Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mits5003 Wireless Networks And Communication Assessment Answers

  80 Download     📄   7 Pages / 1679 Words
Part I: Encoding and error control
Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits). 
a) Calculate the data rate required for robot to remote controller communication
b) Explain 3 types of suitable encoding techniques could be used to encode the status string.
c) At a certain instance, the sensors provided data as acceleration 5 m/s2 obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%. 
i. Write the status string in binary for this instance
ii. Represent the status string on ASK, FSK, and PSK encoding techniques
d) Calculate the CRC for the status string derived in c) with polynomial divisor
e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control
Part II: Multiplexing and multiple access
Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.
a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams
b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM
c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.
i. For 48 subscribers what should be the subcarrier bandwidth ( fb ) ?
ii. Propose a suitable subcarrier bit time of T to achieve orthogonality
iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)

Answer:

Part I: Encoding and error control

Sam is a computer science student and working on a new micro robot design. The robot continuously sends every two seconds a status string comprising the accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).

  1. a) Calculate the data rate required for robot to remote controller communication  

Bits sent per second= data rate

Bits sent on two seconds  = 2+4+6+4

=16 bits  

16 bits is in the Interval of 2 seconds so in one second  it will be 8bits.

  1. b) Explain 3 types of suitable encoding techniques could be used to encode the status string.

Non return to zero 

in this technique one level of voltage zero corresponds to another which corresponds to One

 

Pseudoternary

Involves encoding the ones with flat lines and zeros with negative and positive voltages alternating

Non return to zero invert

Encoding depends on the bit that is before. It should have some starting point

  1. c) At a certain instance, the sensors provided data as acceleration 5 m/s2, obstacle at 48 cm, all motors working (i.e. motor functionality 1111), and battery is 75%.  
  2. Write the status string in binary for this instance

Status string= readings in accelerometer + motor status functionality + battery level status + obstacle detection in ultrasound reading

Binary convertion

Ultrasound= 48cm

Binary = 110000

Acceleration = 5m/s2

 Binary = 0101

Motor status = 1111

Level of the battery 75/100 which is 0.75

Binary = 0.11

Combined status string will be a sequence of the individual strings status

= 0101+110000+1111+0.11

= 0101110000111111


  1. Represent the status string on ASK, FSK, and PSK encoding techniques

FSK

FSK is the switching of the sinusoidal career wave frequency, depending on the digital input signal

Bit string = 010111000011111

FSK is achieved through changing the frequency of the sinosidal carrier according to the digital input signal 

ASK

Bit string = 01011100001111

Carrier wave is transmitted when the input is one but it is not transmitted when the input is 0

PSK

A phase shift of 180 degrees takes place whenever there is a change in the input signal e.g from 1 to 0 or from 0 to 1 

  1. d) Calculate the CRC for the status string derived in c) with polynomial divisor 11001101

First step

Input bit sequence = Data word

010111000011111 =

No of divisor digits -1= additional digits

                  8-1 = 8

  7

Second step

The seven digits are added to the data word to form augmented dataword

Augmented data word= data word + additional digit

                                  = 0101110000111111+ 0000000

                                   =  01011100001111110000000

Third step

Augmented data is changed to polynomial

01011100001111110000000

X21+X20+X19+X18+X16+X15+X14+X9+X8+X7+X6+X5+X4

Forth step

The divisor is changed in to polynomial

11001101

X7+X6+X3+X2+1

Fifth step

  1. e) Briefly explain some other error control and flow control techniques that Sam can use to ensure the accuracy of robot control

Sliding window flow control

The sender and receiver need to have a window of frames. Every particular frame is numbered according to the sliding window for a window of size p , the number 0 to p-1 is given to the frame. Many frames can be sent by the sender as long as it fits in a window. A slide is when a receiver sends an acknowledgement after receiving the frames sent up to a certain point. For example p=8  the size of the window is (p-1) 7 .

Stop and wait Flow control

For every frame that has been sent the sender has to wait for an acknowledgement because the other frame can only be sent after the frame has been received.This process goes on until the sender sends an (EOT)End of Transmission frame . 

Vertical Redundancy Check (VRC)

Parity bit which is aredundant bit  is applied in every data unit in order for the total number of 1’s to be even. 

Checksum

Two algorithms are in place the checksum generator at the receiver and checksum generator at the sender. The following steps are followed by the sender the data units are divided in to sections then units . The sections are then added using 1’s compliment so as to get the sum. The checksum is achieved when the sum is completed after that the data is sent with the checksum. The unit received is divided into sections each of specific bits therefore an addition is done of the section using 1’s complement to get the sum the end of the calculation the data is only accepted if it is zero. (Thomas, Sharma, Banerjee, Lee, & Dalal, 2013) 

Part II: Multiplexing and multiple access

Multiplexing plays an important role in communication as it allows the combination of multiple streams together. Different multiplexing techniques are used for various applications.

  1. a) Explain TDM, FDM and CDMA multiplexing techniques with suitable diagrams

TDM(Time Division Multiplexing)

This is a technique which allows the whole frequency bandwidth to be accessed but for a short period of time. Co-channel interference occurs when two different transmissions overlap

FDM( Frequency Division Multiplexing)

FDM allows the channel to occupy a fraction of the frequency. Channels are defined through the center of the bandwidth and the frequency. Example of this technique is radio and television signals (Holma & Toskala, 2009)

CDMA(Code Division Multiple Access)

Channels sharing frequency simultaneously occurs in this technique. An example of CDMA is GPS(Global Positioning System). CDMA uses analog to digital conversion together with spread spectrum technology (Palanki, Khandekar, & Sutivong, 2014) .

  1. b) Main air interface in the change from 3G to 4G and WiMAX. Explain how OFDM is different from above techniques and the special feature of signals used by OFDM

OFDM has better performance and tolerance furthermore it allows more subscribers in, multiple cellular application. The signal used in OFDM is subdivided into small chunks called sub-carriers which are supposed to be orthogonal during transmission this gives room for consistency and reach of the waves in real time (Hwang, Yang, Wu, Li, & Li, 2009).

  1. c) IEEE 802.11ac wireless LAN standard uses 40 MHz total bandwidth in OFDM scheme.
  2. For 48 subscribers what should be the subcarrier bandwidth ( fb ) ?

 fb= allowable number of sub carriers

Channel bandwidth = 40MHz

Allowable subcarriers = 128 sub carriers

fb=40MHz/128subcarriers

= 0.3125MHz

= 312.5 KHz

  1. Propose a suitable subcarrier bit time of T to achieve orthogonality

 T= 1/f(b)

fb= 0.3125

T=1/0.3125

=0.0032 micro seconds

iii. Explain how OFDM overcomes the issue of inter symbol interference (ISI)  

It modulates data in the frequency domain over short subcarriers and this results to long OFDM symbols which are longer than the delay spread. A cyclic prefix which has an appropriate length is chosen to avoid inter-OFDM-symbol interference (Thomas et al., 2013)

Part III: Wi-Fi

  1. a) Design the network specifying the locations of access points and distributions system showing the backbone network.
  1. b) Calculate the BSS and ESS sizes

Room 1

Area= L*W

=10*10

=100m2

 BSS size=100m2

Room 2

Area= L*W

=10*10

=100m2

 BSS size=100m2

Room 3

Area= L*W

=10*10

=100m2

 BSS size=100m2

Room 4

Area= L*W

=10*10

=100m2

 BSS size=100m2

Room 5

Area= L*W

=10*10

=100m2

 BSS size=100m2

Lounge and reception

Area= L*W

=20*10

=100m2

 BSS size=100m2

Extended Service Set(ESS)

ESS= Total coverage area of all the access points connected to the Distribution switch

=Area(Lounge+room5+room4+room3+room2+room1)

= (200+100+100+100+100+100)

=700m2

  1. c) Calculate the throughput for the DS

 The actual data passing through the network per second

For every room throughput(100*8)mbps

=800mbps

The rooms are five so(800*5)

=4000mbps

Lounge thoughput (100*25)

=2500mbps

Total throughput = 4000+2500

= 6500

  1. d) Recommend a suitable IEEE substandard for the network and give reasons for your choice

 IEEE wifi is good for the above setup that is IEE 802.11ac because it allows video streaming , the buffering is less and surfing will be faster.

  1. e) Recommend suitable security strategies for the network

Use only wpa2 encryption, WPS to be turned off, make a point of changing Access point password.

References

Holma, H., & Toskala, A. (2009). LTE for UMTS: OFDMA and SC-FDMA based radio access. John Wiley & Sons.

Hwang, T., Yang, C., Wu, G., Li, S., & Li, G. Y. (2009). OFDM and its wireless applications: A survey. IEEE Transactions on Vehicular Technology, 58(4), 1673–1694.

Palanki, R., Khandekar, A., & Sutivong, A. (2014). Code division multiplexing in a single-carrier frequency division multiple access system. Google Patents.

Thomas, D. A., Sharma, P., Banerjee, S., Lee, S.-J., & Dalal, A. C. (2013). Method and system for content downloads via an insecure communications channel to devices. Google Patents.

Copyright © 2009-2023 UrgentHomework.com, All right reserved.