Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1)

A composite signal is composed of three sine waves. First wave has frequency of 1 Hz, phase shift of 0 and maximum amplitude of 5 volts; second wave has frequency of 1 Hz, phase shift of 180 degrees ( π radians) and maximum amplitude of 2 volts, and third wave has frequency of 2 Hz, phase shift of 0 and maximum amplitude of 1 volt.

a) find out bandwidth of this composite signal? Is this periodic or non-periodic signal?
b) find out value of the voltage of this composite signal at each of the following two points of time: i) t = 0.25 second and ii) t = 0.75 second.
c) Draw time domain plot in a interval t= 0 to t= 1 second for the three sine waves, then plot approximate shape of the composite signal in this interval.

problem2)

Periodic composite signal contains sine harmonics with frequencies from 10 KHz to 80 KHz. The fundamental frequency of the first harmonic of this composite signal is 10 KHz and all harmonics in the range 10-80 KHz are included in the composite signal. The signal is transmitted over a channel that has attenuation of - ∞ dB for all frequencies less than or equal to 40 KHz and attenuation of -3 dB for all frequencies larger than 40 KHz. All harmonics have a maximum power of 10 milliwatts (mW) at the sender’s side of the channel.

a) What is the bandwidth of the signal at the sender’s side of the channel?
b) How many harmonics reach the receiver?
a) What is the bandwidth of the signal at the receiver’s side of the channel?
c) What is the maximum power (in mW) of each received harmonic?

problem3)

Consider the channel between sender S and receiver R.

a) Channel has bandwidth of 20 KHz and signal-to-noise ratio SNR = ∞ . find out bit rate of this channel using a digital signal which has four voltage levels.
b) Channel has bandwidth of 8 KHz and a signal-to-noise ratio SNR = 63. find out theoretical highest bit rate (i.e., capacity) of this channel.
c) Sender S transmits fixed length packets to receiver R over a link at the speed of 1000 packets/second. The one-way propagation delay of this link is 0.01 second. If the cable of the link is cut, all packets in transit on the link are lost. What are the possible values of the number of lost packets when the cable is cut?

problem4)

Non-periodic analog signal has spectrum with frequencies between 0 and 5000 Hz. Signal is sampled at the Nyquist sampling rate which guarantees the successful reconstruction of an analog signal. At each sample point, the intensity of the signal is measured and is encoded as an integer number of length 8 bits.

a) What is the bit rate of the traffic generated by the digitized signal?
b) Assume the digitized signal is transmitted as a stream of packets from the sender to the  receiver over two hops (links) each of which has an attenuation of -1.5 dB. The power of transmission at the sender’s side is 50 milliwatts. What is the power of the signal at the receiver’s side?
c) Assume the one-way propagation delay for the first link in part (b) is 100 milliseconds. Using the transmission speed (bit rate) obtained in part a, what is the value of the traffic volume (in bits) that fills the first link?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9449

Have any Question? 


Related Questions in Computer Network & Security

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Discussion window media servicebulldiscuss sharepoint

Discussion Window Media Service • Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requi ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Assignment descriptionassignment overviewfor this

Assignment Description Assignment Overview For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task i ...

Assignment1many more square-wave digital encoding schemes

Assignment 1. Many more square-wave digital encoding schemes exist than NRZ-L, NRZI, Manchester, differential Manchester, and bipolar-AMI. List three other encoding techniques and show an example of how each encodes. 2. ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro