The data rate is how far we can send data from A to B every second
From the diagram the robot sends 16bits that is 4bits accelerometer, 6bits ultrasound detection, 4 bits motor functionality and 2 bits battery level. The total is 16bits bits string
If 2=16bits
therefore 1s=16/2
=8bps
Data rate is 8bps
(Koenig et al., 2013)
For ensuring the best utilization of bandwidth the following line encoding techniques could be used in the robot set up
The unipolar is the simplest and here you have got the two voltage level. Uni means 1 so you are sending an only voltage of one polarity say 2A. And here you are not sending anything that is considered top be 0 V (Tsonev, Sinanovic, & Haas, 2012). That means when you are not sending anything that is 0V and when sending something that is 2A volts.
This is illustrated below
In Manchester encoding, there is a transition in the middle of each bit sent. A binary one represents a low to high transition and a binary zero represent a high to low transition in the middle(Lee & Pan, 2015). This is illustrated in the figure below
In differential Manchester, the presence of a transition at the beginning of the bit is represented by binary zero. This is shown in the figure below
The status string can be represented by forming an array of the various individual bits that form the message sent by the robot. This array includes the accelerometer reading, ultrasound, motor reading and the battery level all converted to binary
Convert all the message provided in binary
The accelerometer is 5m/s2 which when converted to binary brings 0101
Ultrasound detects an obstacle at 48cm. When converted to binary we get 110000
The motor status is given already in binary hence requires no conversion that is 1111
The battery level is 75% which in decimal is 0.75 in decimal. This gives 0.11. which is just 01
The status string, therefore, is 0101110000111101
Represent the status string on ASK, FSK, and PSK encoding techniques
In amplitude shift keying, the carrier signal is always transmitted whenever there is a logic one being sent over the media while no carrier signal is transmitted whenever logic zero is transmitted over the network(Meltzer, 2011). This is shown below
In frequency shift keying, the frequency of the carrier wave is varied or switched whenever logic one is transmitted while no change is done to the carrier wave whenever logic zero is transmitted (Manfrini et al., 2011). This is as shown below.
In phase shift key, the phase of the carrier wave is change by 180o whenever there is a transition from a logic one to logic zero or from logic zero to logic one but no change in phase is done whenever there is no transition in the data bits(Chow, Talli, Ellis, & Townsend, 2008). This is as shown below.
Calculate the CRC for the status string derived in 3) with polynomial divisor 11001101
Cyclic redundancy check is an error correcting algorithm that uses redundant codes sent along with the data to the receiver and the receiver uses the preshared code to detect whether what was sent is actually what has been received (Olson, Grohoski, & Spracklen, 2013). The process of calculating a CRC is as follows,
Get the data word bits. In this case, the data word is a 16bits string as shown below.
0101110000111101.
Get the divisor bits. In this case, it is given as an 8bits string that is 11001101
Calculate the number of additional bits to add to the data word. To get this subtract 1 from the bit length of the divisor to get the off bits to add to the data word
Lenght of divisor=8-1
=7
Therefore the off bits to add to data word is 0000000
The new data word is 01011100001111010000000. This is now called the Augmented data word
Get the code word. To do this, we have to do the long division of the augmented data word with the divisor.
This step can be done more intuitively using the polynomial long division.
Convert the augmented data word into polynomial and again convert the divisor into polynomial then conduct the polynomial long division.
The remainder after conducting the CRC shall be used to check for errors. The quotient shall form the coded word and it is what gets transmitted over to the receiver.
At the receiver, the receiver, the receiver shall perform a polynomial long division of the code word and the pre-shared divisor. If the remainder is zero, then the receiver can conclusively make the assumption that no errors occurred during the transmission while a non-zero error would signify there are errors in the transmitted message and request for retransmission.
The steps are summarised below.
