Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mits5003 The Information Exchange Answers Assessment Answers

Part I: Encoding and error control
Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).
a) Calculate the data rate required for robot to remote controller communication
b) Explain 3 types of suitable encoding techniques could be used to encode the status string.
c) At a certain instance, the sensors provided data as acceleration 5 m/s2 obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%.

i. Write the status string in binary for this instance
ii. Represent the status string on ASK, FSK, and PSK encoding techniques
d) Calculate the CRC for the status string derived in c) with polynomial divisor 11001101
e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control
Part II: Multiplexing and multiple access
Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.
a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams
b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM
c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.

i. For 48 subscribers what should be the subcarrier bandwidth ( fb ) ?
ii. Propose a suitable subcarrier bit time of T to achieve orthogonality
iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)
Part III: Wi-Fi
Prime Living is a real estate company based in Victoria and you work form them as a consultant network engineer. The company has decided to open a new office in South Eastern suburbs and the floor plan of the building is shown below. The office consists of 5 rooms and on average 8 employees work at each room. The lounge is used by both staff and customers and on average about 25 devices connect to Wi-Fi. The clients wants you to design the network for them with at least 100 Mbps data rate for all wireless connections. As resources you’ve got one distribution system and few access points of 10 m range.
 
a) Design the network specifying the locations of access points and distributions system showing the backbone network.
b) Calculate the BSS and ESS sizes
c) Calculate the throughput for the DS
d) Recommend a suitable IEEE substandard for the network and give reasons for your choice
e) Recommend suitable security strategies for the network

Answer:

Information exchange rate is that the rate that a correct amount of data is exchanged over a given sum in time. So, we can state that: (Data Transfer/Time Taken). Accordingly, on condition that estimating framework transmit four bits per second then the coveted rate for machine to remote controller correspondence is 0.50 byte/sec.

  1. b) The different techniques are as below: -
  1. Encoding Techniques: -

            NRZ: - To determine the reliability of voltage level, the NRZ give a property in the midst of somewhat between time. 1 bit denotes unusual state of voltage and bit 0 denotes the lower level of voltage.The two assortments are according to the accompanying:

A Bipolar encoding is an encoding in which following properties accessible:

  • Balance rate is double as compared with NRZ and transmission limit arguably more unmistakable. (Modification is the position that shows the rate. This rate in return show at which it is modified.).Since there is obvious change in the midst of each piece span of time, the authority can be synchronized on that advance i.e. the timer is isolated to the banner.
  • There would be advance toward the begin and likewise in the midst of the bit between time the time works at twofold the data conversion scale.
i) The status of string is 010111111 in this parallel case.

ii)The extend form of Ask, FSK, PSK are phase shift key, frequency shift Key, and amplitude shift key.

ASK: -d)

Ans. Divisor: 11001101, Data word: 11110000000

At that point CRC (cyclic repetition check) =

 our CRC polynomial sequence is 11110000000 and CRC divisor is 11001100101 then solution is:

CRC polynomial:

P(x) = x10+ x9+ x8+ x7

The CRC checksum here:

0000000000 is the initial CRC value   
Next hex digit [1]:
   Shift in of [0] results in 0000000000
   Shift in of [0] results in 0000000000
   Shift in of [0] results in 0000000000
   Shift in of [1] results in 1110000001
Next hex digit [1]:
   Shift in of [0] results in 0010000011
   Shift in of [0] results in 0100000110
   Shift in of [0] results in 1000001100
   Shift in of [1] results in 0000011000
Next hex digit [0]:
   Shift in of [0] results in 0000110000
   Shift in of [0] results in 0001100000
   Shift in of [0] results in 0011000000
   Shift in of [0] results in 0110000000
Next hex digit [0]:
   Shift in of [0] results in 1100000000
   Shift in of [0] results in 0110000001
   Shift in of [0] results in 1100000010
   Shift in of [0] results in 0110000101
Next hex digit [1]:
   Shift in of [0] results in 1100001010
   Shift in of [0] results in 0110010101
   Shift in of [0] results in 1100101010
   Shift in of [1] results in 1001010100
Next hex digit [1]:
   Shift in of [0] results in 1100101001
   Shift in of [0] results in 0111010011
   Shift in of [0] results in 1110100110
   Shift in of [1] results in 1101001100
Next hex digit [0]:
   Shift in of [0] results in 0100011001
   Shift in of [0] results in 1000110010
   Shift in of [0] results in 1111100101
   Shift in of [0] results in 0001001011
Next hex digit [1]:
   Shift in of [0] results in 0010010110
   Shift in of [0] results in 0100101100
   Shift in of [0] results in 1001011000
   Shift in of [1] results in 0010110000

0b0

(hexadecimal)

 

 

% 0010110000

(binary)

 

 

! 176

(decimal)

Flow Control:

Flow control accelerates that extent of data which will be sent before obtaining affirmation. it's a standout amongst the foremost imperative obligations of the knowledge connect layer. Stream control advises the sender what quantity data to send. Window sliding and Stop-&-pause are techniques used for stream controlling.

Controlling the Error:

The control of the error in the information connect layer depends on ARQ (programmed rehash asks for), which is that the retransmission of data. Whenever a slip-up is known in a very trade, indicated outlines are retransmitted. This procedure is termed ARQ which is to ensure dependable correspondence, there requirements to exist stream control and mistake control. Flow and Error control should to be ended at a couple of layers. Designed for hub to-hub connections, stream & mistake control is done within the data interface layer. For both the end points, stream and control of the error completed within the vehicle layer.

Process of controlling flow and error  (I)Stop & Wait method: -

This procedure proceeds until the point that the sender communicates an End of Transmission (EOT) outline. In Stop-and-Wait stream control, the beneficiary shows the aforementioned availability to get information for each case. For each case which is shared, there would be an affirmation, that would take a comparable measure of engendering time to return to the sender.

(ii) Go-back-n ARQ: -

Collector window measure is 1. Now as the part of this strategy, on the off chance that one casing is lost or harmed all edges sent, since the last edge renowned are retransmitted.

(ii) Selective Repeat ARQ: new highlights: -

In this process only, damage packet is retransmit. So, that Sam can use one of them to ensure the accuracy of robot control.

Part II: Multiplexing and multiple access

Multiplexing assumes a pivotal part in correspondence since it allows the blend of different streams along totally unique multiplexing strategies zone unit utilized for various applications.

  1. a)

Multiplexing could be a method through numerous signs of territory unit .In the meantime it is transmitted more than one connections.  Multiplexed framework includes “n” scope of gadgets that offer the capacity of 1 interface which is anyway a connection (way) to have numerous channels. Various gadgets bolstered their transmission streams to an electronic gadget (MUX) that consolidations them into one stream. At the beneficiary, the main stream is coordinated to the Demultiplexer (DEMUX), that is yet again converted into its part transmission and sent to their gathered collectors.

The distinction between TDM, FDM and CDMA on these diverse parameters are as per the following: Idea, Terminals, Signal Separation, Transmission Method, Cell Capacity, Advantages, Disadvantages.

The WiMAX is displayed through the IEEE that is standard chosen 802.16d-2004 (utilized for mounted remote sales) and 802.16e-2005 to supply an overall capacity for microwave get to. At introduction, media transmission businesses zone unit amazingly included with the remote transmission of information which may utilize various transmission modes, from point-to-multipoint joins. It contains full versatile net access. various applications have just been connected to this point abuse WiMAX.

Technologies

3G

4G

 

Cellular Services

Higher Capacity, Broadband Data up to 2Mbps

Higher Capacity, completely IP Based, Multimedia Data

Bandwidth

2 Mbps

10 Mbps - 20 Mbps

Core Network

Packet Network

All-IP Networks

Design Began

1990

2000

Developed

2002

2010

Multiplexing

CDMA

FDMA, TDMA, CDMA

Versions

WCDMA, CDMA-2000

OFDM, UWB

In OFDM framework, the transporters territory unit bending. To amounted bending signals territory unit known as symmetrical once their basic item is sufficient to zero more than one period. Each symmetrical subcarrier has Associate in Nursing (whole number/entire range/number) number of cycles in an exceptionally single measure of OFDM framework. To dodge between channel obstruction these zero bearer’s territory unit utilized as a protect band amid this framework.

  1. ii) OFDM could be a similarly new frightfully efficient computerized regulation subject that utilizes different bearers that zone unit proportionally symmetrical to 1 another over a given interim. each transporter, comprising of a join of undulation and a cos wave, is alluded as a 'sub-bearer'.

Significance of the thoughts of Orthogonality in Digital Communications-

 a.) Inside the style and selection of information bearing heartbeats, symmetry could likewise be acclimated advantage for deduction efficient image by image gathering topic.

 b.) Execution examination of numerous regulation gathering plans are regularly apportioned if the data bearing sign waveforms region unit recognized to be symmetrical to each unique.

 c.) The thoughts of symmetry are frequently acclimated advantage inside the style and decision of single and numerous transporters for tweak, transmission and gathering.

iii)The Orthogonal Frequency Division Multiplexing (OFDM) is produced to help high rate and may deal with multi bearer signals. Its claim to fame is that, it will limit the bury picture Interference (ISI) rather more contrasted with various multiplexing plans. it's a ton of conceivable enhanced Frequency Division Multiplexing (FDM) as FDM utilizes protect band to constrict obstruction between totally extraordinary frequencies that squanders innumerable data measure anyway OFDM doesn't contain between bearer monitor band which may deal with the impedance a considerable measure of speedily than FDM. OFDM also handles multipath come about by changing serial data to numerous parallel data abuse brisk Fourier improve (FFT) and Inverse fast Fourier modify (IFFT).

Information transmission is sufficiently high contrasted with FDM as OFDM takes after multicarrier regulation. For this, OFDM parts high data bits into low data bits and sends each sub-stream in numerous parallel sub-channels, called OFDM subcarriers. These subcarriers territory unit are symmetrically unique. In this way each subcarrier data measure is far lesser than the entire data measure. ISI is diminished in OFDM strategy on the grounds that the picture time Ts of each sub-channel is over the channel delay.

