This document contains summaries of 8 questions related to wireless networks and communication. Each question summary provides an overview of the concepts and steps discussed in the answer. Key topics covered include modulation techniques, multiple frequency shift keying, constellation diagrams, cyclic redundancy check, frame check sequence, direct sequence spread spectrum, and cellular network cell shapes. References are listed at the end related to wireless communications research.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
To achieve unnecessary control over data communication link
A logic is added above the physical interface which is referred as Data Link Control/ Protocol
To see the need of data link control, some of the requirements and objectives for data communication are listed as follows
Frame synchronization- start and end should be recognizable
Flow control- the sender and receiver data rate
Error control- check the error and correct it
Addressing- identify the address
Control and Data on same link- should have control information
Link Management- the initiation, maintenance and termination
We will study the three mechanisms that are a part of data link control
Flow control, error detection and error control
A presentation prepared by my friend's friend. I have done no editing at all, I'm just uploading the presentation as it is.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Error Detection and correction concepts in Data communication and networksNt Arvind
single bit , burst error detection and correction in data communication networks , block coding ( hamming code , simple parity check code , Cyclic redundancy check-CRC , checksum , internet checksum etc
Data Link Control
FRAMING
The data link layer needs to pack bits into frames, so that each frame is distinguishable from another. Our postal system practices a type of framing. The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the delimiter.
To achieve unnecessary control over data communication link
A logic is added above the physical interface which is referred as Data Link Control/ Protocol
To see the need of data link control, some of the requirements and objectives for data communication are listed as follows
Frame synchronization- start and end should be recognizable
Flow control- the sender and receiver data rate
Error control- check the error and correct it
Addressing- identify the address
Control and Data on same link- should have control information
Link Management- the initiation, maintenance and termination
We will study the three mechanisms that are a part of data link control
Flow control, error detection and error control
A presentation prepared by my friend's friend. I have done no editing at all, I'm just uploading the presentation as it is.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...VLSICS Design
Pulse compression technique is most widely used in radar and communication areas. Its implementation requires an opti-mized and dedicated hardware. The real time implementation places several constraints such as area occupied, power con-sumption, etc. The good design needs optimization of these constraints. This paper concentrates on the design of optimized model which can reduce these. In the proposed architecture a single chip is used for generating the pulse compression se-quence like BPSk, QPSk, 6-PSK and other Polyphase codes. The VLSI architecture is implemented on the Field Programm-able Gate Array (FPGA) as it provides the flexibility of reconfigurability and reprogrammability .It was found that the proposed architecture has generated the pulse compression sequences efficiently while improving some of the parameters like area, power consumption and delay when compared to previous methods.
Business communication is the process of communicating with the employees and the organisation. The implementation of the business communication strategies helps to build the communication skills in the employees. In this report the impact, barriers, and solutions to barriers are discussed which help to understand the overall concept of the business communication. For betterment of the organisations improvement of the communication skills is necessary. The effective communication is the management of the employees which help in the management of the employee’s behaviour. Analysis of business communication is essentially effective in determining the potential in professional aspects as well as evaluating personal skills for improvement.
Retail is the kind of market which is the last stop for the supply chain from where customers can access the good and services. Retail market generally purchases the goods from the manufacturer or the middlemen refer to as the Wholesalers. Wholesalers collect the products from the manufacturers worldwide and supply the goods and service to the retailers. So, retailers are the intermediate layer in the supply chain who connects the products from the manufacturer with the targeted customers. Retail market may be offline or online. However, for decades, the online retail market like Flipkart, Amazon etc are grooming faster compared to the offline retail market. The primary reason is the feasibility to the customer as they can view the product from the website by sitting at home and can choose for their purchase. Even they can order for their desired products without going to the physical market. It means such market required the intelligence to attract the customers so that they will buy the product from their market. Generally, customers use to buy their products from such a market where they can find good products, attractive offers and useful recommendations. On the other hand, retailers should keep their inventory management smarter by employing suitable technology so that the supply will be uniform. As this is the era of digital business, retail marketing uses the technology like Data Analytics with the Internet of Things to maintain the inventory, sophistical approach towards checkout system by emphasizing the visibility of the inventory system.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
2. Table of Contents
Answer of Question-1............................................................................................................... 3
Answer of Question-2............................................................................................................... 5
Answer of Question-3............................................................................................................... 6
Answer of Question-4............................................................................................................... 8
Answer of Question-................................................................................................................. 9
Answer of Question-6............................................................................................................. 10
Answer of Question-7............................................................................................................. 12
Answer of Question-8............................................................................................................. 12
References ............................................................................................................................... 13
3. Answer of Question-1
a) The presentation of 2-Level ASK Modulation for 110101 is shown below:
b) The presentation of 2-Level FSK Modulation for 110101 is shown below:
c) The presentation of 2-Level PSK Modulation for 110101 is shown below:
4. d) The presentation of DPSK Modulation for 110101 is shown below:
e) The presentation of 4-Level ASK Modulation for 110101 is shown below:
f) The presentation of 4-Level PSK Modulation for 110101 is shown below:
5. g) The presentation of 8-Level ASK Modulation for 110101 is shown below:
Answer of Question-2
Multiple Frequency Shift Keying is applied in this answer for the frequency
assignment of the components. Thus, some parameters are given based on which the
operation will be performed. The Frequency of the carrier signal is given by 1000KHz
and the diff frequency is provided by 50KHz with signal level by 16. It means, there
are 16 possible combinations of the frequency components and each component will
contain 4 binary bit with sequential combinations (Li, et al., 2019).
So, the frequency components are shown below:
0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
The assignment of the frequency of each componentcan be computedbythe following
equation:
fi=fc+(2×i-1-M)×fd
Using this equation, the frequency for each componentis computedand shown below:
0000250 KHz 0001350 KHz 0010450 KHz 0011550 KHz
0100650 KHz 0101750 KHz 0110850 KHz 0111950 KHz
10001050 KHz 10011150 KHz 10101250 KHz 10111350 KHz
11001450 KHz 11011550 KHz 11101650 KHz 11111750 KHz
6. Answer of Question-3
The input message signal is provided in the instruction is shown below. The signal is
with the magnitude of 0.5 V and the time period with 59 seconds approx. and so the
frequency is about 0.017 Hz approx. This signal is used for the modulation purpose
with the implication of the carrier signal and that will be shown in the respective
section.
The steps of the Analog Modulation and the Frequency modulation will be
demonstrated below (Zhou, 2016).
a. Analog Modulation:
The steps for the Analog modulation are shown below.
i. For the first step, the message signal is taken as the input to the modulator
and the modulation will be done on behalf of this.
ii. For the second step, the carrier signal is taken as the input of the modulator.
iii. These two signals will be fed to the modulator and the message signal will
be subjectedto the modulationand thus the outcome willbe obtained at the
next step (Rodríguez-Fernández & González-Prelcic, 2019).
7. iv. Finally, the Analog modulated signal is obtained and the pulse is shown
below:
So, with help of the carrier signal and the message signal are taken into the modulator
where the modulation is done on the basis of the two and finally generates the
modulated waveform.
b. Frequency Modulation:
The steps for the Frequency modulation are shown below.
i. For the first step, the message signal is taken as the input to the modulator
and the modulation will be done on behalf of this.
ii. For the second step, the carrier signal is taken as the input of the modulator.
8. iii. These two signals will be fed to the modulator and the message signal will
be subjectedto the modulationand thus the outcome willbe obtained at the
next step (Rodríguez-Fernández & González-Prelcic, 2019).
iv. Finally, the Frequency modulated signal is obtained and the pulse is shown
below:
So, with help of the carrier signal and the message signal are taken into the modulator
where the modulation is done on the basis of the two and finally generates the
modulated waveform.
Answer of Question-4
QuadratureAmplitudeModulationisthe typeof Amplitudemodulationand this may
contain different phases and amplitude divisions. While modulation is done, there
may be some error will be generated and most of those error cannot be identified
properly. So, there will be some other means or measures to be taken so that the error
can be identified and visualize. The technique to do this is called the constellation
diagram. In this case, the constellation diagram will be shown on behalf of the 16-
QAM, that is there will be 16 phases (Meng, et al., 2019). Here, the 16-QAM will be
shown which contains or the constellation will be sown for the 4-different phases and
different amplitude divisions. The constellation diagram is shown below:
9. The above figure shows the constellation diagram for 16-QAM with the satisfactory
conditions as stated in the instruction. The states of the modulated segments are
denoted by the binary numbers for the identification.
Answer of Question-
Cyclic Redundancy Check is the process used to determine the error incorporated
with the data that is being transferred or stored in the network storage or the hard
drive. The technique to send the data is that, the data is first arrived at the transmitting
end and there, using the Cyclic Redundancy Check process, the division method s
applied and s the remainder bit (“0” or “1”) is appended with the data. This newly
generated data will be transferred to the receiver section and there the data is finally
received. At the receiving end, again the division process with the implication of
Cyclic Redundancy Check is applied and the similar action is taken to find out the
remainder by division process (D’amico, et al., 2019). If the remainder is found at the
receiving end is same as the transmitting end, then the data is considered as the error
free data and then it will be accepted. For the either case, the data will be rejected as
by the algorithm of Cyclic Redundancy Check, the error data will be rejected from the
end. The entre process flow is shown below:
10. The process of Cyclic Redundancy Check is demonstrated above picture which is
alreadydescribed.The data from the sender sectionwill be transferred to the receiving
section along with the remainder bit or more sophistically it can be said as the CRC
bit (Zhou, 2016).
Answer of Question-6
Frame Check Sequence is used for checking the data while transmission. In this case,
the data bit sequence will be transferred to the data frame and this data frame will be
transferred from the transmitting end to receiving end. The technique of the Frame
Check Sequence is nearly same as the Cyclic Redundancy Check method but here the
frame will be checked. The data frame contains the address of the transmitting end
the receiving end and the data itself. The data will be checked using the pattern bit
and by the division method (Zhou, 2016) . At the transmitting end, the division
method is applied and s the remainder bit (“0” or “1”) is appended with the data. This
newly generated data will be transferred to the receiver section and there the data is
finally received. At the receiving end, again the division process with the implication
of Frame Check Sequence is applied and the similar action is taken to find out the
remainder by division process. If the remainder is found at the receiving end is same
as the transmitting end, then the data is considered as the error free data and then it
will be accepted. For the either case, the data will be rejected as by the algorithm of
Frame Check Sequence, the error data will be rejected from the end (Li, et al., 2019).
Frame Check Sequence process is executed both at the transmitting end and the
receiving end to check for the remainder bit. In this computation, the message bit is
provided by “111010110” with the associated pattern “101110” along with the weight
of is computed by 15. So, the computation for the Frame Check Sequence at both the
ends are shown below:
12. In both two cases, the remainder is same (“0”) and so the data willbe accepted as there
is no error.
Answer of Question-7
Direct Sequence Spread Spectrum uses the logical XOR method for the generation of
the sequence with the successive input of the message sequence and the pseudo noise
sequencewhich may be generated locally.Here, the Direct Sequence Spread Spectrum
will bedetermined for the input messagesequence101 and the pseudonoisesequence
011011010110. The outcome is shown below in form of calculation and graphical
representation (D’amico, et al., 2019).
i. Calculation
101⨁ 011011010110
=000000000101⨁ 011011010110
= 11011010011
ii. Graphical representation
Answer of Question-8
In cellular network or communication, there are different types of cells are there with
different shapes. Among those, the hexagonal cell is used widely as compared to the
square or circular cell as those are not appropriate as the hexagonal cells. The
hexagonal cells can tie together up without creating the unused space and the
overlapping space which the circular cell faces. On the other hand, the distance from
the centre to all the points to the periphery are same for hexagonal cell but for the
square it is not. As the hexagonal cell contains all the flavour of the advantages of the
radiation and the information exchange, hexagonal cell is favouring the most
compared t the other two (Meng, et al., 2019).