Pcm encoder, Computer Network Security

Assignment Help:

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The resulting bit stream is then fed into a modem and the modulated signal is sent via a leased line across a PSTN to the monitoring room a few kilometres away as shown below: 

1648_PCM encoder.png

(a) Assuming that the sensor operates in the range or 900 °C to 1412°C which corresponds to +0 V and +1 V output respectively and has an operational bandwidth of 1,000 Hz. If the monitoring room wants to detect 32°C unit change in temperature of the furnace.

Calculate how many quantization levels are needed in the PCM encoder?

(b) What will be the minimum sampling rate needed to fully characterize the sensor signal?

(c) Hence, deduce the maximum bit-rate of this PCM set-up, assuming noiseless and error less conditions.

(d) Assume the modem uses 4-PSK modulation on a noiseless leased line with a bandwidth of 2000 Hz, deduce the Nyquist maximum data rate in bits per second.

(e) Assume that the leased line has a SNR of 9 dB, what is the  maximum bit-rate achievable to the nearest bit?

(f) Assume in real-life, the data rate through the leased line is 5555 bps with a minimum bit error rate of 10-6. Deduce the minimum received signal strength in dBW that is required assuming a  transmission media temperature of 25 °C. (Boltzmann's Constant k = 1.3803 X 10-23J/°K)


Related Discussions:- Pcm encoder

What are the intermediate systems and how they work, Question: a) Expla...

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

Nessus vulnerability, You see two IP addresses. The IP address 192.168.58.1...

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Imap and pop functions, How does the POP functions? What are the advantages...

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Cost benefit analysis (cba)-information security, Cost Benefit Analysis (CB...

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Md Fayzul karim, How can I get help for Linux automotion configuration (...

How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

Name the various layers of the osi model, Problem (a) Name the various ...

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Location to e-mail messages are saved, In the e-mail system, where the e-ma...

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd