Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: What factors should be considered when choosing a digital encoder (line codes)? Briefly illustrate five of those factors. Use sketches and additional text to describe the following encoding techniques: NRZ-L, Bipolar-AMI, Manchester, HDB3, B8ZS and 4B/5B. Your explanation of each technique should comprise the encoding rule, advantages and disadvantages. No mathematical equations are necessary.

problem 2: A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is selected to make the total number of 1s in the 8-bit word an odd count. What are the advantages of E-NRZ over NRZ? Are there any disadvantages?

problem 3: Why should a modem be used to transmit binary data via a PSTN?

(A) Use sketches and additional text to describe the given modulation methods.

(a) Amplitude shift keying.

(b) Frequency shift keying.

(B) Discuss the factors that influence the choice of carrier frequency and the bandwidth used by the demodulator section of a modem.

problem 4: Data is to be transmitted using a modem at 9600 bps. Determine the minimum bandwidth of the system with the following modulation methods (a) FSK (b) ASK. Use the excess bandwidth factor r = 0:5. Compare ASK and BFSK in terms of transmission bandwidth
for a constant data rate.

problem 5: Find the Nyquist rate for the following signals:

(a) x(t) = 5 sin 3000πt cos 4000πt

(b) x(t) = (sin 500πt)/(πt)(c) x(t) = [(sin 300πt)/(πt)]2

The binary channel with bit rate 36000 bps is available for PCM voice transmission. Find out appropriate values of the sampling rate, the number of quantizing levels, and the binary digits, supposing a maximum frequency of 3.2 kHz.

problem 6: An analog information signal, whose maximum frequency is 6000Hz, is to be transmitted by using a PCM system. The quantization error should not exceed the ±1 % of the peak-to-peak analog signal.

(a) Determine the minimum number of bits per sample or bits per PCM word that must be used in this system?

(b) Determine the minimum required sampling rate, and what is the resulting bit rate?

(c) Determine the PCM pulse or symbol transmission rate?

problem 7: A PCM system uses 8 bits per sample and the analog signal is limited to 4.3 kHz. The PCM data is transmitted using (a) BFSK and (b) ASK. Determine the bandwidth required for transmission in each case. Assume that r = 0:55.

problem 8:

(a) Consider a sinusoidal signal m(t) = Acos(2πfmt) applied to a delta modulator with step size Δ. Find out the range of the step size so that slope overload will be avoided. Suppose that delta modulation (DM) system is designed to operate at 3 times the Nyquist rate of the input signal. The quantizing step size is 250 mV. Find out the maximum amplitude of a 1-kHz input sinusoid for which the delta modulator doesn't show slope overload.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91387

Have any Question? 


Related Questions in Computer Engineering

A click counter is a small hand-held device that contains a

A click counter is a small hand-held device that contains a push button and a count display. To increment the counter, the button is pushed and the new count shows in the display. Clicker counters also contain a button t ...

1 a deque pronounced deck is similar to a queue except that

1. A deque (pronounced "deck") is similar to a queue, except that elements can be enqueued at either end and dequeued from either end. Define a Deque ADT and then provide an implementation for your definition. 2. Design ...

A different approach to fast text searching is to step

A different approach to fast text searching is to step through the text in skips equal to the word length. As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this ...

The stream cipher described in definition 211 can easily be

The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For manual encryption, an especially useful one is a stream cipher that operates on letters. 1. De ...

The sieve of eratosthenes is an elegant algorithm for

The Sieve of Eratosthenes is an elegant algorithm for finding all of the prime numbers up to some limit n. The basic idea is to first create a list of numbers from 2 to n. The first number is removed from the list, and a ...

1 x509 is a good security protocol study x509 and discuss

1. X.509 is a good security protocol. Study X.509 and discuss how it differs from S-HTTP and IP Sec. 2. SSL3.0 has been transformed into TLS 1.0. Study the TLS protocol specifications and show how all are met by SSL. The ...

1 how do you discover syntax errors how do you discover

1. How do you discover syntax errors? How do you discover logic errors? 2. Write three versions of the HelloPrinter.java program that have different compile-time errors. Write a version that has a run-time error.

1 can a host have more than one multicast address explain2

1. Can a host have more than one multicast address? Explain. 2. A multicast router is connected to four networks. The interest of each network is shown below. What is the group list that should be advertised by the route ...

A certain college classifies students according to credits

A certain college classifies students according to credits earned. A student with less than 7 credits is a Freshman. At least 7 credits are required to be a Sophomore, 16 to be a Junior and 26 to be classified as a Senio ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen