SlideShare a Scribd company logo
Wireless Networks & Communication
Table of Contents
Answer of Q-1........................................................................................................................... 3
Answer of Q -2.......................................................................................................................... 5
Answer of Q -3.......................................................................................................................... 7
Answer of Q -4.......................................................................................................................... 9
Answer of Q -5........................................................................................................................ 10
Answer of Q -6........................................................................................................................ 10
Answer of Q -7........................................................................................................................ 12
Answer of Q -8........................................................................................................................ 12
References.............................................................................................................................. 14
Answer of Q-1
As directed in the instruction, the binary data 110101 will be converted to the
corresponding Analog signal by using the modulation technique. Those outcomes are
shown below serially to demonstrate the answer (Hai Xue, 2018).
a) 2-Level ASK outcome is as below:
b) 2-Level FSK outcome is as below:
c) 2-Level PSK outcome is as below:
d) DPSK outcome is as below:
e) 4-Level ASK outcome is as below:
f) 4-Level PSK outcome is as below:
g) 8-Level ASK outcome is as below:
Answer of Q -2
In this section, the frequency assignment will be computed and thereby assign the
frequency to the respective component of the frequency, using the MFSK modulation
and with help of the given parameters as follows (D. Kreutz, 2015):
fc= 1000 KHz  Carrier Frequency
fd = 50 KHz Difference Frequency
M = 16 Signal Level
L = log2(M) = log2(16) = 4 Number of bits in each component
So, to check the frequency assignment, primarily, the frequency components or levels
are shown as follows:
Component-0 is binary 0000
Component-1 is binary 0001
Component-2 is binary 0010
Component-3 is binary 0011
Component-4 is binary 0100
Component-5 is binary 0101
Component-6 is binary 0110
Component-7 is binary 0111
Component-8 is binary 1000
Component-9 is binary 1001
Component-10 is binary 1010
Component-11 is binary 1011
Component-12 is binary 1100
Component-13 is binary 1101
Component-14 is binary 1110
Component-15 is binary 1111
Now, the assigned frequency for each of the components can be calculated as follows
which is based on the parameters shown earlier (B. A. A. Nunes, 2014):
fi=fc+(2×i-1-M)×fd
With help of the formula shown above, the assigned frequency for the mentioned
components are as follows:
Component 0000 0001 0010 0011
Frequency 250 KHz 350 KHz 450 KHz 550 KHz
Component 0100 0101 0110 0111
Frequency 650 KHz 750 KHz 850 KHz 950 KHz
Component 1000 1001 1010 1011
Frequency 1050 KHz 1150 KHz 1250 KHz 1350 KHz
Component 1100 1101 1110 1111
Frequency 1450 KHz 1550 KHz 1650 KHz 1750 KHz
Answer of Q -3
The Frequency and Analog modulation will be shown in this section on behalf of the
input signal that is given in the question. The input signal is shown below.
The input signal has the parameters like the amplitude is of 0.5 volt along with the
frequency of 0.016 Hertz as the time period is about 1 minute or 60 seconds and so
frequency will be the inverse of the time period.
Below the steps of the Analog modulation and Frequency modulations are described
with graphical representation of the signals and other required elements (Woensel,
2014).
Steps for Analog Modulation:
The steps for the conversion of the Analog modulation is shown below:
i. Carrier signal is the primary important part of the modulation and hence is
taken as the input.
ii. The second input fact is to take input of the message signal that is provided
in the instruction and upon which the modulation will be done is as follows:
iii. These two input signal will be provided into the Analog Modulator which will
modulate the message signal in accordance with the carrier signal. The
structure of the modulator is shown below:
iv. Finally, the modulator will provide the modulated signal using the Analog
Modulation process.
The Analog modulated signal is shown above with the process above.
Steps for Frequency Modulation:
The steps for the conversion of the Frequency modulation is shown below (Pandya,
2017):
i. Carrier signal is the primary important part of the modulation and hence is
taken as the input.
ii. The second input fact is to take input of the message signal that is provided
in the instruction and upon which the modulation will be done is as follows:
iii. These two inputs signal will be provided into the Fequency Modulator which
will modulate the message signal in accordance with the carrier signal. The
structure of the modulator is shown below:
iv. Finally, the modulator will provide the modulated signal using the Frequency
Modulation process.
The Frequency modulated signal is shown above with the process above.
Answer of Q -4
Modulation is the process which converts one signal type to another. There are
different modulation processes are there which convert one other. Quadrature
Amplitude Modulation is the process of modulation. Every modulation process
contains error but most of the time the error cannot be identified properly (Hai Xue,
2018). This error in the modulation is found by the constellation diagram. In this
problem, the constellation diagram is shown for the QAM with 16 phase that is for
QAM-16 with 4 different phases and 4 different amplitude level. The required
constellation diagram is shown below:
In this figure, the constellation diagram is shown for 16-QAM with different phase and
amplitude as desired.
Answer of Q -5
Cyclic Redundancy Check is the process to check the error in the transmitted data in
a media or storage. Generally, the data is transferred from one point to another or
more specifically, from transmitter or end of sender to the receiver. This data will be
check at both two points for the consistence that is to check whether the transmitted
data and the received data are same. If the data is same, then this will be received
and if not, that will be rejected for having error. The checking is done using the division
process. At the sender end, the division is done and the check bit r the CRC bit is
appended with the data bit stream. This data again will be checked at the receiving
end and check for the remainder. If the remainder bit or the check bit at two sides are
same, then the data is considered as error free and thus will be accepted and the data
will be rejected is the remainder bit is not same (Woensel, 2014).
The process of the Cyclic Redundancy Check is shown below:
The process from for the CRC checker and the generator is shown above. This
process will check for ten consistency of the data and determines for the correctness
of the data while receiving.
Answer of Q -6
Frame Check Sequence is the process to check the correctness of the data that is
received from the sending end. In Frame Check Sequence, the data bit stream is
converted to the data frame in the data link layer and the frame will be transfer the
receiving end from the sending end. To check the data frame, division method is used.
In this section, the message bit 111010110 will be check for the consistency at the
sending and receiving end both to check whether the data contains any error while
transmission. For this checking, the pattern bit 101110 is required by which the division
will be done on the message bit (Hai Xue, 2018). For each checking, the remainder
will be into consideration and checked at both sides. If the check it will be same at both
sides then 111010110 will be accepted and otherwise will be rejected.
The process of the two ends are shown below:
Sending End:
1 1 0 0 0 0 0 0 0 0
101110 1110101100000000
101110
111001
101110
100111
101110
110010
101110
101000
101110
100000
101110
1101000 Remainder
Receiving End:
101110 111010111101000
101110
111001
101110
100111
101110
110011
101110
101011
101110
110000
101110
110100 Remainder
As seen from the computation, the remained of the division result a both the sides will
be same and so the data will be considered to be error free and thus will be accepted.
Answer of Q -7
The following parameters are provided in the instruction:
Input message = 101
PN Sequence= 011011010110
T= 4Tc
Direct Sequence Spread Spectrum can e simply obtained by the performing XOR
operation between the message input and the PN sequence. Thus, the operation is
shown below with the output bit pattern of the Direct Sequence Spread Spectrum and
the graphical representation also (B. A. A. Nunes, 2014).
101⨁ 011011010110 = 11011010011
The output of the obtained Direct Sequence Spread Spectrum is as follows:
Answer of Q -8
There are different types of cells are there for the cellular communication like the
circular shaped cell, square shaped cell and the hexagonal shaped cell. The
comparative dis is made below to find out the accepted type of cell shape to be
appropriate with the cellular communication. The discussion is as follows:
Square Cell Circular Cell Hexagonal Cell
Distance to
the
periphery
Not equal at all the
sides of the
periphery.
It is same for all the
sides.
It is same for all the
sides.
Area
overlapped
There is no area that
overlapped with other
cell.
Overlap area or
portion is found among
the cell.
There is no area
that overlapped with
other cell.
Misuse of
information
transfer
Less amount of
information may be
misused due to
structure.
Large amount of
information may be
misused due to
structure.
Least amount of
information may be
misused due to
structure.
Area
unused
No unused space is
there among the
cells.
Unused space is
generated when the
cells are accumulated
together for the
operation.
No unused space is
there among the
cells.
Radiation
angle
Not same from every
point of the periphery.
Same from every point
of the periphery.
Same from every
point of the
periphery.
Shape
From the above discussion, it can be concluded that, the hexagonal cell is the most
appropriate for the cellular communication rather compared to other two.
References
B. A. A.Nunes,M. M. X.-N.N.K. O.a. T. T., 2014. A surveyof software-definednetworking:past,
present,andfuture of programmable networks,. IEEECommunicationsSurveys&Tutorials, 16(3), p.
1617–1634.
D. Kreutz,F.M. V.R. P. E. V.C. E. R. S. A. a. S.U., 2015. Software-definednetworking:a
comprehensive survey. Proceedingsof theIEEE, 103(1), p. 14–76.
Hai Xue,K.T. K. a. H. Y. Y., 2018. PacketSchedulingforMultiple-SwitchSoftware-Defined
NetworkinginEdge ComputingEnvironment. WirelessCommunicationsand MobileComputing,
Volume 2018.
Pandya,M. P. a. A.,2017. Edge Computing:DesignaFrameworkforMonitoringPerformance
betweenDatacentersandDevicesof Edge Networks. InternationalJournalof Computer&
MathematicalSciences, 6(6), p.73–77.
Woensel,F.R.B. C. a. T. V.,2014. Finite queueingmodelingandoptimization:A selectedreview,.
Journalof Applied Mathematics, Volume2014.
MITS5003 Wireless Networks & Communication

More Related Content

What's hot

data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
sumit gyawali
 
Lecture20 tcp
Lecture20 tcpLecture20 tcp
Lecture20 tcpH K
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDL
ijsrd.com
 
Ccna 3-discovery-4-0-module-3-100-
Ccna 3-discovery-4-0-module-3-100-Ccna 3-discovery-4-0-module-3-100-
Ccna 3-discovery-4-0-module-3-100-junkut3
 
Crc
CrcCrc
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
IOSR Journals
 
Notes mid uet solution
Notes mid uet solutionNotes mid uet solution
Notes mid uet solutionAli Jt
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
kavish dani
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
roma bora
 
Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)bheemsain
 
Data link layer
Data link layerData link layer
Data link layer
st2112
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
Sonia Pahuja
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
Rajan Shah
 
Discrete Time Batch Arrival Queue with Multiple Vacations
Discrete Time Batch Arrival Queue with Multiple VacationsDiscrete Time Batch Arrival Queue with Multiple Vacations
Discrete Time Batch Arrival Queue with Multiple Vacations
IJERDJOURNAL
 

What's hot (20)

data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Lecture20 tcp
Lecture20 tcpLecture20 tcp
Lecture20 tcp
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDL
 
Ccna 3-discovery-4-0-module-3-100-
Ccna 3-discovery-4-0-module-3-100-Ccna 3-discovery-4-0-module-3-100-
Ccna 3-discovery-4-0-module-3-100-
 
Crc
CrcCrc
Crc
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Notes mid uet solution
Notes mid uet solutionNotes mid uet solution
Notes mid uet solution
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)Ch 6 data and computer communicationwilliam stallings (1)
Ch 6 data and computer communicationwilliam stallings (1)
 
Data link layer
Data link layerData link layer
Data link layer
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
 
Discrete Time Batch Arrival Queue with Multiple Vacations
Discrete Time Batch Arrival Queue with Multiple VacationsDiscrete Time Batch Arrival Queue with Multiple Vacations
Discrete Time Batch Arrival Queue with Multiple Vacations
 

Similar to MITS5003 Wireless Networks & Communication

III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
Studies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication NetworkStudies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication Network
NeetaSingh38
 
B0210714
B0210714B0210714
B0210714
IOSR Journals
 
closing-the-hardware-design-loop-with-multisim-a-case-study
closing-the-hardware-design-loop-with-multisim-a-case-studyclosing-the-hardware-design-loop-with-multisim-a-case-study
closing-the-hardware-design-loop-with-multisim-a-case-studyAyush Bhardwaj
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
VLSICS Design
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and CorrectionMahesh Kumar Attri
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
botAlert
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
Ajit Nayak
 
5 DLL-LLC- Book
5 DLL-LLC- Book5 DLL-LLC- Book
5 DLL-LLC- Book
Water Birds (Ali)
 
Data link layar
Data link layarData link layar
Data link layar
jaysanshrestha
 
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...Michael Xevgenis
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Data Communications- Unit-4.pptx
Data Communications- Unit-4.pptxData Communications- Unit-4.pptx
Data Communications- Unit-4.pptx
HrushikeshDandu
 
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
CSCJournals
 
FPGA-based Digital Baseband Transmission System Performance Tester Research a...
FPGA-based Digital Baseband Transmission System Performance Tester Research a...FPGA-based Digital Baseband Transmission System Performance Tester Research a...
FPGA-based Digital Baseband Transmission System Performance Tester Research a...
TELKOMNIKA JOURNAL
 

Similar to MITS5003 Wireless Networks & Communication (20)

III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
Studies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication NetworkStudies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication Network
 
B0210714
B0210714B0210714
B0210714
 
closing-the-hardware-design-loop-with-multisim-a-case-study
closing-the-hardware-design-loop-with-multisim-a-case-studyclosing-the-hardware-design-loop-with-multisim-a-case-study
closing-the-hardware-design-loop-with-multisim-a-case-study
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
AREA OPTIMIZED FPGA IMPLEMENTATION FOR GENERATION OF RADAR PULSE COM-PRESSION...
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
5 DLL-LLC- Book
5 DLL-LLC- Book5 DLL-LLC- Book
5 DLL-LLC- Book
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...
WiFi-802.11g -Adaptivity of modulation mode and encoding rate for an improved...
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Data Communications- Unit-4.pptx
Data Communications- Unit-4.pptxData Communications- Unit-4.pptx
Data Communications- Unit-4.pptx
 
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...
 
FPGA-based Digital Baseband Transmission System Performance Tester Research a...
FPGA-based Digital Baseband Transmission System Performance Tester Research a...FPGA-based Digital Baseband Transmission System Performance Tester Research a...
FPGA-based Digital Baseband Transmission System Performance Tester Research a...
 

More from Subhadeep Chakraborty

MA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplaceMA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplace
Subhadeep Chakraborty
 
Clt83410 document
Clt83410 documentClt83410 document
Clt83410 document
Subhadeep Chakraborty
 
IoT Applications in Retail
IoT Applications in RetailIoT Applications in Retail
IoT Applications in Retail
Subhadeep Chakraborty
 
Coit11238 2019-t2
Coit11238 2019-t2Coit11238 2019-t2
Coit11238 2019-t2
Subhadeep Chakraborty
 
Draft%20 mani copy
Draft%20 mani   copyDraft%20 mani   copy
Draft%20 mani copy
Subhadeep Chakraborty
 
Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19
Subhadeep Chakraborty
 
Air passenger report
Air passenger reportAir passenger report
Air passenger report
Subhadeep Chakraborty
 
Itech7407 cardio arrack-deliered-18-9-19
Itech7407  cardio arrack-deliered-18-9-19Itech7407  cardio arrack-deliered-18-9-19
Itech7407 cardio arrack-deliered-18-9-19
Subhadeep Chakraborty
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
Subhadeep Chakraborty
 
Indian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSSIndian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSS
Subhadeep Chakraborty
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
Subhadeep Chakraborty
 
Amazon seniment
Amazon senimentAmazon seniment
Amazon seniment
Subhadeep Chakraborty
 

More from Subhadeep Chakraborty (12)

MA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplaceMA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplace
 
Clt83410 document
Clt83410 documentClt83410 document
Clt83410 document
 
IoT Applications in Retail
IoT Applications in RetailIoT Applications in Retail
IoT Applications in Retail
 
Coit11238 2019-t2
Coit11238 2019-t2Coit11238 2019-t2
Coit11238 2019-t2
 
Draft%20 mani copy
Draft%20 mani   copyDraft%20 mani   copy
Draft%20 mani copy
 
Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19
 
Air passenger report
Air passenger reportAir passenger report
Air passenger report
 
Itech7407 cardio arrack-deliered-18-9-19
Itech7407  cardio arrack-deliered-18-9-19Itech7407  cardio arrack-deliered-18-9-19
Itech7407 cardio arrack-deliered-18-9-19
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
 
Indian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSSIndian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSS
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
 
Amazon seniment
Amazon senimentAmazon seniment
Amazon seniment
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

MITS5003 Wireless Networks & Communication

  • 1. Wireless Networks & Communication
  • 2. Table of Contents Answer of Q-1........................................................................................................................... 3 Answer of Q -2.......................................................................................................................... 5 Answer of Q -3.......................................................................................................................... 7 Answer of Q -4.......................................................................................................................... 9 Answer of Q -5........................................................................................................................ 10 Answer of Q -6........................................................................................................................ 10 Answer of Q -7........................................................................................................................ 12 Answer of Q -8........................................................................................................................ 12 References.............................................................................................................................. 14
  • 3. Answer of Q-1 As directed in the instruction, the binary data 110101 will be converted to the corresponding Analog signal by using the modulation technique. Those outcomes are shown below serially to demonstrate the answer (Hai Xue, 2018). a) 2-Level ASK outcome is as below: b) 2-Level FSK outcome is as below: c) 2-Level PSK outcome is as below:
  • 4. d) DPSK outcome is as below: e) 4-Level ASK outcome is as below: f) 4-Level PSK outcome is as below:
  • 5. g) 8-Level ASK outcome is as below: Answer of Q -2 In this section, the frequency assignment will be computed and thereby assign the frequency to the respective component of the frequency, using the MFSK modulation and with help of the given parameters as follows (D. Kreutz, 2015): fc= 1000 KHz  Carrier Frequency fd = 50 KHz Difference Frequency M = 16 Signal Level L = log2(M) = log2(16) = 4 Number of bits in each component So, to check the frequency assignment, primarily, the frequency components or levels are shown as follows:
  • 6. Component-0 is binary 0000 Component-1 is binary 0001 Component-2 is binary 0010 Component-3 is binary 0011 Component-4 is binary 0100 Component-5 is binary 0101 Component-6 is binary 0110 Component-7 is binary 0111 Component-8 is binary 1000 Component-9 is binary 1001 Component-10 is binary 1010 Component-11 is binary 1011 Component-12 is binary 1100 Component-13 is binary 1101 Component-14 is binary 1110 Component-15 is binary 1111 Now, the assigned frequency for each of the components can be calculated as follows which is based on the parameters shown earlier (B. A. A. Nunes, 2014): fi=fc+(2×i-1-M)×fd With help of the formula shown above, the assigned frequency for the mentioned components are as follows: Component 0000 0001 0010 0011 Frequency 250 KHz 350 KHz 450 KHz 550 KHz Component 0100 0101 0110 0111 Frequency 650 KHz 750 KHz 850 KHz 950 KHz Component 1000 1001 1010 1011 Frequency 1050 KHz 1150 KHz 1250 KHz 1350 KHz Component 1100 1101 1110 1111 Frequency 1450 KHz 1550 KHz 1650 KHz 1750 KHz
  • 7. Answer of Q -3 The Frequency and Analog modulation will be shown in this section on behalf of the input signal that is given in the question. The input signal is shown below. The input signal has the parameters like the amplitude is of 0.5 volt along with the frequency of 0.016 Hertz as the time period is about 1 minute or 60 seconds and so frequency will be the inverse of the time period. Below the steps of the Analog modulation and Frequency modulations are described with graphical representation of the signals and other required elements (Woensel, 2014). Steps for Analog Modulation: The steps for the conversion of the Analog modulation is shown below: i. Carrier signal is the primary important part of the modulation and hence is taken as the input. ii. The second input fact is to take input of the message signal that is provided in the instruction and upon which the modulation will be done is as follows:
  • 8. iii. These two input signal will be provided into the Analog Modulator which will modulate the message signal in accordance with the carrier signal. The structure of the modulator is shown below: iv. Finally, the modulator will provide the modulated signal using the Analog Modulation process. The Analog modulated signal is shown above with the process above. Steps for Frequency Modulation: The steps for the conversion of the Frequency modulation is shown below (Pandya, 2017): i. Carrier signal is the primary important part of the modulation and hence is taken as the input. ii. The second input fact is to take input of the message signal that is provided in the instruction and upon which the modulation will be done is as follows:
  • 9. iii. These two inputs signal will be provided into the Fequency Modulator which will modulate the message signal in accordance with the carrier signal. The structure of the modulator is shown below: iv. Finally, the modulator will provide the modulated signal using the Frequency Modulation process. The Frequency modulated signal is shown above with the process above. Answer of Q -4 Modulation is the process which converts one signal type to another. There are different modulation processes are there which convert one other. Quadrature Amplitude Modulation is the process of modulation. Every modulation process contains error but most of the time the error cannot be identified properly (Hai Xue, 2018). This error in the modulation is found by the constellation diagram. In this problem, the constellation diagram is shown for the QAM with 16 phase that is for QAM-16 with 4 different phases and 4 different amplitude level. The required constellation diagram is shown below: In this figure, the constellation diagram is shown for 16-QAM with different phase and amplitude as desired.
