Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
1. A digitized voice channel is made by digitizing a 7 KHz bandwidth analog signal. The signal is to be sampled twice the highest frequency (two samples per hertz) . Assume each sample requires 16 bits. What is the required bit rate?2. If the signal at the beginning of a cable with -0.5 db/km has a power of 5 mW. What is the power of the signal at 8 Km.3. What are the propagation time and transmission time for a 10 M byte message if the bandwidth of the network is 2 Mbps. The distance between the sender and the receiver is 15,000 KM and the light travels at 2.4 x 108 m/s.4. Define Frequency Hopping Spread Spectrum and how it achieves bandwidth spreading.5. Explain how Direct Sequence Spread Spectrum expands the bandwidth of the original signal6. A multiplexer combines four 200 kbps channels using a time slot of 2 bits. Show the output with four arbitrary inputs. What is the frame rate? What is the frame duration? What is the bit rate? What is the bit duration?7. There are four sources each creating 250 characters per second. If the interleaved unit is a character and 1 synchronizing bit is added to each frame , find (a) the data rate of each source (b) the duration of each character in each source (c) the frame rate (d) duration of each frame (e) the number of bits in each frame (f) the data rate of the link8. Explain multilevel multiplexing, multiple slot multiplexing, pulse stuffing and framing bits with diagrams.9. Explain the process of streaming stored audio/video by using a web server with metafile, using a media server and Real time streaming protocol (RSTP)10. Explain JPEG image compression process with diagram.
Allocators can also be used to avoid problems with unsafe languages. C and C++ are pervasive, with huge amounts of existing code. They are also memory-unsafe languages, in that the
Q. Timers could be utilized to compute the current time. Provide a little description of how this could be accomplished. Answer: A program could utilize the following ap
Safety algorithm : This is to make sure if the system is in safe state or not. It may need an order of m x n2 operation to determine if the state of the system is safe or not.
What are the four necessary conditions of deadlock prevention? Ans: Four essential conditions for deadlock prevention: a. The meaning of removing the mutual exclusio
What are the different file operations? Create : - Space for the file in the file system update directory table. Write : - file name and data to be written is
Q. If each the access rights to an object are deleted the object can no longer be accessed. At this stage the object should also be deleted and the space it occupies should be ret
Write a short note about process. Unceremoniously, a process is a program in implementation. A process is too much than the program code, which is occasionally known as the tex
Q. You have devised a fresh page-replacement algorithm that you think may be optimal. In a few contorted test cases Belady's anomaly occurs. Is the fresh algorithm optimal? Descr
Write a short note on file organization and access. There are three methods to access files 1Record Access 2Sequential Access 3Random Access The record access
Since each thread has its own processing space therefore communication between threads will need to be done through a common global variable. Since multiple threads can access the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd