Professional Documents
Culture Documents
Answer:Spectral Efficiency, Spectrum Efficiency or Bandwidth Efficiency Refers To
Answer:Spectral Efficiency, Spectrum Efficiency or Bandwidth Efficiency Refers To
Answer:Spectral Efficiency, Spectrum Efficiency or Bandwidth Efficiency Refers To
ASSIGNMENT:
Answer: It can be defined as the effective and useful use of every Hertz of frequency available
for communication. In radio communication, bandwidth efficiency is essential as the available
spectrum for communication is very limited. Bandwidth efficiency can be increased through
spectral efficiency (by increasing the number of bits per hertz).
3. Explain the relationship between bits per second and baud for an 8-PSK system.
Answer: The relationship between the minimum bandwidth required in a 8-PSK system is
j u s t e q u a l t o on e t h i rd of t h e b it r a t e s in c e e a c h o u t p u t in f o rm a ti on s ig n a l
transmitted already contains three bits or a tribit of information from the input of the 8-PSK
system.
Answer:
a. 2bps/Hz
b. 3bps/Hz
c. 4bps/Hz
Answer:
a. 2bps/Hz
b. 3bps/Hz
c. 4bps/ Hz
ACTIVITY NO. 2
ASSIGNMENT:
Answer: A carrier recovery system is a circuit used to estimate and compensate for frequency
and phase differences between a received signal's carrier wave and the receiver's local oscillator
for the purpose of coherent demodulation.
Answer: carrier recovery Is essential to recover the frequency and phase information of the
transmitted signal. To illustrate the importance of carrier recovery, we first show a constellation
plot of a signal in which the frequency has not been properly been estimated.
Answer: A Costas loop is a phase-locked loop (PLL) based circuit which is used for carrier
frequency recovery from suppressed-carrier modulation signals (e.g. double-sideband
suppressed carrier signals) and phase modulation signals (e.g. BPSK, QPSK). It was invented by
John P. Costas at General Electric in the 1950s.
Answer: The nonlinear operation is performed by a square-law device, that is, a frequency
doubler circuit.
5. What is remodulator?
Answer: A circuit that converts amplitude modulation to audio frequencyshift modulation for
transmission of facsimile signals over a voice-frequency radio channel. Also known as converter.
ACTIVITY NO. 3
ASSIGNMENT:
Answer: Bit rate does not necessarily equal frequency. They match closely for some systems; for
others, the disparity is great. What, then, is the relationship among frequency, hertz, cycles and
bits?The bit, or binary digit, is the smallest piece of information that can be processed by a
computer. In many systems, such as the American Standard Code for Information Interchange, it
can take 8 bits, or 1 byte, to make one character--a letter, numeral or symbol. A bit is either a 1
or 0, a "yes" or "no," or an "on" or "off."The frequency of a signal voltage is measured in cycles
per second. One hertz is one complete cycle per second. While higher frequency can mean a
faster system, a truer measurement of communication speed is bit rate.
3. What will happen to the data if it undergo extend period of successive 1’s and 0’s.
Answer:
Backup
Practice good working habits
Use an anti-virus software and keep it updated
Protect against power surges with an UPS
Keep your machine dry in a dry, shaded, dust-free and well-ventilated area
Do not over-tweak your system
Avoid moving your computer or notebook when it is in operation
Safeguard your computer
Practice disk maintenance
Pre-empt failure
Do not listen to tell-tale technique
5. Why do you think we need to use X-OR as the logic symbol for for this circuit design and not
other logic circuit symbol?
Answer: XOR gate is a digital logic gate that gives a true (1 or HIGH) output when the number of
true inputs is odd. An XOR gate implements an exclusive or; that is, a true output results if one,
and only one, of the inputs to the gate is true. If both inputs are false (0/LOW) or both are true,
a false output results. XOR represents the inequality function, i.e., the output is true if the inputs
are not alike otherwise the output is false. A way to remember XOR is "must have one or the
other but not both". XOR can also be viewed as addition modulo 2. As a result, XOR gates are
used to implement binary addition in computers. A half adder consists of an XOR gate and
an AND gate. Other uses include subtractors, comparators, and controlled inverters.
ACTIVITY NO. 4
1. How does DPSK able to know the condition of the data sent?
Answer: phase modulation used to transmit data by altering the carrier wave’s phase. In this,
the modulated signal’s phase is moved e to the element of an earlier signal. The phase of the
signal tracks the low or high state of the earlier element. This kind of phase-shift keying doesn’t
require a synchronous carrier on the demodulator.
Answer: The DPSK stands for “Differential phase-shift keying”. It is one type of phase
modulation used to transmit data by altering the carrier wave’s phase. In this, the modulated
signal’s phase is moved e to the element of an earlier signal. The phase of the signal tracks the
low or high state of the earlier element. This kind of phase-shift keying doesn’t require a
synchronous carrier on the demodulator.
The binary bits input series can be changed so that the next bit depends upon the earlier bit. So,
the earlier received bits in the receiver are utilized for detecting the current bit.
Answer:
ACTIVITY NO. 5
ASSIGNMENT:
Answer: Trellis coded modulation allows the achievement of significant coding gains over
conventional un-coded multilevel modulation without compromising bandwidth efficiency. TCM
schemes employ redundant non-binary modulation in combination with finite-state encoder
which controls the selection of modulation signals to generate coded signal sequences.
Answer: A character set is a list of characters whereas an encoding scheme is how they are
represented in binary. This is best seen with Unicode. The encoding schemes UTF-8, UTF-16 and
UTF-32 use the Unicode character set but encode the characters differently. TRELLIS ENCODING
in telecommunication, trellis modulation (also known as trellis coded modulation, or simply
TCM) is a modulation scheme that transmits information with high efficiency over band-limited
channels such as telephone lines.
5. Compute Data Rate of 26 kbps through 3200 Hz Bandwidth. Apply Trellis Code of Modulation.
ACTIVITY NO. 6
ASSIGNMENT:
1. What is the relation between Probability or error P(e) and Bit error rate (BER)?
Answer: In digital transmission, the number of bit errors is the number of received bits of a data
stream over a communication channel that have been altered due
to noise, interference, distortion or bit synchronization errors.The bit error rate (BER) is the
number of bit errors per unit time. The bit error ratio (also BER) is the number of bit errors
divided by the total number of transferred bits during a studied time interval. Bit error ratio is a
unitless performance measure, often expressed as a percentage.[1]The bit error probability pe is
the expectation value of the bit error ratio. The bit error ratio can be considered as an
approximate estimate of the bit error probability. This estimate is accurate for a long time
interval and a high number of bit errors.
Answer:
a. -90dBm
b. -109.2dBm
c. -130.51dBm
d. -168.75dBJ
e. 19.2dB
ACTIVITY NO. 7
ASSIGNMENT:
Answer: the bit error performance for the various digital modulation system is directly relatred
to the distance between points on a signal state-space diagram.
2. What is the relation of the bit error performance for the various multi phase digital modulation
system is the distance between points on a signal state space diagram?
Answer: the phase relationship between signalling elements is the optimum signalling format,
reffered to as antipodal signalling, and occurs only when two binary signal levels are allowed
and when one signal is the exact negative of the other. Becasuse no other bit-by-bit signalling
scheme is any better, antipodal performance is often used as a reference for comparison.
Answer: Antipodal signals it's that signal 180 degree opposite to each other. ... This signal shown
in left, telecommunication used it in digital systems like B-PSK (Binary Phase Shift Keying); the
idea from this signal in telecom receiver to know if we get 0 or we get 1!
Answer: For a large number of signal points QAM outperforms PSK. This is because the
ndistance between signalling points in a PSK system is smalle than the distance between points
in a comparable QAM system. The general expression for the distance between adjacent
signalling points for a QAM system with L levels on each axis is
√2
d= ∗D
L−1
5. What is FSK Error Performance?
Answer: The error probability for FSK system is evatuated in a somewhat different manner
thanPSK AND QAM. There are essentially only two types of FSK system: noncoherent and
coherent. With noncoherent FSK the transmitter and receiver are not frequency or phase
synchronized. With coherent FSK, local receiver reference signals are in frequency and phase
lock with the transmitted signals.
6. Determine the minimum bandwidth required to achieve a P(e) of 10−7 for an 8-PSK system
operating at 10 Mbps with a carrier-to-noise power ratio of 13.5 dB.
ACTIVITY NO. 8
ASSIGNMENT:
1. What is ISO?
Answer: The Institute of Electrical and Electronic Engineers (IEEE) is a global association and
organization of professionals working toward the development, implementation and
maintenance of technology-centered products and services. IEEE is a nonprofit organization
founded in 1963.
IEEE's core purpose is to foster technological innovation and excellence for the benefit of
humanity.
4. Who are the member of ANSI and what is the purpose in the National?
Answer: ANSI's members are government agencies, organizations, academic and international
bodies, and individuals. In total, the Institute represents the interests of more than 270,000
companies and organizations and 30 million professionals worldwide.
ANSI accredits standards that are developed by representatives of other standards
organizations, government agencies, consumer groups, companies, and others. These standards
ensure that the characteristics and performance of products are consistent, that people use the
same definitions and terms, and that products are tested the same way. ANSI also accredits
organizations that carry out product or personnel certification in accordance with requirements
defined in international standards
Answer: 1. The legal one is quite straight forward to ensure that development projects such as a
housing estate, a road/bridge or some such construction project has a minimal impact on the
environment in its entire ‘lifecycle’ – i.e. during design, construction, use, maintenance, and
demolition. Many countries now have laws stipulating that unless an EIA study is carried out
particularly for large infrastructure projects, permission for construction will not be granted by
the local authority.
2. The educational role is equally important to educate everyone involved both professionals
and users. We need to look at all our daily actions as eventually and cumulatively affecting the
environment. This includes our daily choices, where a delicate balance between financial and
environmental considerations needs to be made automatically without thinking.
6. What is the new term for ARPA? and define its purpose.
7. What are IETF and IRTF? Define their purpose in the internet.
Answer: The Internet Research Task Force (IRTF) focuses on longer-term research issues related
to the Internet while the parallel organization, the Internet Engineering Task Force (IETF),
focuses on the shorter term issues of engineering and standards making. The Internet Research
Task Force (IRTF) promotes research of importance to the evolution of the Internet by creating
focused, long-term research groups working on topics related to Internet protocols,
applications, architecture and technology.
ACTIVITY NO. 9
ASSIGNMENT:
1. Logical Addressing
In the internet world, there are two kinds of addressing implemented by the data link layer,
it handles addressing problems locally.
If the network passes through the network boundary, we need another system to
distinguish source and destination systems.
The logical addressing at the network layer while physical addressing at the data link layer is
defined by the MAC address of a device, whereas the IP addressing is determined at the
network layer of the OSI model. This addressing is also called as logical addressing.
The network layer adds a header to the packet which is coming from the upper layer
includes the logical addresses of the sender and receiver.
2. Routing
When two independent networks or links are attached to create an internetwork that is the
network of networks or a large network, the connecting devices route the packets to its
destination.
The forwarding of the data request to servers is known as routing.
The network layer must send data down to the data link layer for transmission. The data or
information that the network layer receives is in the form of a packet and the data that data
link layer forwards is called a frame.
The network layer has the responsibility of Fragmentation and reassembly because some
data link layer technologies have limits on the length of any message that can be sent.
If the packet of data that the network layer has to send is too large, the network layer must
break the packet up, send each packet to the data link layer, and then have pieces
reassembled once they arrive at the network layer on the destination system.
Answer: The features or services of the network are implemented in distinct "layers". For
example, sending ones and zeros across a wire, fiber, etc. is done by the physical layer,
organizing the ones and zeros into chunks of data and getting them safely to the right place on
the wire is done by the data link layer, passing data chunks over multiple connected networks is
done by the network layer and delivery of the data to the right software application at the
destination is done by the transport layer. The significance of this is that the PDU is the
structured information that is passed to a matching protocol layer further along on the data's
journey that allows the layer to deliver its intended function or service. The matching layer, or
"peer", decodes the data to extract the original service data unit, decide if it is error-free and
where to send it next, etc. Unless we have already arrived at the lowest (physical) layer, the PDU
is passed to the peer using services of the next lower layer in the protocol "stack". When the
PDU passes over the interface from the layer that constructed it to the layer that merely delivers
it (and therefore does not understand its internal structure), it becomes a service data unit to
that layer. The addition of addressing and control information (encapsulation) to an SDU to form
a PDU and the passing of that PDU to the next lower layer as an SDU repeats until the lowest
layer is reached and the data passes over some medium as a physical signal.
Answer: Encapsulation is the process of adding information to the application layer data as it is
sent through each model layer. Each time the data passes a layer, a new Protocol Data Unit
(PDU) is created. The data sent from the application layer has added a header with information
on TCP/UDP in the transport layer. Now the data is known as a segment. When that segment
reaches the internet layer, the segment is added a header with IP addresses. Now it is called a
packet. When the packet reaches the network access layer, a header with MAC addresses is
added. Now it is known as a frame. Likewise, in each layer, a corresponding Protocol Data Unit
(PDU) is created. Adding this information in each layer is known as Encapsulation. When the
encapsulation process is completed, the frame is sent to the network.
Decapsulation
As explained in the encapsulation process, the frame goes out of the host computer to the
network. Then it reaches the destination host. In the destination host, the frame is decapsulated
in the reverse order till the application layer. The frame which reaches the network access layer
contains the data, TCP/UDP header, header with IP addresses and header with MAC addresses.
ACTIVITY NO. 10
ASSIGNMENT:
2. What are the different layer of OSI and their name and its function?
Physical Layer- The physical layer helps you to define the electrical and physical
specifications of the data connection. This level establishes the relationship
between a device and a physical transmission medium. The physical layer is not
concerned with protocols or other such higher-layer items.
Data Link Layer- Data link layer corrects errors which can occur at the physical layer.
The layer allows you to define the protocol to establish and terminates a connection
between two connected network devices.
1. Media Access Control (MAC) layer- It is responsible for controlling how device in a
network gain access to medium and permits to transmit data.
2. Logical link control layer- This layer is responsible for identity and encapsulating
network-layer protocols and allows you to find the error.
Framing which divides the data from Network layer into frames.
Allows you to add header to the frame to define the physical address of the source
and the destination machine
Adds Logical addresses of the sender and receivers
It is also responsible for the sourcing process to the destination process delivery of
the entire message.
It also offers a system for error control in which it detects retransmits damage or
lost frames.
Datalink layer also provides a mechanism to transmit data over independent
networks which are linked together.
Transport Layer - The transport layer builds on the network layer to provide data
transport from a process on a source machine to a process on a destination
machine. It is hosted using single or multiple networks, and also maintains the
quality of service functions.
It divides the message received from the session layer into segments and numbers
them to make a sequence.
Transport layer makes sure that the message is delivered to the correct process on
the destination machine.
It also makes sure that the entire message arrives without any error else it should be
retransmitted.
Network Layer - The network layer provides the functional and procedural means of
transferring variable length data sequences from one node to another connected in
"different networks".
Message delivery at the network layer does not give any guaranteed to be reliable
network layer protocol.
1. routing protocols
2. multicast group management
3. network-layer address assignment.
Session Layer controls the dialogues between computers. It helps you to establish
starting and terminating the connections between the local and remote application.
Presentation Layer - Presentation layer allows you to define the form in which the
data is to exchange between the two communicating entities. It also helps you to
handles data compression and data encryption.
This layer transforms data into the form which is accepted by the application. It also
formats and encrypts data which should be sent across all the networks. This layer is
also known as a syntax layer.
Example of the application layer is an application such as file transfer, email, remote
login, etc.
The function of the Application Layers are:
3. Define what is transmission medium such as simplex, duplex and full duplex?
Answer:
Simplex-In simplex transmission mode, the communication between sender and receiver occurs
in only one direction. The sender can only send the data, and the receiver can only receive the
data. The receiver cannot reply to the sender. Simplex transmission can be thought of as a one-
way road in which the traffic travels only in one direction—no vehicle coming from the opposite
direction is allowed to drive through.
Half Duplex-The communication between sender and receiver occurs in both directions in half
duplex transmission, but only one at a time. The sender and receiver can both send and receive
the information, but only one is allowed to send at any given time. Half duplex is still considered
a one-way road, in which a vehicle traveling in the opposite direction of the traffic has to wait till
the road is empty before it can pass through.
Full Duplex-In full duplex transmission mode, the communication between sender and receiver
can occur simultaneously. The sender and receiver can both transmit and receive at the same
time. Full duplex transmission mode is like a two-way road, in which traffic can flow in both
directions at the same time.
ACTIVITY NO. 11
ASSIGNMENT:
Answer: a station is a device that has the capability to use the 802.11 protocol. For example, a
station may be a laptop, a desktop PC, PDA, access point or Wi-Fi phone. An STA may be fixed,
mobile or portable. Generally in wireless networking terminology, a station, wireless client
and node are often used interchangeably, with no strict distinction existing between these
terms. A station may also be referred to as a transmitter or receiver based on its transmission
characteristics. IEEE 802.11-2007 formally defines station as: Any device that contains an IEEE
802.11-conformant media access control (MAC) and physical layer (PHY) interface to the
wireless medium (WM). In telecommunications networks, a node is either a redistribution point
or a communication endpoint. The definition of a node depends on the network and protocol
layer referred to. A physical network node is an electronic device that is attached to a network,
and is capable of creating, receiving, or transmitting information over a communications
channel.[1] A passive distribution point such as a distribution frame or patch panel is
consequently not a node.
3. List and briefly describe the basic function of the five components of a data communication
circuit.
Answer:
The five components are :
2. Sender - It is the device which sends the data messages. It can be a computer, workstation,
telephone handset etc.
3. Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.
4. Transmission Medium - It is the physical path by which a message travels from sender to
receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.