Calculate the minimum sampling rate, Computer Network Security

Assignment Help:

QUESTION

An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send a signal to a base station found on the mainland via a communication satellite as shown in Fig. 1. The effective range of the sensor is between 1 to 32 degrees Celsius with an operating bandwidth of 50 Hz. The transmitter converts the analogue sensor signal into a digital data stream using a PCM codec. The digital data stream is shift-keyed and then transmitted as an 16-FSK microwave signal with a carrier frequency at 1 GHz and frequency separation Δfc of 10 MHz.

9_Calculate the minimum sampling rate.png

(a) Calculate the minimum sampling rate needed to fully characterize the analog sensor signal?

(b) Calculate the number of quantization levels configured in the PCM codec if we wish to detect 2 degrees Celsius changes in temperature.

(c) Calculate the bit rate in bps and the quantization error in dB of this PCM codec?

(d) Calculate the maximum signalling rate and data rate achievable using 16-FSK? 

(e) Calculate the bandwidth available for the microwave uplink?

(f) Calculate the maximum allowable SNRdB of the uplink if the data rate has to be a minimum of 350 Mbps?

(g) Now suppose that the above uplink becomes error-prone as well, what is the minimum signal power in dBW that is needed to sustain a data rate of 300 Mbps with a BER of 10-5 at 20 degrees Celsius?

2286_Calculate the minimum sampling rate1.png


Related Discussions:- Calculate the minimum sampling rate

Half-duplex and full-duplex mode of transmission, Question: a. State br...

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Develop a completely secure wsn based on the triple key, Q. Develop a compl...

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

Trap and trace systems-information security, TRAP AND TRACE SYSTEMS Trap...

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Ip datagrams, on LAN,where are IP datagrams transported?

on LAN,where are IP datagrams transported?

Ipv6 datagram format, IPV6 DATAGRAM FORMAT It is given in the figure b...

IPV6 DATAGRAM FORMAT It is given in the figure below:

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Attacks on wireless network, Q. Attacks on wireless network WSN are vul...

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Application-based ids, Application-Based IDS Application-based IDS (AppI...

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Discuss five alternative testing techniques, QUESTION Testing of a Busi...

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd