SlideShare a Scribd company logo
1 of 1
Download to read offline
EE 333, Communication Networks
Solutions to Quiz-I (2014-15S)
Maximum Marks = 10 Time=45 minutes
1. Let M be the number of times A has to transmit to deliver the packet to D and let N be the
number of times B has to transmit to deliver the packet to D.
Then 1 1
{ } (1 ) { } (1 )m n
P M m P P P N n P P 
     
Let K be the number of times (both) A and B transmit for the packet to reach D where K=min
(M, N). Therefore,
1 1 2( 1) 2
1
1 2( 1) 2
2( 1) 2 2
2 1 2
{ } 2 (1 ) (1 ) (1 )
2 (1 ) (1 )
[2 2 1 2 ]
( ) (1 )

  
 
 


     
   
    
 
k j k
j k
k k k
k
k
P K k P P P P P P
P P P P P
P P P P P
P P
This is the required distribution.
Note that this could have been derived by simple logical arguments without doing the explicit calculation given
above. I will accept that as a solution if you have clearly given your arguments – even though that is an answer that
can be given in just a few lines!
Using this, E{K}= 2
1
1 P
2. (a) Factoring, one can show that 8 2 7 6 5 4 3 2
1 ( 1)( 1)x x x x x x x x x x          
We assume that 7 6 5 4 3 2
( 1)x x x x x x      is a Primitive Polynomial and will therefore not
divide any 1n
x  for n < 27
-1=127 but will exactly divide 127
1x 
All single errors will be detected (more than one term)
All error patterns with an odd number of errors will be detected (1+x is a factor)
All double errors will be detected if the codeword has less than 127 bits (i.e. 118 bits of data
and 8 check bits) (using the assumption of the other factor being a primitive polynomial)
All burst errors with burst length of 8 or less will be detected.
(b)
Feed in the polynomial to be divided, MSB first. The bits in the shift register after all the bits
have been fed will be remainder.

More Related Content

What's hot

Answers withexplanations
Answers withexplanationsAnswers withexplanations
Answers withexplanationsGopi Saiteja
 
The Complexity Of Primality Testing
The Complexity Of Primality TestingThe Complexity Of Primality Testing
The Complexity Of Primality TestingMohammad Elsheikh
 
Quantum Computation and the Stabilizer Formalism for Error Correction
Quantum Computation and the Stabilizer Formalism for Error CorrectionQuantum Computation and the Stabilizer Formalism for Error Correction
Quantum Computation and the Stabilizer Formalism for Error CorrectionDaniel Bulhosa Solórzano
 
Chapter 06 boolean algebra
Chapter 06 boolean algebraChapter 06 boolean algebra
Chapter 06 boolean algebraIIUI
 
Chapter 06 boolean algebra 2o-p
Chapter 06 boolean algebra 2o-pChapter 06 boolean algebra 2o-p
Chapter 06 boolean algebra 2o-pIIUI
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSAJohn Paul Prassanna
 
An efficient algorithm for the computation of Bernoulli numbers
 An efficient algorithm for the computation of Bernoulli numbers An efficient algorithm for the computation of Bernoulli numbers
An efficient algorithm for the computation of Bernoulli numbersXequeMateShannon
 
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVEChapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVEnszakir
 
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...Association for Computational Linguistics
 

What's hot (19)

Unequal-Cost Prefix-Free Codes
Unequal-Cost Prefix-Free CodesUnequal-Cost Prefix-Free Codes
Unequal-Cost Prefix-Free Codes
 
Quantum Noise and Error Correction
Quantum Noise and Error CorrectionQuantum Noise and Error Correction
Quantum Noise and Error Correction
 
Solution 3.
Solution 3.Solution 3.
Solution 3.
 
Answers withexplanations
Answers withexplanationsAnswers withexplanations
Answers withexplanations
 
The Complexity Of Primality Testing
The Complexity Of Primality TestingThe Complexity Of Primality Testing
The Complexity Of Primality Testing
 
Rsa encryption
Rsa encryptionRsa encryption
Rsa encryption
 
Quantum Computation and the Stabilizer Formalism for Error Correction
Quantum Computation and the Stabilizer Formalism for Error CorrectionQuantum Computation and the Stabilizer Formalism for Error Correction
Quantum Computation and the Stabilizer Formalism for Error Correction
 
Chapter 06 boolean algebra
Chapter 06 boolean algebraChapter 06 boolean algebra
Chapter 06 boolean algebra
 
Chapter 06 boolean algebra 2o-p
Chapter 06 boolean algebra 2o-pChapter 06 boolean algebra 2o-p
Chapter 06 boolean algebra 2o-p
 
1112 ch 11 day 12
1112 ch 11 day 121112 ch 11 day 12
1112 ch 11 day 12
 
Stochastic Processes Homework Help
Stochastic Processes Homework Help Stochastic Processes Homework Help
Stochastic Processes Homework Help
 
Sol80
Sol80Sol80
Sol80
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSA
 
Fskik 1 nota
Fskik 1   notaFskik 1   nota
Fskik 1 nota
 
Approx
ApproxApprox
Approx
 
An efficient algorithm for the computation of Bernoulli numbers
 An efficient algorithm for the computation of Bernoulli numbers An efficient algorithm for the computation of Bernoulli numbers
An efficient algorithm for the computation of Bernoulli numbers
 
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVEChapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
 
Signal Processing Assignment Help
Signal Processing Assignment HelpSignal Processing Assignment Help
Signal Processing Assignment Help
 
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
 

Viewers also liked

Health Informatics In Asia (Gunadarma U)Joko
Health Informatics In Asia (Gunadarma U)JokoHealth Informatics In Asia (Gunadarma U)Joko
Health Informatics In Asia (Gunadarma U)JokoPenggalih Herlambang
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALSyahriha Ruslan
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012Syahriha Ruslan
 
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"SINTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"Sfakz133
 
INTRODUCTION OF PSYCHOLOGY
INTRODUCTION OF PSYCHOLOGYINTRODUCTION OF PSYCHOLOGY
INTRODUCTION OF PSYCHOLOGYSuman Vashist
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2Zafar Ayub
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
Overview of Health Informatics (July 2, 2015)
Overview of Health Informatics (July 2, 2015)Overview of Health Informatics (July 2, 2015)
Overview of Health Informatics (July 2, 2015)Nawanan Theera-Ampornpunt
 
Health informatics: Introduction, History and general presentation
Health informatics: Introduction, History and general presentationHealth informatics: Introduction, History and general presentation
Health informatics: Introduction, History and general presentationDr. Khaled OUANES
 
General physiology lecture 2
General physiology lecture 2General physiology lecture 2
General physiology lecture 2Huang Yu-Wen
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)welcometofacebook
 
Health Informatics - The Big Picture
Health Informatics - The Big PictureHealth Informatics - The Big Picture
Health Informatics - The Big PictureLaeeq uz Zaman
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and networkDhrumil Shah
 

Viewers also liked (20)

Quiz 2-solution
Quiz 2-solutionQuiz 2-solution
Quiz 2-solution
 
Wk2 questions
Wk2 questionsWk2 questions
Wk2 questions
 
Health Informatics In Asia (Gunadarma U)Joko
Health Informatics In Asia (Gunadarma U)JokoHealth Informatics In Asia (Gunadarma U)Joko
Health Informatics In Asia (Gunadarma U)Joko
 
HI 201: Health Informatics
HI 201: Health Informatics HI 201: Health Informatics
HI 201: Health Informatics
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
 
Data Science: Case "Political Communication 2/2"
Data Science: Case "Political Communication 2/2"Data Science: Case "Political Communication 2/2"
Data Science: Case "Political Communication 2/2"
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
 
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"SINTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
 
INTRODUCTION OF PSYCHOLOGY
INTRODUCTION OF PSYCHOLOGYINTRODUCTION OF PSYCHOLOGY
INTRODUCTION OF PSYCHOLOGY
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Data communication & networks
Data communication & networksData communication & networks
Data communication & networks
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Overview of Health Informatics (July 2, 2015)
Overview of Health Informatics (July 2, 2015)Overview of Health Informatics (July 2, 2015)
Overview of Health Informatics (July 2, 2015)
 
Health informatics: Introduction, History and general presentation
Health informatics: Introduction, History and general presentationHealth informatics: Introduction, History and general presentation
Health informatics: Introduction, History and general presentation
 
Health informatics
Health informaticsHealth informatics
Health informatics
 
General physiology lecture 2
General physiology lecture 2General physiology lecture 2
General physiology lecture 2
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)
 
Health Informatics - The Big Picture
Health Informatics - The Big PictureHealth Informatics - The Big Picture
Health Informatics - The Big Picture
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and network
 

Similar to Quiz 1 solution

Similar to Quiz 1 solution (20)

Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hung
 
Analysis Of Algorithms Ii
Analysis Of Algorithms IiAnalysis Of Algorithms Ii
Analysis Of Algorithms Ii
 
Sol86
Sol86Sol86
Sol86
 
Sol86
Sol86Sol86
Sol86
 
4.3e.pptx
4.3e.pptx4.3e.pptx
4.3e.pptx
 
Mid term solution
Mid term solutionMid term solution
Mid term solution
 
kactl.pdf
kactl.pdfkactl.pdf
kactl.pdf
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Imc2017 day1-solutions
Imc2017 day1-solutionsImc2017 day1-solutions
Imc2017 day1-solutions
 
Stochastic Processes Homework Help
Stochastic Processes Homework HelpStochastic Processes Homework Help
Stochastic Processes Homework Help
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法
 
Np cooks theorem
Np cooks theoremNp cooks theorem
Np cooks theorem
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Sol60
Sol60Sol60
Sol60
 
Sol60
Sol60Sol60
Sol60
 
Permutations and Combinations IIT JEE+Olympiad Lecture 4
Permutations and Combinations IIT JEE+Olympiad Lecture 4Permutations and Combinations IIT JEE+Olympiad Lecture 4
Permutations and Combinations IIT JEE+Olympiad Lecture 4
 
Signals Processing Homework Help
Signals Processing Homework HelpSignals Processing Homework Help
Signals Processing Homework Help
 
Prin digcommselectedsoln
Prin digcommselectedsolnPrin digcommselectedsoln
Prin digcommselectedsoln
 
Problem set3 | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Problem set3 | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurProblem set3 | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Problem set3 | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
 

More from Gopi Saiteja

More from Gopi Saiteja (20)

Trees gt(1)
Trees gt(1)Trees gt(1)
Trees gt(1)
 
Topic11 sortingandsearching
Topic11 sortingandsearchingTopic11 sortingandsearching
Topic11 sortingandsearching
 
Heapsort
HeapsortHeapsort
Heapsort
 
Hashing gt1
Hashing gt1Hashing gt1
Hashing gt1
 
Ee693 sept2014quizgt2
Ee693 sept2014quizgt2Ee693 sept2014quizgt2
Ee693 sept2014quizgt2
 
Ee693 sept2014quizgt1
Ee693 sept2014quizgt1Ee693 sept2014quizgt1
Ee693 sept2014quizgt1
 
Ee693 sept2014quiz1
Ee693 sept2014quiz1Ee693 sept2014quiz1
Ee693 sept2014quiz1
 
Ee693 questionshomework
Ee693 questionshomeworkEe693 questionshomework
Ee693 questionshomework
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Cs105 l15-bucket radix
Cs105 l15-bucket radixCs105 l15-bucket radix
Cs105 l15-bucket radix
 
Chapter11 sorting algorithmsefficiency
Chapter11 sorting algorithmsefficiencyChapter11 sorting algorithmsefficiency
Chapter11 sorting algorithmsefficiency
 
Sorting
SortingSorting
Sorting
 
Solution(1)
Solution(1)Solution(1)
Solution(1)
 
Pthread
PthreadPthread
Pthread
 
Open mp
Open mpOpen mp
Open mp
 
Introduction
IntroductionIntroduction
Introduction
 
Cuda
CudaCuda
Cuda
 
Vector space interpretation_of_random_variables
Vector space interpretation_of_random_variablesVector space interpretation_of_random_variables
Vector space interpretation_of_random_variables
 
Statistical signal processing(1)
Statistical signal processing(1)Statistical signal processing(1)
Statistical signal processing(1)
 
Prob review
Prob reviewProb review
Prob review
 

Quiz 1 solution

  • 1. EE 333, Communication Networks Solutions to Quiz-I (2014-15S) Maximum Marks = 10 Time=45 minutes 1. Let M be the number of times A has to transmit to deliver the packet to D and let N be the number of times B has to transmit to deliver the packet to D. Then 1 1 { } (1 ) { } (1 )m n P M m P P P N n P P        Let K be the number of times (both) A and B transmit for the packet to reach D where K=min (M, N). Therefore, 1 1 2( 1) 2 1 1 2( 1) 2 2( 1) 2 2 2 1 2 { } 2 (1 ) (1 ) (1 ) 2 (1 ) (1 ) [2 2 1 2 ] ( ) (1 )                            k j k j k k k k k k P K k P P P P P P P P P P P P P P P P P P This is the required distribution. Note that this could have been derived by simple logical arguments without doing the explicit calculation given above. I will accept that as a solution if you have clearly given your arguments – even though that is an answer that can be given in just a few lines! Using this, E{K}= 2 1 1 P 2. (a) Factoring, one can show that 8 2 7 6 5 4 3 2 1 ( 1)( 1)x x x x x x x x x x           We assume that 7 6 5 4 3 2 ( 1)x x x x x x      is a Primitive Polynomial and will therefore not divide any 1n x  for n < 27 -1=127 but will exactly divide 127 1x  All single errors will be detected (more than one term) All error patterns with an odd number of errors will be detected (1+x is a factor) All double errors will be detected if the codeword has less than 127 bits (i.e. 118 bits of data and 8 check bits) (using the assumption of the other factor being a primitive polynomial) All burst errors with burst length of 8 or less will be detected. (b) Feed in the polynomial to be divided, MSB first. The bits in the shift register after all the bits have been fed will be remainder.