Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Exercise 3.4: Use the script in file ofdmfsk.R to plot the signal which would be received under the following circumstances. In all cases let us suppose the time unit is nanoseconds, and the signal to be transmitted is 0, 1, 0:

(a) the bit rate is 0.1, the delay offset between one path and another is 1, and the frequencies are 1.5 and 3;

(b) the bit rate is 0.1, the delay offset between one path and another is 1, and the frequencies are 1.5 and 1.6;

(c) the bit rate is 0.04, the delay offset between one path and another is 5, and the frequencies are 1.5 and 3;
After producing the plots, comment on them as follows:

(a) is it possible, in each case, to visually detect the message from the signal?

(b) for each situation, indicate if you believe the message will be receivable in this situation, and explain why.

(c) does the ability/inability to visually detect the signal mean that the signal can/cannot be detected electronically?

Exercise 3.9: It has become established practice to define network security by means of rules. These rules can take many deferent forms. Although security is often concerned with preventing access, good security requires consideration
of other aspects than merely preventing access. Rules may state what types of service or activity are not allowed, and also what should be allowed. Rules may take precedence over other rules. Complete set of rules for the following situations:

(a) A network of wireless access which is provided in a nationwide network of hotels;

(b) a university campus network (with three types of user academics, admin, and students);

(c) a home wireless network. In each case, include both positive and negative rules, and also rules which are not simply about access, and attempt to ensure that the resulting set of rules is unambiguous, complete, and consistent.

• Criteria

• A plot of two signals in each of the three cases has been prepared and included in the assignment. The relevant R code for each plot has also been included in the assignment.

• An answer to question (a): "is it possible, in each case, to visually detect the message from the signal?" has been provided, with adequate justification, for each of the three cases.

• An answer to question (b): " indicate if you believe the message will be receivable in this situation, and explain why." has been provided, with adequate justification, for each of the three cases.

• An answer to question (c): "does the ability/inability to visually detect the signal mean that the signal can/cannot be detected electronically?" has been provided, with adequate justification, for each of the three cases.

• In Exercise 3.9, a satisfactory set of rules has been provided for all three situations, including rules which describe what users can do, rules which describe what they can't do.

• In addition to classifying rules as positive and negative, rules are also classified as automatically enforced rules (by the software and hardware), on the one hand, and rules which apply to the clients, managers, and human parties to the system in general, on the other hand.

• The issue of how the identity of users should be managed has been addressed in the security rules.

• The issue of security rules for administration users has been addressed.

• The completeness and consistency of the rules has been satisfactorily discussed.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91793940

Have any Question?


Related Questions in Computer Engineering

How do you apply the five components of the information

How do you apply the five components of the information systems to an information systems application like "online bill pay" system offered by many banks.

I am studying java for the first time and i am using a

I am studying java for the first time and I am using a program called Eclipse to build my programs. I am working with arrays and I am tasked with the following: Create a method that restores an image in which each pixel ...

Solve the following one 1 self-check problems on paper and

Solve the following one (1) Self-Check problems on paper and bring your sheet of paper to your section on Thursday: Write a function called grades that takes a list of tuples as a parameter. Each tuple in this list conta ...

Question what is an information system what are the

Question: What is an information system? What are the business benefits of information management? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format.

Assignment 2 windows 8 upgradeby the due date assigned

Assignment 2: Windows 8 Upgrade By the due date assigned, submit your assignment to the Submissions Area. Scenario: You are a consultant for a company that is using Windows 7 as their operating system and are considering ...

What are the differences between the federal deficit and

What are the differences between the Federal deficit and Federal Debt? How does a government budget deficit affect the economy, specifically the unemployment rate and job creation? Identify two periods in recent history ...

Configuring name resolutionas the administrator of the

Configuring Name Resolution As the administrator of the Contoso Corporation, you manage an internal website that is often used by most users with the company. You try to connect to an internal website but cannot open the ...

A random sample of n data values is obtained from a process

A random sample of n data values is obtained from a process having an absolutely continuous cdf of unknown shape. The metallurgist wants to select the best fitting distribution among several candidate cdfs. She decides t ...

Scenario pit powerpit owns a small bike shop feelwheel that

SCENARIO: PIT POWER Pit owns a small bike shop FeelWheel that sells only customized bikes. These days, many customers inherit their bikes from their grandparents or buy them in hardware stores. Thus, it does not make muc ...

In a random sample of 100 male students 80 reported that

In a random sample of 100 male students, 80 reported that they were in favour of writing announced tests, while in a sample of 50 female students 23 favoured writing announced tests. Let the male students be population 1 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As