What is the hamming distance of your dictionary

Assignment Help Computer Engineering
Reference no: EM131571242

Question 1. Let D be the bitstream received by the DLC layer from the IP layer. The bitstream D maps to the equivalent polynomial D(x) and vice versa; D ↔ D(x). Also, let G(x) be the generator polynomial of a CRC code and G its equivalent bit-domain representation; G ↔ G(x).

Suppose G(x) = x4 + x3 + x2 + 1 and D = 1000001

(a) Find G.

(b) Find D(x).

(c) Let β be the degree of G(x). What is β?

(d) Let A(x) = D(x) xβ . Find A(x).

(e) Let A be the bit-domain representation of A(x). What is A?

(f) Let Q(x) be the quotient when A(x) is divided by G(x) modulo 2 and R(x) the remainder. Find Q(x) and R(x).

(g) Let Q and R be the equivalent bit-domain representations of Q(x) and R(x) re- spectively. Find Q and R.

(h) Let P (x) = A(x) g R(x), where ‘g' denotes subtraction using modulo 2 arithmetic. Find P (x).

(i) Let P be the bit domain representation of P (x). This is the transmitted frame after error control coding. What is P ?

(j) Find an example of an error pattern (i.e., instead of receiving P , the receiver receives the bitstream P t) which would go undetected. Also explain in detail why that error pattern will go undetected.

Question 2. A 6-bit checksum is to be appended to the following sequence of four 6-bit words [110110, 100011, 000100, 101010, checksum].

(a) Write down the checksum (in binary form).

(b) Suppose the channel flips the 13th and 16th bits of the transmitted frame (i.e., the first and fourth bits of the third 6-bit word). Will the receiver be able to detect this error? Explain your answer.

(c) Suppose the channel flips the 20th, 21st, 22nd, 26th, 27th and 28th bits of the trans- mitted frame (i.e., the 2nd, 3rd and 4th bits of the fourth and fifth words). Will the receiver be able to detect this error? Explain your answer.

(d) Suppose the channel flips the first bit of the transmitted frame. Will the receiver be able to correct this error? Provide proper explanation if your answer is yes. If your answer is no, you can provide a counterexample to prove your point. Of course, you can assume that the receiver does not know how many errors the channel made.

Question 3. Suppose the English alphabet only con- tained the characters a, e, i, o, and u. All possible messages can use only these 5 characters. You want to map each of these characters to 4-bit codewords (there's no parity check bit) such that the Hamming Distance of the dictionary is max- imized (i.e, you want to separate out these three characters in bit space as much as possible).

(a) How would you map the five alphabets to 4-bit codewords such that the Hamming Distance of the dictionary is maximized (i.e, you want to separate out the five characters in Hamming distance space as much as possible)?

(b) What is the Hamming Distance of your dictionary?

(c) How many total characters can you have in your dictionary (properly mapped to codewords) so that you could correct 2-bit errors, assuming that each character is still represented by 4 bits?

Question 4. A (tx, rx) pair is using Go-back N protocol at the DLC layer with N = 4. The transmitter has only four data frames to send to the receiver, starting with frame number 0. The figure below shows certain events. The lightning bolt symbol denotes a frame error and the cross symbol denotes a lost frame. ACK's are cumulative and implicit.

1578_Figure.jpg

(a) Fill in the data frame numbers (i.e., from tx to rx).

(b) Fill in the ACK numbers (i.e., from rx to tx)

(c) The timeline starts from t = 0, as shown. Fill in the missing time instant values at the transmitter (indicated by ‘?') assuming that each data frame is 1 Kb and the link data rate is 2 Kbps.

(d) For each of the ‘t' values, write down the window at the transmitter (indicated by [ ])

(e) Explain what's going on at the tx in time zones 1 and 2. Why is the tx behaving as it is during these time zones?

Question 5. Suppose node A sends a message which is split up into four frames to node B, where each frame is ten bytes long. Assume that the probability that the channel flips any bit, independently of others, is 0.001.

(a) Compute the probability that any frame is received correctly by node B.

(b) Compute the probability that the message is received correctly by node B.

(c) What is the probability that the last three bits in the first frame sent by node A are in error?

(d) What is the probability that the last three bits in the last frame sent by node A are in error?

(e) What is the probability that any three bits in the first frame sent by node A are in error?

(f) What is the probability that any three bits in the last frame sent by node A are in error?

(g) Suppose node B has no error correction capability. For even a single bit error, it requests a retransmit from node A. Based on your answer in part (b), how many frames do you think node A will need to transmit, on an average, before the message gets through correctly?

(h) Find the probability that the last two frames sent by node A are in error.

(i) Find the probability that any two frames sent by node A are in error.

Reference no: EM131571242

Questions Cloud

Report on the results of your interview : Report on the results of your interview. What surprised you with regard to your interviewee's responsibilities?
Biggest challenges facing larger corporations expanding : What do you think are some of the biggest challenges facing larger corporations expanding into foreign markets with regards to segmentation, targeting.
What is the company cost of goods sold : A company starts operations on October 1, What is the company's cost of goods sold if a periodic LIFO system is used
Use black scholes approach to value the option : A golf course currently produces net cash inflows of $1m per year with a required return of 30%. Use a Black Scholes approach to value the option.
What is the hamming distance of your dictionary : What is the Hamming Distance of your dictionary - Compute the probability that the message is received correctly by node
Examine the process of policy argument development : Examine the process of policy argument development. Use technology and information resources to research issues in policy analysis and program evaluation.
Discuss the properties of the net futa and suta : Peroni Company paid wages of $165,400 this year. Of this amount, $116,800 was taxable for net FUTA and SUTA purposes. The state's contribution tax rate is 3.1%.
Replacing the older policy with policy : John, age 52, is overweight, smokes and had mild heart attack five years ago. What factors should John consider before replacing the older policy with policy?
What are the appropriate accounting entries to record issue : What are the appropriate accounting entries to record the issue of the convertible notes and first payment of interest in accordance with relevant accounting

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a program to read this list of prices

Wrtie down a program to read this list of prices and the sales table and calculate total dollar sales for each salesperson and the total dollar sales for all salespersons.

  Describe how a computer and information systems manager

describe how a computer and information systems manager could effectively manage in a virtual environment based on

  Security policies for windows and linux user accounts

State some of the security policies for both the Windows and the Linux user accounts you may describe to protect against someone learning the administrator passwords.

  Design the function "count" which takes a list of items

design the function "count" which takes a list of items and an item as arguments, and returns the number of times the item occurs in the list.

  Define the cost of ownership of the mobile application

Define the cost of ownership of the mobile application. Define the benefits of ownership of the mobile application. Predict the return on investment (ROI) of the mobile application and your suggested alternatives.

  Write the matlab code for implementing the four-psk

Write the MATLAB code for implementing the 4-PSK, eight-state trellis code shown in Figure.

  Create class to representing and manipulating sparse matrice

For this program you will have to have a 'set' and 'get' member functions (see 'sarray.h' below) these SHOULD NOT BE called by any of the operator member functions.

  Why are the all ones and all zeroes subnets not used

Subnet the class C network addresses 198.67.25.0 into eight subnets. Why are the 'all ones' and 'all zeroes' subnets not used?

  Describe the process of evaluating the best dbms product

Describe the process of evaluating and selecting the best DBMS product. List examples of the requirements and features you used and justify any assumptions you make.

  What constitutes a well-maintained system

What constitutes a well-maintained system, in terms of function utility, and reliability and how does the truly effective SysAdmin ensure success?

  Find a critical race-free assignment

Find a critical race-free assignment for the following reduced table by each of the three state assignment methods.

  Breach of security

A company has the resource XYZ. If there exist a breach of security, company may face a fine of $100,000 and pay other $20,000 in order to clean up the breach.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd