Compute the entropy of the source, Computer Networking

Assignment Help:

A statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network. Part of the file content is as follows:


Using the Shannon - Fano algorithm compute the following:

i) the average number of bits per codeword

ii) the entropy of the source

iii) the minimum number of bits required assuming fixed-length codeword

iv) the compression ratio based on this algorithm if we assume an ASCII of 8 bits representation.

Support your answers with a Shannon tree and show necessary calculations for each part of the question.

Related Discussions:- Compute the entropy of the source

Disadvantage of vpns - point to point , Disadvantage of VPNs The disad...

Disadvantage of VPNs The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability. a.Implementation  can be time consuming: Im

Bridge - network layer and routing , Bridge A bridge  operation sin bo...

Bridge A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  int

Cost involved in inter-processor communication, Cost Involved in Inter-Proc...

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

How can data to be exchanged between networks, Q. How can data to be exchan...

Q. How can data to be exchanged between Networks? Internetwork Links in an internetwork

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

What is the structure of ip multicast address, Question : (a) Several ...

Question : (a) Several techniques are now available for users to connect to the Internet. (i) A modem is commonly used to dial up to the Internet. Why is a modem needed fo

describe the mips instructions - computer architecture, 1.  Detail for eac...

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

Explain the term instruction pipelines, Instruction Pipelines The strea...

Instruction Pipelines The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. T

Define ring topology, Q. Define Ring Topology?  Dedicated point-to-poi...

Q. Define Ring Topology?  Dedicated point-to-point arrangement to neighbours  Signal is conceded from device to device until it reaches destination  Every device functio

Write Your Message!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd