What is the maximum achievable data rate, Computer Network Security

Assignment Help:

Question:

a) How many bits per second can be sent on a noiseless 4 MHz channel if four-level digital signals are used?

b) If a binary signal is sent over a 3 KHz channel whose SNR is 30 dB, what is the maximum achievable data rate?

c) A modem constellation diagram has data points at the following coordinates: (1,1), (1,-1), (-1,1) and (-1,-1). How many bits per second can a modem with such parameters achieve at 2400 baud?

d)

i) Using an example, explain how CRC is used for error control.

ii) A 50 Km long cable runs at the T1 data rate (1.544 Mbps). The propagation speed in the cable is 200 m/µs. How many bits fit in the cable?

e) Sketch the differential Manchester encoding for the following bit stream: 0011101


Related Discussions:- What is the maximum achievable data rate

Network protocol hierarchy , This assignment aims to enhance students' unde...

This assignment aims to enhance students' understanding of the network protocol hierarchy and flow control and error control techniques by implementing a sliding window protocol in

Software vulnerabilities, 1.  We used the National Vulnerability Database. ...

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Find the possible deciphering transformations, Question: (a) A string o...

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Computer fundamentals, Ask You have been asked by a new client to assist i...

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Enterprise information security policy (eisp), Enterprise Information Secur...

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Securing the network using a packet filter firewall, 1. Network Design ...

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Limitations of firewall, Limitations of firewall Firewalls cannot prote...

Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd