StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Wireless Protocol Transmission - Essay Example

Cite this document
Summary
The paper "A Wireless Protocol Transmission" highlights that ten-bit messages are transmitted using a Hamming code. A lot of check bits are needed to ensure that the receiver can detect and correct single-bit errors. Show the bit pattern transmitted for the message 1101001100…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
A Wireless Protocol Transmission
Read Text Preview

Extract of sample "A Wireless Protocol Transmission"

A wireless protocol transmits over a channel 20 MHz wide over a noiseless channel. How many bits/sec can be sent if 64-level digital signals are used?
Channel bandwidth = 20 MHz = 20 * 106
Using the Nyquist theorem;
C = 2Blog2M
C = 2 * 20 *106 * log 264
=240Mbps

2) If a binary signal is sent over a 20 3KHz MHz channel whose signal-to-noise ratio is 40 20 dB, what is the maximum achievable data rate?

We know that 10log10S/N = 40dB
It follows that S/N = 100
Now from the Shannon theorem;
The maximum number of bits per second = H* log2 (1 + S/N) = 20KHz * log2(1+100)
Log2(101)= 6,658
= 20 * 6658
=133160
Now from the Nyquist theorem;
The maximum number of bits per second = 2 * H * log2V = 2 * 20 * log22
=40
The Nyquist theorem gives us a lower data rate hence it forms the maximum digital signals used.
3) Radio antennas often work best when the diameter of the antenna is equal to the wavelength of the radio wave. An antenna has a diameter of 10 cm. What frequency range does it work best for?

From the formulae λf = c
We get f = c/λ.
Now c = 3×108 m/sec and λ = 3×10-2 m/cycle
We obtain (3×108 m/sec)/(3×10-2 m/cycle) = 3 × 1010 m/cycle = 30 GHz.
When λ = 5 m/cycle we obtain (3×108 m/sec)/(5 m/cycle) = 60×106 m/cycle = 60 MHz.
Hence the frequency range is 60 MHz to 30 GHz.

4) Suppose we want to send 2-bit strings. Each codeword contains three copies of the string. If the bit-string is 01, we send the 6-bit string 010101. What is the Hamming distance of this code? How many errors is it possible to detect? How many errors is it possible to correct?
The length of the data sequence is 6
The number of parity bits is 5
The length of the code word is 11
The parity scheme is represented as
P0 = D0 + D1 + D3 + D4
P1 = D0 + D2 + D3 + D5
P2 = D1 + D2 + D3
P3 = D4 + D5
P4 = D0 + D1 + D2 + D3 + D4 + D5 + P0 + P1 + P2 + P3

The syndrome matrix is
D5 D4 D3 D2 D1 D0 P4 P3 P2 P1 P0
1 1 1 1 1 1 1 1 1 1 1
1 1 0 0 0 0 0 1 0 0 0
0 0 1 1 1 0 0 0 1 0 0
1 0 1 1 0 1 0 0 0 1 0
0 1 1 0 1 1 0 0 0 0 1
Its parity scheme is
P0 = D0 + D1 + D3 + D4 + D6
P1 = D0 + D2 + D3 + D5 + D6
P2 = D1 + D2 + D3
P3 = D4 + D5 + D6
P4 = D0 + D1 + D2 + D3 + D4 + D5 + D6 + P0 + P1 + P2 + P3
Its syndrome matric is
D6 D5 D4 D3 D2 D1 D0 P4 P3 P2 P1 P0
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 0 0 0 0 0 1 0 0 0
0 0 0 1 1 1 0 0 0 1 0 0
1 1 0 1 1 0 1 0 0 0 1 0
1 0 1 1 0 1 1 0 0 0 0 1


Length of Data Sequence Number of Parity Bits Length of CodeWord
7 5 12

Parity Scheme
P0 = D0 + D1 + D3 + D4 + D6
P1 = D0 + D2 + D3 + D5 + D6
P2 = D1 + D2 + D3
P3 = D4 + D5 + D6
P4 = D0 + D1 + D2 + D3 + D4 + D5 + D6 + P0 + P1 + P2 + P3

Syndrome Matrix
D6 D5 D4 D3 D2 D1 D0 P4 P3 P2 P1 P0
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 0 0 0 0 0 1 0 0 0
0 0 0 1 1 1 0 0 0 1 0 0
1 1 0 1 1 0 1 0 0 0 1 0
1 0 1 1 0 1 1 0 0 0 0 1

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1689600-computer-network
(Computer Network Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1689600-computer-network.
“Computer Network Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1689600-computer-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Wireless Protocol Transmission

Routing Protocols for Ad-hoc Wireless Network

Interference: Interference is a big issue in MANETs since the links are made and broken on the basis of the transmission properties, subsequent to which one transmission might intervene or intrude in another line of transmission causing the corresponding node to tap the communication of the nodes in other transmission lines and thereby, falsify the overall system of transmission.... As stated previously in this paper, an ad-hoc mobile network refers to a number of wireless mobile hosts linked together to form a network of temporary nature without using any centralized control or stand-alone infrastructure....
20 Pages (5000 words) Dissertation

Wireless networking

In fact Wireless routers contain a wireless access point as part of their overall package.... The communication language used by computers when it is networked is called protocol.... Popular protocols include TCP/IP , the most common protocol found on the Internet and in home networks Networking can be of different types like; Local Area Networking (LAN), Wireless Local Area Networking (WLAN), Wide Area Networking (WAN), Metropolitan Area Networking (MAN) etc....
5 Pages (1250 words) Essay

Video Transmission

This paper ''Video transmission'' tells that Wired technology started gaining its rightful place in the 1900s with the advent of telephone networks.... However, the data transmission here was not very reliable, costs more, has lesser speed, can be easily intercepted, and not very good quality of service.... The clients are expected to reply periodically, depending upon the application, to this server about how much data has been received, whether it has been interpreted correctly, whether there are any errors, whether the bit rate and frame rates as required and many other details regarding the transmission....
12 Pages (3000 words) Essay

Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks

Complex networks, random traffic volume, transmission problems, congestion – these are some of the usual problems we encounter day to day.... It is the communications protocol that unlike the Open Systems Interconnection (OSI) reference model recognizes the need for hierarchy.... Added to the problems already encountered by traditional TCP/IP networks is the exponential growing of the participation of wireless networks.... Aside from design problems, TCP/IP has been plagued by the inevitable growth of wireless networks' participation....
18 Pages (4500 words) Research Paper

Critical Analysis on Route Reservation in Ad Hoc Networks

In most of the previous reservation protocols, a connection has to be fully estab­lished before the transmission of any data packet can start.... When conservative transmis¬sion is used, the acknowledgment has to be received at the source node before the transmission of any data packet can begin so that no packets are dropped due to buffer overflow.... The resource reservation protocol (RSVP) is a signaling protocol that reserves the required resources for time-critical applications so that they can be served with guaranteed minimum bandwidth and bounded delay and jitter, to meet the re­quired QoS....
11 Pages (2750 words) Research Paper

Technological Advancement in Wireless Communications, Electronics, and Sensor Networking

In choosing a wireless approach, a vendor should consider various technology tradeoffs.... here are various factors to consider when designing a Sensor network: the design of a sensor network is influenced by the following factors, tolerance of faults, scalability, the cost of production, sensor network topology, working environment, availability of hardware, power consumption, and transmission media.... There are three application layers protocols in this layer namely: Sensor Management protocol (SMP), Task Assignment and Data Advertisement protocol (ADAP), and Sensor Query and Data Dissemination protocol (SQDDP)....
7 Pages (1750 words) Essay

Transmission Control Protocol in Wireless Networks

"transmission Control Protocol in Wireless Networks" paper argues that the application layer protocols rely on TCP for data transmission, TCP has a few advantages in that it provides congestion control, offers reliable data transmission, provides error detection and flow control.... TCP (transmission Control Protocol) is a protocol that is reliable and connection-oriented.... This abstraction is employed in both computer networking standard models, which are the OSI model (Open Systems Interconnection model) and TCP/IP (Internet protocol Suite)....
9 Pages (2250 words) Coursework

Applied Data Communications and Networks by Buchanan

ibre optic cables, on the other hand, use light pulses in the transmission of information down the fibre lines.... This book review "Applied Data Communications and Networks by Buchanan" discusses a computer network that is the connection of a group of computers together with the motive of data and information sharing....
8 Pages (2000 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us