Beruflich Dokumente
Kultur Dokumente
FINAL PRODUCT
3. What is the bandwidth of a signal that can be decomposed into five sine waves with
the frequencies at 0, 15, 55, 105, and 205 HZ? All peak amplitudes are the same.
Draw the bandwidth.
8. A signal travels from point A to point B. At point A, the signal power is 100 W. At
point B, the power is 90 W. What is the attenuation in decibels?
9. The attenuation of a signal is -10 dB. What is the final signal power if it was
originally 5 W?
10. If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of
100,000 bits out of this device?
11. A line has a signal-to-noise ratio of 1000 and a bandwidth of 4000 KHz. What is the
maximum data rate supported by this line?
12. Ifthe peak voltage value of a signal is 20 times the peak voltage value ofthe noise,
what is the SNR? What is the SNRdB?
13. What is the theoretical capacity of a channel in each of the following cases: a.
Bandwidth: 20 KHz SNRdB =40 b. Bandwidth: 200 KHz SNRdB =4 c. Bandwidth:
1 MHz SNRdB =20
14. We have a channel with 4 KHz bandwidth. If we want to send data at 100 Kbps, what
is the minimum SNRdB? What is SNR?
15. What is the transmission time of a packet sent by a station if the length of the packet
is 1 million bytes and the bandwidth of the channel is 200 Kbps?
16. What is the length of a bit in a channel with a propagation speed of 2 x 108 mls if the
channel bandwidth is
a. 1 Mbps?
h. 10 Mbps?
c. 100 Mbps?
17. How many bits can fit on a link with a 2 ms delay if the bandwidth of the link is
a. 1 Mbps?
h. 10 Mbps?
c. 100 Mbps?
18. Draw the graph of the NRZ-L scheme using each of the following data streams,
assuming that the last signa11evel has been positive. From the graphs, guess the
bandwidth for this scheme using the average number of changes in the signal level.
a. 01010100
b. 11011010
c. 11000101
d. 00111011
e. 11011101
23. What is the Hamming distance for each of the following codewords:
a. d (10100, 011000)
b. d (10101, 10010)
c. d (11111,11111)
d. d (01100, 11000)
24. Using the code in Table 10.2, what is the dataword if one of the following codewords
is received?
a. 01011
b. 11111
c. 00000
d. 11011
25. Show that the Hamming code C(7,4) of Table 10.4 can detect two-bit en-ors but not
necessarily three-bit error by testing the code in the following cases. The character
"V" in the burst en-or means no en-or; the character "E" means an error.
a. Dataword: 0100 Burst error: VEEVVVV
b. Dataword: 0111 Burst error: EVVVVVE
c. Dataword: 1111 Burst error: EVEVVVE
d. Dataword: 0000 Burst en-or: EEVEVVV
26. . Show that the Hamming code C(7,4) of Table 10.4 can correct one-bit errors but not
more by testing the code in the following cases. The character "V" in the burst error
means no error; the character "E" means an error.
a. Dataword: 0100 Burst error: EVVVVVV
b. Dataword: 0111 Burst error: VEVVVVV
c. Dataword: 1111 Burst error: EVVVVVE
d. Dataword: 0000 Burst error: EEVVVVE
32. A sender needs to send the four data items 0x3456, 0xABCC, 0x02BC, and 0xEEEE.
Answer the following:
a. Find the checksum at the sender site.
b. Find the checksum at the receiver site if there is no error.
c. Find the checksum at the receiver site if the second data item is changed to 0xABCE.
d. Find the checksum at the receiver site if the second data item is changed to 0xABCE
and the third data item is changed to 0x02BA
33. This problem shows a special case in checksum handling. A sender has two data
items to send: 0x4567 and 0xBA98. What is the value of the checksum?
35. A sender needs to send the four data items 0x466F, 0x726F, 0x757A, and 0x616E.
Answer the following:
a. Find the checksum at the sender site.
b. Find the checksum at the receiver site if there is no error.
36. What is the difference between half-duplex and full-duplex transmission modes?
37. Name the four basic network topologies, and cite an advantage of each type
38. What are some of the factors that determine whether a communication system is a
LAN or WAN?
39. What is the maximum number of characters or symbols that can be represented by
Unicode?
40. For each of the following four networks, discuss the consequences if a connection
fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology
41. You have two computers connected by an Ethernet hub at home. Is this a LAN, a
MAN, or a WAN? Explain your reason
42. What is the relationship between period and frequency?
43. What does the amplitude of a signal measure? What does the frequency of a signal
measure? What does the phase of a signal measure?
44. Name three types of transmission impairment.
45. What does the Nyquist theorem have to do with communications?
46. What does the Shannon capacity have to do with communications?
47. How does a single-bit error differ from a burst error?
48. Discuss the concept of redundancy in error detection and correction.
49. Distinguish between forward error correction versus error correction by
retransmission.
50. What is the definition of a linear block code? What is the definition of a cyclic code?
51. What is the Hamming distance? What is the minimum Hamming distance?
52. How is the simple parity check related to the two-dimensional parity check?
53. In CRC, show the relationship between the following entities (size means the
number of bits):
a. The size of the dataword and the size of the codeword
b. The size of the divisor and the remainder
c. The degree of the polynomial generator and the size of the divisor
d. The degree of the polynomial generator and the size of the remainder
54. What kind of arithmetic is used to add data items in checksum calculation
55. What kind of error is undetectable by the checksum?
56. Can the value of a checksum be a llOs (in binary)? Defend your answer. Can the
value be a ll1s (in binary)? Defend your answer.