To maintain a strategic distance from (ISI) the Cyclic Prefix (CP) is embedded in OFDM framework before each transmitted picture. In unguided transmission the sending signs can be delude by the outcome because of commotion and different issues. The Directorate for Inter-Services Intelligence (ISI) is totally dispensed with by the arranging once the CP length is bigger than multipath delay.

Part III: Wi-Fi

  1. a) Backbone organize: - A spine might be a piece of system that interconnects shifted things of system, giving a way to the trading of learning between entirely unexpected LANs or subnetworks. A spine will tie along different systems inside a similar working, in various structures in an exceptionally field setting, or over wide territories.
  2. b) A BSS comprises of a group of PCs and one AP, that connects to a wired PC organize. relate ESS comprises of very one AP. relate ESS gives portable clients a chance to roll wherever at interims the domain lined by different APs.Presently some fundamental contrasts amongst BSS and ESS are as per the following: -

In spite of the fact that not appeared inside the figure relate Access reason will go about as an extension between the remote and wired LANs, allowing stations on either PC system to talk with each other.

c)The no of units of data a framework can process in a given period is the throughput. The connectivity is between the frameworks from different parts of Computer and system frameworks to associations. Correlated procedures of framework profitability include the speediness with which specific workload can be ended and reaction time is the ration of time among a private intellectual client petition and receiving the reaction.

  1. d) A rundown of IEEE substandard that can be utilized by SAN.

Like The 802.11 ordinary is laid out through numerous details of WLANs.

There are numerous particulars inside the 802.11 family

  • 802.11 − This relates to remote LANs and gives one - or a couple of-Mbps transmission inside the 2.4-GHz band exploitation either recurrence bouncing unfurl range (FHSS) or direct-succession unfurl range (DSSS).
  • 802.11a − To augment its counterpart, this bandwidth is used. Now the counterpart 802.11 relates to remote LANs and goes as snappy as fifty-four megabits per second inside the 5-GHz band. 802.11a utilizes the symmetrical recurrence division multiplexing (OFDM) encryption subject as basic either FHSS or DSSS.
  • 802.11b − The 802.11 high rate Wisconsin Fi is relating augmentation to 802.11 that relates to remote LANs and yields an alliance as brisk as eleven megabits per second (with a fall back to five.5, 2, and one Mbps figuring on quality of flag) inside a couple of.4-GHz band.
  • e) Following an organized arrangement of steps once creating and actualizing system security can encourage we tend to address the various contemplations that play an area in security style.

Some of security systems are determine system resources, analyse security dangers, analyse security necessities, develop a security set up., outline a security arrangement., Develop strategies for applying security arrangements., Develop a specialized usage methodology, Implement the specialized system and security methodology, take a glance at the assurance and refresh it if any problems are found, Maintain security.

Bibliography

[IEEE]. (2012). Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on. [Piscataway, N.J.].

Glisic, S., & Leppa?nen, P. (2011). Wireless communications. New York: Springer.

Hillstrom, K., & Hillstrom, L. (2007). Communications. Santa Barbara, Calif.: ABC-CLIO.

Hu, F., & Lucyszyn, S. (2016). Advances in Front-end Enabling Technologies for Thermal Infrared ‘THz Torch’ Wireless Communications. Journal Of Infrared, Millimeter, And Terahertz Waves, 37(9), 881-893. doi: 10.1007/s10762-016-0279-4

Molisch, A. (2013). Wireless communications. Hoboken, N.J.: Wiley.

Ramirez-Iniguez, R., Idrus, S., & Sun, Z. (2008). Optical wireless communications. Boca Raton, FL: CRC Press c/o Taylor & Francis.

Ribeiro, A. (2012). Optimal resource allocation in wireless communication and networking. EURASIP Journal On Wireless Communications And Networking, 2012(1). doi: 10.1186/1687-1499-2012-272

Shaheen, J. (2017). 4G Wireless Networks Architecture an Overview and Security Issues On 4G. International Journal Of Future Generation Communication And Networking, 10(1), 15-24. doi: 10.14257/ijfgcn.2017.10.1.02

Singal, T. (2010). Wireless communications. New Delhi: Tata Mcraw Hill Education Private Ltd.

Stallings, W. (2014). Data and computer communications. Boston, Mass: Pearson.

Tagliaferri, D., & Capsoni, C. (2017). High-speed wireless infrared uplink scheme for airplane passengers’ communications. Electronics Letters, 53(13), 887-888. doi: 10.1049/el.2017.0929

Thakur, P., Madan, M., & Madan, S. (2017). Spectrum sensing for 4G LTE OFDM signals in heterogeneous network using neural network. International Journal Of Image Mining, 2(3/4), 245. doi: 10.1504/ijim.2017.085312

Wong, K. (2012). Fundamentals of wireless communication engineering technologies. Hoboken, N.J.: John Wiley & Sons.  


Buy Mits5003 The Information Exchange Answers Assessment Answers Online


Talk to our expert to get the help with Mits5003 The Information Exchange Answers Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Mits5003 The Information Exchange Answers Assessment Answers Assignment Help Online


); }
Copyright © 2009-2023 UrgentHomework.com, All right reserved.