  • 10. Answer of Q -5 Cyclic Redundancy Check is the process to check the error in the transmitted data in a media or storage. Generally, the data is transferred from one point to another or more specifically, from transmitter or end of sender to the receiver. This data will be check at both two points for the consistence that is to check whether the transmitted data and the received data are same. If the data is same, then this will be received and if not, that will be rejected for having error. The checking is done using the division process. At the sender end, the division is done and the check bit r the CRC bit is appended with the data bit stream. This data again will be checked at the receiving end and check for the remainder. If the remainder bit or the check bit at two sides are same, then the data is considered as error free and thus will be accepted and the data will be rejected is the remainder bit is not same (Woensel, 2014). The process of the Cyclic Redundancy Check is shown below: The process from for the CRC checker and the generator is shown above. This process will check for ten consistency of the data and determines for the correctness of the data while receiving. Answer of Q -6 Frame Check Sequence is the process to check the correctness of the data that is received from the sending end. In Frame Check Sequence, the data bit stream is converted to the data frame in the data link layer and the frame will be transfer the receiving end from the sending end. To check the data frame, division method is used. In this section, the message bit 111010110 will be check for the consistency at the sending and receiving end both to check whether the data contains any error while transmission. For this checking, the pattern bit 101110 is required by which the division will be done on the message bit (Hai Xue, 2018). For each checking, the remainder will be into consideration and checked at both sides. If the check it will be same at both sides then 111010110 will be accepted and otherwise will be rejected. The process of the two ends are shown below:
  • 11. Sending End: 1 1 0 0 0 0 0 0 0 0 101110 1110101100000000 101110 111001 101110 100111 101110 110010 101110 101000 101110 100000 101110 1101000 Remainder Receiving End: 101110 111010111101000 101110 111001 101110 100111 101110 110011 101110 101011 101110 110000 101110 110100 Remainder
  • 12. As seen from the computation, the remained of the division result a both the sides will be same and so the data will be considered to be error free and thus will be accepted. Answer of Q -7 The following parameters are provided in the instruction: Input message = 101 PN Sequence= 011011010110 T= 4Tc Direct Sequence Spread Spectrum can e simply obtained by the performing XOR operation between the message input and the PN sequence. Thus, the operation is shown below with the output bit pattern of the Direct Sequence Spread Spectrum and the graphical representation also (B. A. A. Nunes, 2014). 101⨁ 011011010110 = 11011010011 The output of the obtained Direct Sequence Spread Spectrum is as follows: Answer of Q -8 There are different types of cells are there for the cellular communication like the circular shaped cell, square shaped cell and the hexagonal shaped cell. The comparative dis is made below to find out the accepted type of cell shape to be appropriate with the cellular communication. The discussion is as follows: Square Cell Circular Cell Hexagonal Cell Distance to the periphery Not equal at all the sides of the periphery. It is same for all the sides. It is same for all the sides. Area overlapped There is no area that overlapped with other cell. Overlap area or portion is found among the cell. There is no area that overlapped with other cell. Misuse of information transfer Less amount of information may be misused due to structure. Large amount of information may be misused due to structure. Least amount of information may be misused due to structure.
  • 13. Area unused No unused space is there among the cells. Unused space is generated when the cells are accumulated together for the operation. No unused space is there among the cells. Radiation angle Not same from every point of the periphery. Same from every point of the periphery. Same from every point of the periphery. Shape From the above discussion, it can be concluded that, the hexagonal cell is the most appropriate for the cellular communication rather compared to other two.
  • 14. References B. A. A.Nunes,M. M. X.-N.N.K. O.a. T. T., 2014. A surveyof software-definednetworking:past, present,andfuture of programmable networks,. IEEECommunicationsSurveys&Tutorials, 16(3), p. 1617–1634. D. Kreutz,F.M. V.R. P. E. V.C. E. R. S. A. a. S.U., 2015. Software-definednetworking:a comprehensive survey. Proceedingsof theIEEE, 103(1), p. 14–76. Hai Xue,K.T. K. a. H. Y. Y., 2018. PacketSchedulingforMultiple-SwitchSoftware-Defined NetworkinginEdge ComputingEnvironment. WirelessCommunicationsand MobileComputing, Volume 2018. Pandya,M. P. a. A.,2017. Edge Computing:DesignaFrameworkforMonitoringPerformance betweenDatacentersandDevicesof Edge Networks. InternationalJournalof Computer& MathematicalSciences, 6(6), p.73–77. Woensel,F.R.B. C. a. T. V.,2014. Finite queueingmodelingandoptimization:A selectedreview,. Journalof Applied Mathematics, Volume2014.