems for another organization that manufactur...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The instructor like the assignment and no need to redo it. She was impressed by the quality of the assignment.


User Id: 364013 - 17 Jan 2020


student rating student rating student rating student rating student rating

The deadline for my assignment passed by a few hours but the finished result was correct and looked great! The customer service chat line is very quick to get you answers and responses. I will definitely use them again in the future!


User Id: 363787 - 17 Jan 2020


student rating student rating student rating student rating student rating

I am always excited to see the grades because I have full confidence in the writers.


User Id: 106921 - 17 Jan 2020


student rating student rating student rating student rating student rating

I love this company it’s some dislike about it but I love the experts that helps with the assignment


User Id: 334177 - 17 Jan 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?