Analogue to digital conversion and source coding

Assignment Help Computer Network Security
Reference no: EM132205100

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.
ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.
ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Assessment - Analyzing Digital Communications Principles & Systems Both Manually and Using MATLAB/Simulink

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.

ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.

ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Objectives of the assignment:

This assignment seeks to fulfill the unit's learning outcomes b-e stated on Page 1 of this document and found in the unit description. The assignment

Question 1: ISI and Design of Equalizers

Combating inter-symbol interference (ISI) is one of the challenges in digital communications systems. Assume that the impulse response of the transmission medium between the transmitter and the receiver is p(t). The sampled impulse response is p[n], where n=t/T and T is the sampling period (or symbol duration). Then, ISI-free transmission require that

p(t) = δ(t) = { 1, t=0

                  { 0, otherwise   δ(t)

where is referred to as dirac impulse function. In practical, situations the transmission medium is not ISI-free. This is the reason why we need equalizing filters. Assume that the sampled impulse response of the channel is

p[n]= δ [n] - 0.2δ [n -1] + 0.5δ [n - 2]

(a) Derive the expression for the transfer function of the 3-tap linear equalizer which forces the ISI caused by this transmission medium to zero.
(b) Derive the expression for the impulse response of the 3-tap ZF-LE designed in Part (a).
(c) Verify that the ZF-LE that you have designed in Parts (a) and (b) actually mitigates the ISI in the channel.
(d) Does the ZF-LE cancel the entire ISI in the system? If not, how can you improve the ability of the ZF-LE to suppress the ISI?

Question 2: Digitization of signals

Consider the analog signal s(t ) = 5sin(500t + Π/5)+ cos(200t + Π/4) to be transferred over a digital communications system.

(a) Compute the maximum allowable sampling period that the analog-to-digital converter (ADC) must use to ensure the perfect reconstruction of the signal at the receiver.

(b) What theorem governs the choice made in part (a)?
(c) How many samples of the analog signal do we need to store in order to reproduce 10Π seconds of it (i.e., the analog signal)?
(d) Use MATLAB code to verify whether or not the samples collected can be used to uniquely reproduce the analog signal.

Question 3: Digital Baseband Data Generation and Transmission

We seek to transmit the message ME502 Unit using baseband digital M-ary PAM signaling, where M=16. As the transmission system is not ideal, we need to protect the bits using just a single-bit odd parity encoding for error detection. The process is that we convert each of the characters in the message into its equivalent 8-bit ASCII code, then partition the bitstream into log2(16)-bit segments streams (called symbols), then use each symbol to modulate a pulse to form the M-PAM signal prior to transmission.

(a) Encode the message into a series of bits using 8-bit ASCII encoding (including the odd- parity bit). Counting from the left side, the eighth bit in each character is the parity coding bit.

(b) How many bits in total are in the message?

(c) Divide the bit string into m= log2(16)-bit segments. Each of the m-bit segment is a symbol of 16-PAM. How many symbols do you get altogether?

(d) Evaluate the gross bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds.

(e) Determine the effective bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds

(f) Draw the signal constellation diagram of the M-PAM system, using d as a parameter.

Verified Expert

In this work we have designed expression for 3 tap linear equalizer for the discrete impulse response equation and analyzed whether the system has reduced inter symbol interference or not.Then wrote the matlab program to transmit and reproduce the analog signal over the digital communication medium. Finally ASCII to binary conversion is computed, for that constellation diagram is drawn.

Reference no: EM132205100

Questions Cloud

Vital to the success of every business organization : Why do you think communication is vital to the success of every business organization. Explain briefly.
Quality management will teach us the theories : 'Quality Management' will teach us the theories behind how and why organizations have to ensure their products and services remain consistent.
Consider that you are the buyer evaluating supplier : Consider that you are the buyer evaluating a supplier. Briefly explain the product and service provided.
Benefit of using models in decision making : Which of the following is not a benefit of using models in decision making? The responsibilities of the operations manager include.
Analogue to digital conversion and source coding : ME502 - Digital Communications - How many samples of the analog signal do we need to store in order to reproduce 10? seconds of it (i.e., the analog signal)
Part of your responsibilities is workers compensation : You currently work in Human Resources as the Benefits Manager and part of your responsibilities is Workers’ Compensation.
Any legitimate place in company human resource policies : Does genetic testing have any legitimate place in a company’s human resource policies today?
What your authors means by firm having market orientation : Explain what your authors means by a firm having a market orientation. Give a specific example of a firm and its product (s) that exhibit a market orientation.
Identification of the ethical issues : The analysis should include the following: Identification of the ethical issues involved (what was the alleged ethical wrong done, and why is/was it wrong?)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define the vulnerability assessment requirement

Define the vulnerability assessment requirement, propose a solution, and justify the solution. Define the risk management requirement, propose a solution.

  What is the mutual information of the source and receiver

A source X sends 0's and 1's with probabilities π and 1-π, respectively, to a receiver Y. - What is the mutual information of the source and receiver?

  Describe any risks or threats mitigated by using firewall

Install an application-based firewall on a personal workstation. In one paragraph, describe the name and version of the firewall installed and its core features. In a second paragraph, describe any risks or threats mitigated by using this firewall..

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  Provide a report - an industry perspective of cyber security

Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the interesting aspects that you are going to be covering in more detail  in your ..

  Design a book publisher database from scratch

You will need to design a Book Publisher Database from scratch, create the database,create the relationships between the three tables, enter the given data into the appropriate tables and then query the database in order to provide required inform..

  Why do many in the computer community oppose

Why do many in the computer community oppose the use of "hacker" to describe cybercriminals - What kind of hacking can be justified on either legal or ethical grounds?

  What is cybersecurity attack and how can we defeat hackers

What is Cybersecurity Attack? How does creating better login password's help our identity? How can we defeat hackers? What is IT Networks? How can our devices be hacked?

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  Create a comprehensive security policy for the company

Create a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.

  Hack unauthorized drones using flyver sdk

DEVELOP AN APPLICATION THAT HELPS TO HACK UNAUTHORIZED DRONES USING Flyver SDK

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd