Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1)

A composite signal is composed of three sine waves. First wave has frequency of 1 Hz, phase shift of 0 and maximum amplitude of 5 volts; second wave has frequency of 1 Hz, phase shift of 180 degrees ( π radians) and maximum amplitude of 2 volts, and third wave has frequency of 2 Hz, phase shift of 0 and maximum amplitude of 1 volt.

a) find out bandwidth of this composite signal? Is this periodic or non-periodic signal?
b) find out value of the voltage of this composite signal at each of the following two points of time: i) t = 0.25 second and ii) t = 0.75 second.
c) Draw time domain plot in a interval t= 0 to t= 1 second for the three sine waves, then plot approximate shape of the composite signal in this interval.

problem2)

Periodic composite signal contains sine harmonics with frequencies from 10 KHz to 80 KHz. The fundamental frequency of the first harmonic of this composite signal is 10 KHz and all harmonics in the range 10-80 KHz are included in the composite signal. The signal is transmitted over a channel that has attenuation of - ∞ dB for all frequencies less than or equal to 40 KHz and attenuation of -3 dB for all frequencies larger than 40 KHz. All harmonics have a maximum power of 10 milliwatts (mW) at the sender’s side of the channel.

a) What is the bandwidth of the signal at the sender’s side of the channel?
b) How many harmonics reach the receiver?
a) What is the bandwidth of the signal at the receiver’s side of the channel?
c) What is the maximum power (in mW) of each received harmonic?

problem3)

Consider the channel between sender S and receiver R.

a) Channel has bandwidth of 20 KHz and signal-to-noise ratio SNR = ∞ . find out bit rate of this channel using a digital signal which has four voltage levels.
b) Channel has bandwidth of 8 KHz and a signal-to-noise ratio SNR = 63. find out theoretical highest bit rate (i.e., capacity) of this channel.
c) Sender S transmits fixed length packets to receiver R over a link at the speed of 1000 packets/second. The one-way propagation delay of this link is 0.01 second. If the cable of the link is cut, all packets in transit on the link are lost. What are the possible values of the number of lost packets when the cable is cut?

problem4)

Non-periodic analog signal has spectrum with frequencies between 0 and 5000 Hz. Signal is sampled at the Nyquist sampling rate which guarantees the successful reconstruction of an analog signal. At each sample point, the intensity of the signal is measured and is encoded as an integer number of length 8 bits.

a) What is the bit rate of the traffic generated by the digitized signal?
b) Assume the digitized signal is transmitted as a stream of packets from the sender to the  receiver over two hops (links) each of which has an attenuation of -1.5 dB. The power of transmission at the sender’s side is 50 milliwatts. What is the power of the signal at the receiver’s side?
c) Assume the one-way propagation delay for the first link in part (b) is 100 milliseconds. Using the transmission speed (bit rate) obtained in part a, what is the value of the traffic volume (in bits) that fills the first link?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9449

Have any Question? 


Related Questions in Computer Network & Security

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Global asset inc gaiglobal asset inc gai is a financial

GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

Assignmentyou are hired as a chief technology officer cto

Assignment You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the produ ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen