Calculate the data rate required for robot

Assignment Help Computer Networking
Reference no: EM132187107

Wireless Networks and Communication Assignment -

Part I: Encoding and error control

Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).

a) Calculate the data rate required for robot to remote controller communication.

b) Explain 3 types of suitable encoding techniques could be used to encode the status string.

c) At a certain instance, the sensors provided data as acceleration 5 m/s2, obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%.

i. Write the status string in binary for this instance.

ii. Represent the status string on ASK, FSK, and PSK encoding techniques.

d) Calculate the CRC for the status string derived in c) with polynomial divisor 11001101.

e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control.

Part II: Multiplexing and multiple access

Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.

a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams.

b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM.

c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.

i. For 48 subscribers what should be the subcarrier bandwidth (fb)?

ii. Propose a suitable subcarrier bit time of T to achieve orthogonality?

iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)?

Part III: Wi-Fi

Prime Living is a real estate company based in Victoria and you work form them as a consultant network engineer. The company has decided to open a new office in South Eastern suburbs and the floor plan of the building is shown below. The office consists of 5 rooms and on average 8 employees work at each room. The lounge is used by both staff and customers and on average about 25 devices connect to Wi-Fi. The clients wants you to design the network for them with at least 100 Mbps data rate for all wireless connections. As resources you've got one distribution system and few access points of 10 m range.

1978_figure.png

a) Design the network specifying the locations of access points and distributions system showing the backbone network.

b) Calculate the BSS and ESS sizes

c) Calculate the throughput for the DS.

d) Recommend a suitable IEEE substandard for the network and give reasons for your choice.

e) Recommend suitable security strategies for the network.

Reference no: EM132187107

Questions Cloud

What is the purpose of the visual : What are your most important considerations when you are composing a data visualization. List at least 3 considerations.
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
Ship goods as pallets instead of loose cartons : Why is it better to ship goods as pallets instead of loose cartons? Why are LCL lead times longer than FCL lead times?
Ethics sustainability and csr-mba : Julia F is the chief legal officer of a large European pharmaceutical company with worldwide interests and a high reputation. She has been asked to investigate
Calculate the data rate required for robot : MITS5003 Wireless Networks and Communication Assignment, Victorian Institute of Technology, Australia. Calculate the data rate required for robot
Which can lead to three-pronged advancement : The strategic goal is to help Maruti improve its skilled work force which can lead to a three-pronged advancement.
Create unadjusted trial balance from the ledger : Create unadjusted trial balance from the ledger. Prepare closing entries, remembering to close Income summary to Retained earnings.
Should the ciso be assessing hr policies : Should the CISO (Iris) be assessing HR policies? Why or why not?
What is the process of voluntary administration : BULAW2611 Organisations Law - What is voluntary administration? What is the process for appointing a voluntary administrator

Reviews

Write a Review

Computer Networking Questions & Answers

  How web caching can reduce delay in receiving object

Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user

  Research and discuss the deployment of a wireless network

Research and discuss the deployment of a wireless network.

  Analysis of the current network configurations

MN503 - Discuss a roadmap process to use internetworking architecture to support long- term business goals and administration and management of internetworking

  Constructing an outline for the research paper

In preparation for constructing an outline for the research paper, discuss the topic that you may have selected for the paper, and attempt to layout your approach to the research, and the sub-topics

  1 a discuss the importance of scada securityb why are scada

1. a. discuss the importance of scada security.b. why are scada systems particularly vulnerable to cyber treats? c.

  What is the value of the digest if the message is hello

Assume we have a very simple message digest. What is the value of the digest if the message is "HELLO"? Why is this digest not secure?

  Explain the usefulness of a traffic analysis

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Probability of given frame of additional frames

Show that the probability q that a given frame is not asked before n-1 additional frames have been sent (i.e., the window is exhausted) is q = (1+n)2-n.

  Explain the concept of protecting personal information

Understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology.

  Explain the usefulness of a traffic analysis

Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis

  Find laptop models which have internal networking capability

Many desktop computers and laptop computers now include automatic built-in network connectivity. Find and name specific desktop and laptop models which have internal networking capability.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd