Calculate the data rate required for robot

Assignment Help Computer Networking
Reference no: EM132187107

Wireless Networks and Communication Assignment -

Part I: Encoding and error control

Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).

a) Calculate the data rate required for robot to remote controller communication.

b) Explain 3 types of suitable encoding techniques could be used to encode the status string.

c) At a certain instance, the sensors provided data as acceleration 5 m/s2, obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%.

i. Write the status string in binary for this instance.

ii. Represent the status string on ASK, FSK, and PSK encoding techniques.

d) Calculate the CRC for the status string derived in c) with polynomial divisor 11001101.

e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control.

Part II: Multiplexing and multiple access

Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.

a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams.

b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM.

c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.

i. For 48 subscribers what should be the subcarrier bandwidth (fb)?

ii. Propose a suitable subcarrier bit time of T to achieve orthogonality?

iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)?

Part III: Wi-Fi

Prime Living is a real estate company based in Victoria and you work form them as a consultant network engineer. The company has decided to open a new office in South Eastern suburbs and the floor plan of the building is shown below. The office consists of 5 rooms and on average 8 employees work at each room. The lounge is used by both staff and customers and on average about 25 devices connect to Wi-Fi. The clients wants you to design the network for them with at least 100 Mbps data rate for all wireless connections. As resources you've got one distribution system and few access points of 10 m range.

1978_figure.png

a) Design the network specifying the locations of access points and distributions system showing the backbone network.

b) Calculate the BSS and ESS sizes

c) Calculate the throughput for the DS.

d) Recommend a suitable IEEE substandard for the network and give reasons for your choice.

e) Recommend suitable security strategies for the network.

Reference no: EM132187107

Questions Cloud

What is the purpose of the visual : What are your most important considerations when you are composing a data visualization. List at least 3 considerations.
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
Ship goods as pallets instead of loose cartons : Why is it better to ship goods as pallets instead of loose cartons? Why are LCL lead times longer than FCL lead times?
Ethics sustainability and csr-mba : Julia F is the chief legal officer of a large European pharmaceutical company with worldwide interests and a high reputation. She has been asked to investigate
Calculate the data rate required for robot : MITS5003 Wireless Networks and Communication Assignment, Victorian Institute of Technology, Australia. Calculate the data rate required for robot
Which can lead to three-pronged advancement : The strategic goal is to help Maruti improve its skilled work force which can lead to a three-pronged advancement.
Create unadjusted trial balance from the ledger : Create unadjusted trial balance from the ledger. Prepare closing entries, remembering to close Income summary to Retained earnings.
Should the ciso be assessing hr policies : Should the CISO (Iris) be assessing HR policies? Why or why not?
What is the process of voluntary administration : BULAW2611 Organisations Law - What is voluntary administration? What is the process for appointing a voluntary administrator

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd