Wireless Network and Communication Assignment, Semester 2

Verified

Added on  2023/03/30

|19
|1141
|234
Homework Assignment
AI Summary
This document presents a comprehensive solution to a wireless network and communication assignment. It covers various modulation techniques such as Amplitude Shift Keying, Frequency Shift Keying, and Phase Shift Keying, including their application to binary data conversion. The assignment also includes computations for frequency assignments based on given parameters, the drawing of analog and frequency modulation waveforms, and the creation of a 16 QAM constellation diagram. Furthermore, it explains the error detection process using Cyclic Redundancy Check (CRC) and computes the frame check sequence and transmitted signal using Direct Sequence Spread Spectrum. The solution further differentiates between Infrastructure and ad hoc modes in WLAN, compares TCP and OSI protocols, and explains the advantages of hexagonal cell shapes in cellular communications. References are also provided.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: - WIRELESS NETWORK AND COMMUNICATION
WIRELESS NETWORK AND COMMUNICATION
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1WIRELESS NETWORK AND COMMUNICATION
Assignment No-2
1. Convert the binary data “011010” into analog waveforms using following modulation
techniques:
a. Two level Amplitude Shift Keying
b. Two level Frequency Shift Keying
Document Page
2WIRELESS NETWORK AND COMMUNICATION
c. Two level Phase Shift Keying
Document Page
3WIRELESS NETWORK AND COMMUNICATION
d. Differential Phase shift keying
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4WIRELESS NETWORK AND COMMUNICATION
e. Four level Amplitude Shift Keying
Document Page
5WIRELESS NETWORK AND COMMUNICATION
f. Four level Phase Shift Keying
Document Page
6WIRELESS NETWORK AND COMMUNICATION
g. Eight level Amplitude Shift Keying
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7WIRELESS NETWORK AND COMMUNICATION
2. With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute the frequency
assignments for each of the sixteen possible 4-bit data combinations.
From the given data,
fc = 500 kHz, fd = 25 kHz, and M = 16, L = 4 bits
fi=fc + (2i – 1 – M) *fd
M=2^L =2^4 = 16, M=16
0000 where i=1, f1= 125KHz
0001 where i=2, f2= 175KHZ
0010 where i=3, f3= 225KHZ
0011 where i=4, f4= 275KHz
0100 where i=5, f5= 325KHz
0101 where i=6, f6= 375KHz
0110 where i=7, f7= 425KHz
Document Page
8WIRELESS NETWORK AND COMMUNICATION
0111 where i=8, f8=475KHz
1000 where i=9, f9=525KHz
1001 where i=10, f10= 575KHz
1010 where i=11, f11= 625KHz
1011 where i=12, f12=675KHz
1100 where i=13, f13= 725KHz
1101 where i=14, f14=775KHz
1110 where i=15, f15=825KHz
1111 where i=16, f16=875KHz
The given value can provide the required data rate
1/Tb = 2Lfd = 2*4*25 = 200Kbps
3. Draw the approximate Analog Modulation and Frequency Modulation waveforms in
complete steps for the following signal:
Document Page
9WIRELESS NETWORK AND COMMUNICATION
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10WIRELESS NETWORK AND COMMUNICATION
4. Draw the 16 QAM Constellation Diagram having two different amplitude levels and
eight different phase levels.
5. Explain and draw the Error Detection Process for Cyclic Redundancy Check (CRC).
There are certain number of errors are seen in the communication channel which can
be traced by the help of cyclic redundancy check. The check comprises of series of steps.
Cyclic redundancy check is mainly seen at two ends that is receiver and transmitter. The
whole of the binary data conversion where binary conversion is seen along with k-1 zeros. As
soon as process module 2 binary division is done by with the process of the given key. The
given data is completely made available from the stored data containing the value. The data
added is completely available from the given data and is seen at the side of receiver. The
overall value of receiver is mainly done by the value of 1-bits and completely send to the
transmitter.
Document Page
11WIRELESS NETWORK AND COMMUNICATION
6. Compute the frame check sequence for the following information:
Message = 10111100, Pattern = 11011
Document Page
12WIRELESS NETWORK AND COMMUNICATION
7. Compute the transmitted signal using Direct Sequence Spread Spectrum for the
following information: Input: 1011, Locally Generated PN bit stream: 101011011010, T
= 3Tc
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13WIRELESS NETWORK AND COMMUNICATION
Document Page
14WIRELESS NETWORK AND COMMUNICATION
8. What is the difference between Infrastructure and ad hoc modes in WLAN? Draw
their relative diagrams as well.
Infrastructure mode network is completely differentiated from the given one that is
mode of ad-hoc. The complete infrastructure aims to offer communication in various wireless
node and the another one is access node. The whole process of communication is completely
indirect in nature for providing for the wireless node. In the case of ad-hoc network each and
every node is made completely free from any kind of communication which does not have
any kind of requirement of the access node. The ad-hoc is completely set for and the whole
method is not that much convenient. The whole of the process is made at minimum cost.
While the instance of infrastructure model all the given step is very much complex and very
much difficult in nature. The overall cost is considered to be very high.
Document Page
15WIRELESS NETWORK AND COMMUNICATION
9. Compare the differences of TCP and OSI protocols for wired and wireless LANs
using diagrams.
` TCP/IP is known to be client server model where client request for service is mainly
given by server. On contrary, OSI model is a conceptual model one. TCP/IP is a well-known
standard which is made available in various kind of network inclusive of internet. OSI is
known to be reference model needed for having understanding with respect to design of
architecture of system. TCP/IP is known to be four layered model whereas OSI comes up
with seven layers. TCP/IP is to be vertical while OSI model aims to provide support for
horizontal approach. TCP/IP is known to be tangible OSI is different from this.
10. Explain why the square and circle shapes cells for cellular communications are not
appropriate as compared to hexagonal shape cells.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16WIRELESS NETWORK AND COMMUNICATION
Each and every system comes up with a list of pros and cons which needs to be completely
tackled. All short of communication is done in certain areas which needs to be addressed by
the uniform distribution along with all the expected regions which are completely undertaken
by cell. In the case of square shape cell, all the required area does not have any kind of signal
while in the instance the circle shape is in the shape of hexagon shape in which areas have
uniform distribution of signal.
Document Page
17WIRELESS NETWORK AND COMMUNICATION
References
Colin, J.Y., Mathieu, H. and Nakechbandi, M., 2016, May. A proposal for an open logistics
interconnection reference model for a Physical Internet. In 2016 3rd International
Conference on Logistics Operations Management (GOL) (pp. 1-6). IEEE.
DMello, A., Foo, E. and Reid, J., 2018, November. Characterizing TCP/IP for High
Frequency Communication Systems. In 2018 Military Communications and Information
Systems Conference (MilCIS) (pp. 1-7). IEEE.
Huang, J. and Cai, L., 2018, April. Research on TCP/IP network communication based on
Node. js. In AIP Conference Proceedings (Vol. 1955, No. 1, p. 040115). AIP Publishing.
Nath, P.B. and Uddin, M.M., 2015. TCP-IP Model in Data Communication and
Networking. American Journal of Engineering Research, 4(10), pp.102-107.
Santos, M.G.M. and Marcillo, P.A.A., 2018. Security in the data link layer of the OSI model
on LANs wired Cisco. Journal of Science and Research: Revista Ciencia e
Investigación, 3(CITT2017), pp.106-112.
Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless
networks: principles, protocols, and applications. CRC Press.
Sherlock, K.G., Cooper, G.H., Guzik, J.R., Pearcy, D.P. and Valente, L.F.P., McAfee LLC,
2013. Identities correlation infrastructure for passive network monitoring. U.S. Patent
8,584,195.\
Wang, Z., Chen, C.J., Xiao, K., Jiang, H., Fife, J.R. and Bhoja, S., Broadcom Corp,
2013. Communication device employing binary product coding with selective additional
cyclic redundancy check (CRC) therein. U.S. Patent 8,572,460.
Document Page
18WIRELESS NETWORK AND COMMUNICATION
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]