Calculate the data rate required for robot

Assignment Help Computer Networking
Reference no: EM132187107

Wireless Networks and Communication Assignment -

Part I: Encoding and error control

Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).

a) Calculate the data rate required for robot to remote controller communication.

b) Explain 3 types of suitable encoding techniques could be used to encode the status string.

c) At a certain instance, the sensors provided data as acceleration 5 m/s2, obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%.

i. Write the status string in binary for this instance.

ii. Represent the status string on ASK, FSK, and PSK encoding techniques.

d) Calculate the CRC for the status string derived in c) with polynomial divisor 11001101.

e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control.

Part II: Multiplexing and multiple access

Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.

a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams.

b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM.

c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.

i. For 48 subscribers what should be the subcarrier bandwidth (fb)?

ii. Propose a suitable subcarrier bit time of T to achieve orthogonality?

iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)?

Part III: Wi-Fi

Prime Living is a real estate company based in Victoria and you work form them as a consultant network engineer. The company has decided to open a new office in South Eastern suburbs and the floor plan of the building is shown below. The office consists of 5 rooms and on average 8 employees work at each room. The lounge is used by both staff and customers and on average about 25 devices connect to Wi-Fi. The clients wants you to design the network for them with at least 100 Mbps data rate for all wireless connections. As resources you've got one distribution system and few access points of 10 m range.

1978_figure.png

a) Design the network specifying the locations of access points and distributions system showing the backbone network.

b) Calculate the BSS and ESS sizes

c) Calculate the throughput for the DS.

d) Recommend a suitable IEEE substandard for the network and give reasons for your choice.

e) Recommend suitable security strategies for the network.

Reference no: EM132187107

Questions Cloud

What is the purpose of the visual : What are your most important considerations when you are composing a data visualization. List at least 3 considerations.
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
Ship goods as pallets instead of loose cartons : Why is it better to ship goods as pallets instead of loose cartons? Why are LCL lead times longer than FCL lead times?
Ethics sustainability and csr-mba : Julia F is the chief legal officer of a large European pharmaceutical company with worldwide interests and a high reputation. She has been asked to investigate
Calculate the data rate required for robot : MITS5003 Wireless Networks and Communication Assignment, Victorian Institute of Technology, Australia. Calculate the data rate required for robot
Which can lead to three-pronged advancement : The strategic goal is to help Maruti improve its skilled work force which can lead to a three-pronged advancement.
Create unadjusted trial balance from the ledger : Create unadjusted trial balance from the ledger. Prepare closing entries, remembering to close Income summary to Retained earnings.
Should the ciso be assessing hr policies : Should the CISO (Iris) be assessing HR policies? Why or why not?
What is the process of voluntary administration : BULAW2611 Organisations Law - What is voluntary administration? What is the process for appointing a voluntary administrator

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the differences between the database administrator

write a 200- to 300-word short-answer response for the followingdescribe the differences between a database

  What is the missing subnet id

What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID  order? What is the range of IP addresses that may be used for hosts on SUB3?

  Determine the cardinality of the relationships

MN405 - Data and Information Management - Managing Data in Databases - a. Model organisational information requirements using conceptual data modelling

  Assignment - design a detailed network in netsim

MN503 - Network design with configuration - Overview of Internetworking - Implement a process to support the administration and management of internetworking

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Provide examples of when each tools would be appropriate

The Discussion Board (DB) is part of the core of online learning. Discuss the pros and cons of each Provide examples of when each tools would be appropriate.

  Devise a naming scheme that tolerates changes

Devise a naming scheme that tolerates changes to the naming hierarchy. As an example, consider two large companies that each have an independent naming.

  Compare and contrast ipsec tunnel and ipsec transfer mode

What is a certificate authority? How does PGP differ from SSL? How does SSL differ from IPSec?- Compare and contrast IPSec tunnel mode and IPSec transfer mode.

  Task 1 write java or cc udp programs allowing two parties

task 1 write java or cc udp programs allowing two parties to establish a secure communication channel. for simplicity

  Ethernet has been broadly deployed around the world in

ethernet has been widely deployed around the world in local area networks lan until now. native ethernet packet data

  Based on the article by semeilogy et al 2007 why have some

based on the article by semeilogy et al. 2007 why have some researchers recommended redesigning the ethernet networking

  Write a java application that allows the user to read

Write a java  application that  allows  the user  to  read,  validate, store,  display,  sort and search  the account number and balance for N bank customers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd