+61-413 786 465

info@mywordsolution.com

## Computer Science

 Algorithms Design Computer Network & Security Automata & Computation Operating System Computer Architecture Information Technology Internet Programming Software Engineering Data Communication Computer Graphics Compiler Design LINUX/UNIX Data Structure WINDOWS Application Digital Circuit E-Commerce Microprocessor Artificial Intelligence Data Warehouse Cryptography

problem1)

A composite signal is composed of three sine waves. First wave has frequency of 1 Hz, phase shift of 0 and maximum amplitude of 5 volts; second wave has frequency of 1 Hz, phase shift of 180 degrees ( π radians) and maximum amplitude of 2 volts, and third wave has frequency of 2 Hz, phase shift of 0 and maximum amplitude of 1 volt.

a) find out bandwidth of this composite signal? Is this periodic or non-periodic signal?
b) find out value of the voltage of this composite signal at each of the following two points of time: i) t = 0.25 second and ii) t = 0.75 second.
c) Draw time domain plot in a interval t= 0 to t= 1 second for the three sine waves, then plot approximate shape of the composite signal in this interval.

problem2)

Periodic composite signal contains sine harmonics with frequencies from 10 KHz to 80 KHz. The fundamental frequency of the first harmonic of this composite signal is 10 KHz and all harmonics in the range 10-80 KHz are included in the composite signal. The signal is transmitted over a channel that has attenuation of - ∞ dB for all frequencies less than or equal to 40 KHz and attenuation of -3 dB for all frequencies larger than 40 KHz. All harmonics have a maximum power of 10 milliwatts (mW) at the sender’s side of the channel.

a) What is the bandwidth of the signal at the sender’s side of the channel?
b) How many harmonics reach the receiver?
a) What is the bandwidth of the signal at the receiver’s side of the channel?
c) What is the maximum power (in mW) of each received harmonic?

problem3)

Consider the channel between sender S and receiver R.

a) Channel has bandwidth of 20 KHz and signal-to-noise ratio SNR = ∞ . find out bit rate of this channel using a digital signal which has four voltage levels.
b) Channel has bandwidth of 8 KHz and a signal-to-noise ratio SNR = 63. find out theoretical highest bit rate (i.e., capacity) of this channel.
c) Sender S transmits fixed length packets to receiver R over a link at the speed of 1000 packets/second. The one-way propagation delay of this link is 0.01 second. If the cable of the link is cut, all packets in transit on the link are lost. What are the possible values of the number of lost packets when the cable is cut?

problem4)

Non-periodic analog signal has spectrum with frequencies between 0 and 5000 Hz. Signal is sampled at the Nyquist sampling rate which guarantees the successful reconstruction of an analog signal. At each sample point, the intensity of the signal is measured and is encoded as an integer number of length 8 bits.

a) What is the bit rate of the traffic generated by the digitized signal?
b) Assume the digitized signal is transmitted as a stream of packets from the sender to the  receiver over two hops (links) each of which has an attenuation of -1.5 dB. The power of transmission at the sender’s side is 50 milliwatts. What is the power of the signal at the receiver’s side?
c) Assume the one-way propagation delay for the first link in part (b) is 100 milliseconds. Using the transmission speed (bit rate) obtained in part a, what is the value of the traffic volume (in bits) that fills the first link?

Computer Network & Security, Computer Science

• Category:- Computer Network & Security
• Reference No.:- M9449

Have any Question?

## Related Questions in Computer Network & Security

### Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

### A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

### Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

### True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

### Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

### From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

### Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is \$15,000 with a growth rate of 4%. Per capita income of King's Landing is \$25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

### Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

### Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

### Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

### Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of \$ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

### Compute the present value of an 1150 payment made in ten

Compute the present value of an \$1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

### Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of \$ 699 per year for 19 years, given a discount rate of 6 percent per annum. As