This document contains summaries of 8 questions related to wireless networks and communication. Each question summary provides an overview of the concepts and steps discussed in the answer. Key topics covered include modulation techniques, error detection methods like cyclic redundancy check and frame check sequence, spread spectrum techniques, and cellular network cell structures. References are provided at the end related to wireless communications research.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
To achieve unnecessary control over data communication link
A logic is added above the physical interface which is referred as Data Link Control/ Protocol
To see the need of data link control, some of the requirements and objectives for data communication are listed as follows
Frame synchronization- start and end should be recognizable
Flow control- the sender and receiver data rate
Error control- check the error and correct it
Addressing- identify the address
Control and Data on same link- should have control information
Link Management- the initiation, maintenance and termination
We will study the three mechanisms that are a part of data link control
Flow control, error detection and error control
A presentation prepared by my friend's friend. I have done no editing at all, I'm just uploading the presentation as it is.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
To achieve unnecessary control over data communication link
A logic is added above the physical interface which is referred as Data Link Control/ Protocol
To see the need of data link control, some of the requirements and objectives for data communication are listed as follows
Frame synchronization- start and end should be recognizable
Flow control- the sender and receiver data rate
Error control- check the error and correct it
Addressing- identify the address
Control and Data on same link- should have control information
Link Management- the initiation, maintenance and termination
We will study the three mechanisms that are a part of data link control
Flow control, error detection and error control
A presentation prepared by my friend's friend. I have done no editing at all, I'm just uploading the presentation as it is.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...VLSICS Design
Pulse compression technique is most widely used in radar and communication areas. Its implementation requires an opti-mized and dedicated hardware. The real time implementation places several constraints such as area occupied, power con-sumption, etc. The good design needs optimization of these constraints. This paper concentrates on the design of optimized model which can reduce these. In the proposed architecture a single chip is used for generating the pulse compression se-quence like BPSk, QPSk, 6-PSK and other Polyphase codes. The VLSI architecture is implemented on the Field Programm-able Gate Array (FPGA) as it provides the flexibility of reconfigurability and reprogrammability .It was found that the proposed architecture has generated the pulse compression sequences efficiently while improving some of the parameters like area, power consumption and delay when compared to previous methods.
Business communication is the process of communicating with the employees and the organisation. The implementation of the business communication strategies helps to build the communication skills in the employees. In this report the impact, barriers, and solutions to barriers are discussed which help to understand the overall concept of the business communication. For betterment of the organisations improvement of the communication skills is necessary. The effective communication is the management of the employees which help in the management of the employee’s behaviour. Analysis of business communication is essentially effective in determining the potential in professional aspects as well as evaluating personal skills for improvement.
Retail is the kind of market which is the last stop for the supply chain from where customers can access the good and services. Retail market generally purchases the goods from the manufacturer or the middlemen refer to as the Wholesalers. Wholesalers collect the products from the manufacturers worldwide and supply the goods and service to the retailers. So, retailers are the intermediate layer in the supply chain who connects the products from the manufacturer with the targeted customers. Retail market may be offline or online. However, for decades, the online retail market like Flipkart, Amazon etc are grooming faster compared to the offline retail market. The primary reason is the feasibility to the customer as they can view the product from the website by sitting at home and can choose for their purchase. Even they can order for their desired products without going to the physical market. It means such market required the intelligence to attract the customers so that they will buy the product from their market. Generally, customers use to buy their products from such a market where they can find good products, attractive offers and useful recommendations. On the other hand, retailers should keep their inventory management smarter by employing suitable technology so that the supply will be uniform. As this is the era of digital business, retail marketing uses the technology like Data Analytics with the Internet of Things to maintain the inventory, sophistical approach towards checkout system by emphasizing the visibility of the inventory system.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. Table of Contents
Answer of Question-1............................................................................................................... 3
Answer of Question-2............................................................................................................... 5
Answer of Question-3............................................................................................................... 6
Answer of Question-4............................................................................................................... 8
Answer of Question-................................................................................................................. 9
Answer of Question-6............................................................................................................. 10
Answer of Question-7............................................................................................................. 12
Answer of Question-8............................................................................................................. 12
References ............................................................................................................................... 13
3. Answer of Question-1
a) The presentation of 2-Level ASK Modulation for 110101 is shown below:
b) The presentation of 2-Level FSK Modulation for 110101 is shown below:
c) The presentation of 2-Level PSK Modulation for 110101 is shown below:
4. d) The presentation of DPSK Modulation for 110101 is shown below:
e) The presentation of 4-Level ASK Modulation for 110101 is shown below:
f) The presentation of 4-Level PSK Modulation for 110101 is shown below:
5. g) The presentation of 8-Level ASK Modulation for 110101 is shown below:
Answer of Question-2
Multiple Frequency Shift Keying is applied in this answer for the frequency
assignment of the components. Thus, some parameters are given based on which the
operation will be performed. The Frequency of the carrier signal is given by 1000KHz
and the diff frequency is provided by 50KHz with signal level by 16. It means, there
are 16 possible combinations of the frequency components and each component will
contain 4 binary bit with sequential combinations (Li, et al., 2019).
So, the frequency components are shown below:
0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
The assignment of the frequency of each componentcan be computedbythe following
equation:
fi=fc+(2×i-1-M)×fd
Using this equation, the frequency for each componentis computedand shown below:
0000250 KHz 0001350 KHz 0010450 KHz 0011550 KHz
0100650 KHz 0101750 KHz 0110850 KHz 0111950 KHz
10001050 KHz 10011150 KHz 10101250 KHz 10111350 KHz
11001450 KHz 11011550 KHz 11101650 KHz 11111750 KHz
6. Answer of Question-3
The input message signal is provided in the instruction is shown below. The signal is
with the magnitude of 0.5 V and the time period with 59 seconds approx. and so the
frequency is about 0.017 Hz approx. This signal is used for the modulation purpose
with the implication of the carrier signal and that will be shown in the respective
section.
The steps of the Analog Modulation and the Frequency modulation will be
demonstrated below (Zhou, 2016).
a. Analog Modulation:
The steps for the Analog modulation are shown below.
i. For the first step, the message signal is taken as the input to the modulator
and the modulation will be done on behalf of this.
ii. For the second step, the carrier signal is taken as the input of the modulator.
iii. These two signals will be fed to the modulator and the message signal will
be subjectedto the modulationand thus the outcome willbe obtained at the
next step (Rodríguez-Fernández & González-Prelcic, 2019).
7. iv. Finally, the Analog modulated signal is obtained and the pulse is shown
below:
So, with help of the carrier signal and the message signal are taken into the modulator
where the modulation is done on the basis of the two and finally generates the
modulated waveform.
b. Frequency Modulation:
The steps for the Frequency modulation are shown below.
i. For the first step, the message signal is taken as the input to the modulator
and the modulation will be done on behalf of this.
ii. For the second step, the carrier signal is taken as the input of the modulator.
8. iii. These two signals will be fed to the modulator and the message signal will
be subjectedto the modulationand thus the outcome willbe obtained at the
next step (Rodríguez-Fernández & González-Prelcic, 2019).
iv. Finally, the Frequency modulated signal is obtained and the pulse is shown
below:
So, with help of the carrier signal and the message signal are taken into the modulator
where the modulation is done on the basis of the two and finally generates the
modulated waveform.
Answer of Question-4
QuadratureAmplitudeModulationisthe typeof Amplitudemodulationand this may
contain different phases and amplitude divisions. While modulation is done, there
may be some error will be generated and most of those error cannot be identified
properly. So, there will be some other means or measures to be taken so that the error
can be identified and visualize. The technique to do this is called the constellation
diagram. In this case, the constellation diagram will be shown on behalf of the 16-
QAM, that is there will be 16 phases (Meng, et al., 2019). Here, the 16-QAM will be
shown which contains or the constellation will be sown for the 4-different phases and
different amplitude divisions. The constellation diagram is shown below:
9. The above figure shows the constellation diagram for 16-QAM with the satisfactory
conditions as stated in the instruction. The states of the modulated segments are
denoted by the binary numbers for the identification.
Answer of Question-
Cyclic Redundancy Check is the process used to determine the error incorporated
with the data that is being transferred or stored in the network storage or the hard
drive. The technique to send the data is that, the data is first arrived at the transmitting
end and there, using the Cyclic Redundancy Check process, the division method s
applied and s the remainder bit (“0” or “1”) is appended with the data. This newly
generated data will be transferred to the receiver section and there the data is finally
received. At the receiving end, again the division process with the implication of
Cyclic Redundancy Check is applied and the similar action is taken to find out the
remainder by division process (D’amico, et al., 2019). If the remainder is found at the
receiving end is same as the transmitting end, then the data is considered as the error
free data and then it will be accepted. For the either case, the data will be rejected as
by the algorithm of Cyclic Redundancy Check, the error data will be rejected from the
end. The entre process flow is shown below:
10. The process of Cyclic Redundancy Check is demonstrated above picture which is
alreadydescribed.The data from the sender sectionwill be transferred to the receiving
section along with the remainder bit or more sophistically it can be said as the CRC
bit (Zhou, 2016).
Answer of Question-6
Frame Check Sequence is used for checking the data while transmission. In this case,
the data bit sequence will be transferred to the data frame and this data frame will be
transferred from the transmitting end to receiving end. The technique of the Frame
Check Sequence is nearly same as the Cyclic Redundancy Check method but here the
frame will be checked. The data frame contains the address of the transmitting end
the receiving end and the data itself. The data will be checked using the pattern bit
and by the division method (Zhou, 2016) . At the transmitting end, the division
method is applied and s the remainder bit (“0” or “1”) is appended with the data. This
newly generated data will be transferred to the receiver section and there the data is
finally received. At the receiving end, again the division process with the implication
of Frame Check Sequence is applied and the similar action is taken to find out the
remainder by division process. If the remainder is found at the receiving end is same
as the transmitting end, then the data is considered as the error free data and then it
will be accepted. For the either case, the data will be rejected as by the algorithm of
Frame Check Sequence, the error data will be rejected from the end (Li, et al., 2019).
Frame Check Sequence process is executed both at the transmitting end and the
receiving end to check for the remainder bit. In this computation, the message bit is
provided by “111010110” with the associated pattern “101110” along with the weight
of is computed by 15. So, the computation for the Frame Check Sequence at both the
ends are shown below:
12. In both two cases, the remainder is same (“0”) and so the data willbe accepted as there
is no error.
Answer of Question-7
Direct Sequence Spread Spectrum uses the logical XOR method for the generation of
the sequence with the successive input of the message sequence and the pseudo noise
sequencewhich may be generated locally.Here, the Direct Sequence Spread Spectrum
will bedetermined for the input messagesequence101 and the pseudonoisesequence
011011010110. The outcome is shown below in form of calculation and graphical
representation (D’amico, et al., 2019).
i. Calculation
101⨁ 011011010110
=000000000101⨁ 011011010110
= 11011010011
ii. Graphical representation
Answer of Question-8
In cellular network or communication, there are different types of cells are there with
different shapes. Among those, the hexagonal cell is used widely as compared to the
square or circular cell as those are not appropriate as the hexagonal cells. The
hexagonal cells can tie together up without creating the unused space and the
overlapping space which the circular cell faces. On the other hand, the distance from
the centre to all the points to the periphery are same for hexagonal cell but for the
square it is not. As the hexagonal cell contains all the flavour of the advantages of the
radiation and the information exchange, hexagonal cell is favouring the most
compared t the other two (Meng, et al., 2019).