Pcm encoder, Computer Network Security

Assignment Help:

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The resulting bit stream is then fed into a modem and the modulated signal is sent via a leased line across a PSTN to the monitoring room a few kilometres away as shown below: 

1648_PCM encoder.png

(a) Assuming that the sensor operates in the range or 900 °C to 1412°C which corresponds to +0 V and +1 V output respectively and has an operational bandwidth of 1,000 Hz. If the monitoring room wants to detect 32°C unit change in temperature of the furnace.

Calculate how many quantization levels are needed in the PCM encoder?

(b) What will be the minimum sampling rate needed to fully characterize the sensor signal?

(c) Hence, deduce the maximum bit-rate of this PCM set-up, assuming noiseless and error less conditions.

(d) Assume the modem uses 4-PSK modulation on a noiseless leased line with a bandwidth of 2000 Hz, deduce the Nyquist maximum data rate in bits per second.

(e) Assume that the leased line has a SNR of 9 dB, what is the  maximum bit-rate achievable to the nearest bit?

(f) Assume in real-life, the data rate through the leased line is 5555 bps with a minimum bit error rate of 10-6. Deduce the minimum received signal strength in dBW that is required assuming a  transmission media temperature of 25 °C. (Boltzmann's Constant k = 1.3803 X 10-23J/°K)


Related Discussions:- Pcm encoder

Describe des encryption, (a) Describe DES encryption with a block diagram a...

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

Broadband Technology, In 10 or more pages, address the following topics (be...

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Estimate the average throughput, Question (a) Estimate the average thr...

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Hybrid cryptography systems-cryptography, Hybrid Cryptography Systems Th...

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Describe privacy-protecting techniques, Question: a) What do you meant...

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

TCP / IP, Let me know the details of protocol tcp/ip

Let me know the details of protocol tcp/ip

Documenting the results of risk assessment, Documenting the Results of Risk...

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

Security goals, what is relation ship between computer security goals?

what is relation ship between computer security goals?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd