Pcm encoder, Computer Network Security

Assignment Help:

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The resulting bit stream is then fed into a modem and the modulated signal is sent via a leased line across a PSTN to the monitoring room a few kilometres away as shown below: 

1648_PCM encoder.png

(a) Assuming that the sensor operates in the range or 900 °C to 1412°C which corresponds to +0 V and +1 V output respectively and has an operational bandwidth of 1,000 Hz. If the monitoring room wants to detect 32°C unit change in temperature of the furnace.

Calculate how many quantization levels are needed in the PCM encoder?

(b) What will be the minimum sampling rate needed to fully characterize the sensor signal?

(c) Hence, deduce the maximum bit-rate of this PCM set-up, assuming noiseless and error less conditions.

(d) Assume the modem uses 4-PSK modulation on a noiseless leased line with a bandwidth of 2000 Hz, deduce the Nyquist maximum data rate in bits per second.

(e) Assume that the leased line has a SNR of 9 dB, what is the  maximum bit-rate achievable to the nearest bit?

(f) Assume in real-life, the data rate through the leased line is 5555 bps with a minimum bit error rate of 10-6. Deduce the minimum received signal strength in dBW that is required assuming a  transmission media temperature of 25 °C. (Boltzmann's Constant k = 1.3803 X 10-23J/°K)


Related Discussions:- Pcm encoder

TCP / IP, Let me know the details of protocol tcp/ip

Let me know the details of protocol tcp/ip

What is data spoliation, QUESTION (a) What do you meant by data spoli...

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Locality of reference , LOCALITY OF REFERENCE PRINCIPLE:  Principle of...

LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

Asymmetric encryption-cryptography, Asymmetric Encryption Asymmetric encr...

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Describe the terms prime number and prime factorisation, (a) An opponent is...

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

What is triple key management scheme, Q. What is Triple Key Management Sche...

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Define half-duplex, A  half-duplex (HDX) system gives communication in b...

A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

Fragmentation, FRAGMENTATION One method is to limit datagram size to s...

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd