Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: What factors should be considered when choosing a digital encoder (line codes)? Briefly illustrate five of those factors. Use sketches and additional text to describe the following encoding techniques: NRZ-L, Bipolar-AMI, Manchester, HDB3, B8ZS and 4B/5B. Your explanation of each technique should comprise the encoding rule, advantages and disadvantages. No mathematical equations are necessary.

problem 2: A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is selected to make the total number of 1s in the 8-bit word an odd count. What are the advantages of E-NRZ over NRZ? Are there any disadvantages?

problem 3: Why should a modem be used to transmit binary data via a PSTN?

(A) Use sketches and additional text to describe the given modulation methods.

(a) Amplitude shift keying.

(b) Frequency shift keying.

(B) Discuss the factors that influence the choice of carrier frequency and the bandwidth used by the demodulator section of a modem.

problem 4: Data is to be transmitted using a modem at 9600 bps. Determine the minimum bandwidth of the system with the following modulation methods (a) FSK (b) ASK. Use the excess bandwidth factor r = 0:5. Compare ASK and BFSK in terms of transmission bandwidth
for a constant data rate.

problem 5: Find the Nyquist rate for the following signals:

(a) x(t) = 5 sin 3000πt cos 4000πt

(b) x(t) = (sin 500πt)/(πt)(c) x(t) = [(sin 300πt)/(πt)]2

The binary channel with bit rate 36000 bps is available for PCM voice transmission. Find out appropriate values of the sampling rate, the number of quantizing levels, and the binary digits, supposing a maximum frequency of 3.2 kHz.

problem 6: An analog information signal, whose maximum frequency is 6000Hz, is to be transmitted by using a PCM system. The quantization error should not exceed the ±1 % of the peak-to-peak analog signal.

(a) Determine the minimum number of bits per sample or bits per PCM word that must be used in this system?

(b) Determine the minimum required sampling rate, and what is the resulting bit rate?

(c) Determine the PCM pulse or symbol transmission rate?

problem 7: A PCM system uses 8 bits per sample and the analog signal is limited to 4.3 kHz. The PCM data is transmitted using (a) BFSK and (b) ASK. Determine the bandwidth required for transmission in each case. Assume that r = 0:55.

problem 8:

(a) Consider a sinusoidal signal m(t) = Acos(2πfmt) applied to a delta modulator with step size Δ. Find out the range of the step size so that slope overload will be avoided. Suppose that delta modulation (DM) system is designed to operate at 3 times the Nyquist rate of the input signal. The quantizing step size is 250 mV. Find out the maximum amplitude of a 1-kHz input sinusoid for which the delta modulator doesn't show slope overload.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91387

Have any Question? 

Related Questions in Computer Engineering

1 if you could what would you do to help create a national

1. If you could, what would you do to help create a national "security culture" in which everyone is more knowledgeable and proactive about threats to information security? 2. There have been several incidents of data th ...

1 what is the function of a sonet regenerator2 what are the

1. What is the function of a SONET regenerator? 2. What are the four SONET layers? 3. Discuss the functions of each SONET layer. 4. What is a virtual tributary? 5. In ATM, what is the relationship between TPs, VPs, and V ...

1 distinguish between a getrequest pdu and a setrequest

1. Distinguish between a GetRequest PDU and a SetRequest PDU. 2. In SNMP, which of the following PDUs are sent from a client SNMP to a server SNMP? a. GetRequest b. Response c. Trap

1 what is the difference between a threat agent and a

1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. How is infrastructure protection (assuring the security of utility services) related to info ...

Use the probability density function of problem 414aa

Use the probability density function of Problem 4.14a. a. Design the four-level optimum-uniform quantizer. Calculate the mean square error and the entropy of the output. b. Design the four-level Lloyd-Max quantizer (or t ...

Matlabs fft command computes the dft of a vector x assuming

MATLAB's fft command computes the DFT of a vector x assuming that the first sample occurs at time n = 0. Given that X = fft(x) has already been computed, derive a method to correct X to reflect an arbitrary starting time ...

As the example of copacobana 105 shows key-search machines

As the example of COPACOBANA [105] shows, key-search machines need not be prohibitive from a monetary point of view. We now consider a simple bruteforce attack on DES which runs on COPACOBANA. 1. Compute the runtime of a ...

1 how did cgi revolutionize web programming2 what are the

1. How did CGI revolutionize Web programming? 2. What are the differences between client-side and server-side scripting? Is one better than the other? 3. In terms of security, is client-side scripting better than server- ...

1 we say that a router in dvmrp creates a shortest-path

1. We say that a router in DVMRP creates a shortest-path tree on demand. What is the meaning of this statement? What is the advantage of creating shortest path trees only on demand? 2. Does RPF actually create a shortest ...

1 assuming that the l1 hit time determines the cycle times

1. Assuming that the L1 hit time determines the cycle times for P1 and P2, what are their respective clock rates? 2. What is the Average Memory Access Time for P1 and P2? 3. Assuming a base CPI of 1.0 without any memory ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro