Analogue to digital conversion and source coding

Assignment Help Computer Network Security
Reference no: EM132205100

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.
ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.
ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Assessment - Analyzing Digital Communications Principles & Systems Both Manually and Using MATLAB/Simulink

Purpose of the assessment

(Unit's Learning Outcomes covered, ULO) ULO b: Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated signals.

ULO c: Report on the characteristics of sampling and analogue to digital conversion and source coding.

ULO f: Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices.

Objectives of the assignment:

This assignment seeks to fulfill the unit's learning outcomes b-e stated on Page 1 of this document and found in the unit description. The assignment

Question 1: ISI and Design of Equalizers

Combating inter-symbol interference (ISI) is one of the challenges in digital communications systems. Assume that the impulse response of the transmission medium between the transmitter and the receiver is p(t). The sampled impulse response is p[n], where n=t/T and T is the sampling period (or symbol duration). Then, ISI-free transmission require that

p(t) = δ(t) = { 1, t=0

                  { 0, otherwise   δ(t)

where is referred to as dirac impulse function. In practical, situations the transmission medium is not ISI-free. This is the reason why we need equalizing filters. Assume that the sampled impulse response of the channel is

p[n]= δ [n] - 0.2δ [n -1] + 0.5δ [n - 2]

(a) Derive the expression for the transfer function of the 3-tap linear equalizer which forces the ISI caused by this transmission medium to zero.
(b) Derive the expression for the impulse response of the 3-tap ZF-LE designed in Part (a).
(c) Verify that the ZF-LE that you have designed in Parts (a) and (b) actually mitigates the ISI in the channel.
(d) Does the ZF-LE cancel the entire ISI in the system? If not, how can you improve the ability of the ZF-LE to suppress the ISI?

Question 2: Digitization of signals

Consider the analog signal s(t ) = 5sin(500t + Π/5)+ cos(200t + Π/4) to be transferred over a digital communications system.

(a) Compute the maximum allowable sampling period that the analog-to-digital converter (ADC) must use to ensure the perfect reconstruction of the signal at the receiver.

(b) What theorem governs the choice made in part (a)?
(c) How many samples of the analog signal do we need to store in order to reproduce 10Π seconds of it (i.e., the analog signal)?
(d) Use MATLAB code to verify whether or not the samples collected can be used to uniquely reproduce the analog signal.

Question 3: Digital Baseband Data Generation and Transmission

We seek to transmit the message ME502 Unit using baseband digital M-ary PAM signaling, where M=16. As the transmission system is not ideal, we need to protect the bits using just a single-bit odd parity encoding for error detection. The process is that we convert each of the characters in the message into its equivalent 8-bit ASCII code, then partition the bitstream into log2(16)-bit segments streams (called symbols), then use each symbol to modulate a pulse to form the M-PAM signal prior to transmission.

(a) Encode the message into a series of bits using 8-bit ASCII encoding (including the odd- parity bit). Counting from the left side, the eighth bit in each character is the parity coding bit.

(b) How many bits in total are in the message?

(c) Divide the bit string into m= log2(16)-bit segments. Each of the m-bit segment is a symbol of 16-PAM. How many symbols do you get altogether?

(d) Evaluate the gross bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds.

(e) Determine the effective bit rate (Rb) and symbol rate (RS) of the 16-PAM system if we transmit the entire error-protected message in 8 microseconds

(f) Draw the signal constellation diagram of the M-PAM system, using d as a parameter.

Verified Expert

In this work we have designed expression for 3 tap linear equalizer for the discrete impulse response equation and analyzed whether the system has reduced inter symbol interference or not.Then wrote the matlab program to transmit and reproduce the analog signal over the digital communication medium. Finally ASCII to binary conversion is computed, for that constellation diagram is drawn.

Reference no: EM132205100

Questions Cloud

Vital to the success of every business organization : Why do you think communication is vital to the success of every business organization. Explain briefly.
Quality management will teach us the theories : 'Quality Management' will teach us the theories behind how and why organizations have to ensure their products and services remain consistent.
Consider that you are the buyer evaluating supplier : Consider that you are the buyer evaluating a supplier. Briefly explain the product and service provided.
Benefit of using models in decision making : Which of the following is not a benefit of using models in decision making? The responsibilities of the operations manager include.
Analogue to digital conversion and source coding : ME502 - Digital Communications - How many samples of the analog signal do we need to store in order to reproduce 10? seconds of it (i.e., the analog signal)
Part of your responsibilities is workers compensation : You currently work in Human Resources as the Benefits Manager and part of your responsibilities is Workers’ Compensation.
Any legitimate place in company human resource policies : Does genetic testing have any legitimate place in a company’s human resource policies today?
What your authors means by firm having market orientation : Explain what your authors means by a firm having a market orientation. Give a specific example of a firm and its product (s) that exhibit a market orientation.
Identification of the ethical issues : The analysis should include the following: Identification of the ethical issues involved (what was the alleged ethical wrong done, and why is/was it wrong?)

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd