Calculate the minimum sampling rate, Computer Network Security

Assignment Help:

QUESTION

An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send a signal to a base station found on the mainland via a communication satellite as shown in Fig. 1. The effective range of the sensor is between 1 to 32 degrees Celsius with an operating bandwidth of 50 Hz. The transmitter converts the analogue sensor signal into a digital data stream using a PCM codec. The digital data stream is shift-keyed and then transmitted as an 16-FSK microwave signal with a carrier frequency at 1 GHz and frequency separation Δfc of 10 MHz.

9_Calculate the minimum sampling rate.png

(a) Calculate the minimum sampling rate needed to fully characterize the analog sensor signal?

(b) Calculate the number of quantization levels configured in the PCM codec if we wish to detect 2 degrees Celsius changes in temperature.

(c) Calculate the bit rate in bps and the quantization error in dB of this PCM codec?

(d) Calculate the maximum signalling rate and data rate achievable using 16-FSK? 

(e) Calculate the bandwidth available for the microwave uplink?

(f) Calculate the maximum allowable SNRdB of the uplink if the data rate has to be a minimum of 350 Mbps?

(g) Now suppose that the above uplink becomes error-prone as well, what is the minimum signal power in dBW that is needed to sustain a data rate of 300 Mbps with a BER of 10-5 at 20 degrees Celsius?

2286_Calculate the minimum sampling rate1.png


Related Discussions:- Calculate the minimum sampling rate

Vulnerability identification-risk management, Vulnerability Identification ...

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Looking for data network security assignment, I am ryan, i am looking for d...

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

Extended euclidean algorithm, (a) Using the extended Euclidean algorithm, ...

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Using icmp reachability, USING ICMP TO TEST REACHABILITY:  ICMP can a...

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Configure a router from command line interface, QUESTION (a) Describe ...

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Nstissc security model, NSTISSC SECURITY MODEL The NSTISSC Security Model ...

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd