Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1)

A composite signal is composed of three sine waves. First wave has frequency of 1 Hz, phase shift of 0 and maximum amplitude of 5 volts; second wave has frequency of 1 Hz, phase shift of 180 degrees ( π radians) and maximum amplitude of 2 volts, and third wave has frequency of 2 Hz, phase shift of 0 and maximum amplitude of 1 volt.

a) find out bandwidth of this composite signal? Is this periodic or non-periodic signal?
b) find out value of the voltage of this composite signal at each of the following two points of time: i) t = 0.25 second and ii) t = 0.75 second.
c) Draw time domain plot in a interval t= 0 to t= 1 second for the three sine waves, then plot approximate shape of the composite signal in this interval.

problem2)

Periodic composite signal contains sine harmonics with frequencies from 10 KHz to 80 KHz. The fundamental frequency of the first harmonic of this composite signal is 10 KHz and all harmonics in the range 10-80 KHz are included in the composite signal. The signal is transmitted over a channel that has attenuation of - ∞ dB for all frequencies less than or equal to 40 KHz and attenuation of -3 dB for all frequencies larger than 40 KHz. All harmonics have a maximum power of 10 milliwatts (mW) at the sender’s side of the channel.

a) What is the bandwidth of the signal at the sender’s side of the channel?
b) How many harmonics reach the receiver?
a) What is the bandwidth of the signal at the receiver’s side of the channel?
c) What is the maximum power (in mW) of each received harmonic?

problem3)

Consider the channel between sender S and receiver R.

a) Channel has bandwidth of 20 KHz and signal-to-noise ratio SNR = ∞ . find out bit rate of this channel using a digital signal which has four voltage levels.
b) Channel has bandwidth of 8 KHz and a signal-to-noise ratio SNR = 63. find out theoretical highest bit rate (i.e., capacity) of this channel.
c) Sender S transmits fixed length packets to receiver R over a link at the speed of 1000 packets/second. The one-way propagation delay of this link is 0.01 second. If the cable of the link is cut, all packets in transit on the link are lost. What are the possible values of the number of lost packets when the cable is cut?

problem4)

Non-periodic analog signal has spectrum with frequencies between 0 and 5000 Hz. Signal is sampled at the Nyquist sampling rate which guarantees the successful reconstruction of an analog signal. At each sample point, the intensity of the signal is measured and is encoded as an integer number of length 8 bits.

a) What is the bit rate of the traffic generated by the digitized signal?
b) Assume the digitized signal is transmitted as a stream of packets from the sender to the  receiver over two hops (links) each of which has an attenuation of -1.5 dB. The power of transmission at the sender’s side is 50 milliwatts. What is the power of the signal at the receiver’s side?
c) Assume the one-way propagation delay for the first link in part (b) is 100 milliseconds. Using the transmission speed (bit rate) obtained in part a, what is the value of the traffic volume (in bits) that fills the first link?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9449

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As