In this protocol, whenever a packet is sent to the receiver, the receiver actually replies in form of acknowledgments. After receiving the acknowledgment, the sender will get this idea that the packet has been received successfully. The sender encapsulates a timer for every packet sent. If the sender receives an acknowledgment within the duration of the timer then that’s okay but if the timer expires without receiving an acknowledgment, then the sender will have to resend the packet again.(Cui, Wang, Wang, Wang, & Wang, 2015) The above is illustrated below
FEC(Forward Error Control0
FEC is a method of error control that is used to detect and correct errors over unreliable or noisy channels. The central idea is that the sender encodes the bits to be sent in a redundant way by using an error correcting bits using the Hamming code. The redundancy enable the receiver to try to correct a limited number of errors that may have occurred in the message and often corrects such errors without the need for retransmission by the senderFEC gives the receiver the ability to correct errors without the need of a reverse channel to request retransmission but at a cost of higher channel bandwidth (Reed & Chen, 2012)
In FDMA, the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data and it belongs to the station all the time. Suppose we have a bandwidth subdivided into four bands band1, band2, bannd3, band4 and each station is allocated a particular band and that band belongs to the station all the time. This is illustrated in the diagram below
In this method, the stations share the bandwidth of the channel in time using the round robin algorithm. Each station is allocated a time slot during which it can send. In TDMA, the bandwidth of the channel is just one I.e time-shared between different stations (Palanki & Khandekar, 2012).
In CDMA, one channel carries all transmission simultaneously.CDMA means communications with different codes and the codes must meet the following mathematical properties
CDMA uses the principle of frequency hopping spread spectrum and direct sequence to spread the sender data with codes and send together with the coded data that only the receiver with the same unique code shall be able to receive and decode the message.
This is illustrated in the figure below
Orthogonal Frequency Division Multiplexing is quite similar to the FDMA since it majorly uses the fundamental principle of FDMA which allows simultaneous transmission of multiple messages over a single channel. OFDM differs with the traditional multiplexing techniques. It uses a number of parallel narrow-band subcarriers instead of a single wide-band carrier to transport information making it much effective and efficient in wireless communication. To achieve this, the signals used in an OFDM must be orthogonal to each other that is their dot multiplication of two adjacent signals is always zero(Ratasuk, Ghosh, & Xiao, 2012).
Subcarrier bandwidth
Bandwidth is Frequency/No of Subscribers
=40MHz/48 subscribers
=0.8333MHz/subscriber
=833.3KHz/subcarrier
Bit time T is the reciprocal of the subcarrier bandwidth to achieve orthogonality
T=1/f
=1/0.8333
=1.2s
iii. Explain how OFDM overcomes the issue of intersymbol interference (ISI)
Inter-Symbol Interference is overcome in OFDM by ensuring that any two subcarrier signals are orthogonal to one another that is a dot multiplication of the two adjacent signals is always zero. This orthogonality property makes OFDM subcarriers to be closely packed to one another without causing ISI interference (Han & Zhang, 2009).
system showing the backbone network.
The Basic service set represents the area covered by each wifi hotspot calculated by the formulae L*W.
Room1=L*W
=10*10
=100m2
Room 2=L*W
=10*10
=100m2
Room 3=L*W
=10*10
=100m2
Room 4=L*W
=10*10
=100m2
Room 5=L*W
=10*10
=100m2
Lounge and reception=20*10
=200m2
ESS, the extended service set represents the area covered by all the access points which are connected to the distribution system. This can be calculated by adding the individual areas covered by each access point.
ESS=set of BSS
=Room1+Room2+Room3+Room4+Room5+Lounge and reception
=100+100+100+100+100+200
=500+200
=700m2
Throughput represents the actual amount of data passing through a communication link measured in Mbps.
For the above building, the throughput is the aggregation of the individual data rate requirements assuming this is a noiseless channel.
Throughput room1
8 employees each wants a 100mbps connection.
The total throughput =8*100
=800mbps
Throughput room 2
8 employees each needs 100mbps connections
Total throuhput=8*100
=800mbps
Throughput room 3
Number of employees * data rate requirement
=8*100
=800mbps
Througput room 4
=8*100
=800mbps
Througput room 5
=8*100
=800mbps
Throughput through lounge
Number of people accessing lounge is 25
Data rate requirement per connection is 100mbps
Throughput is therefore 25*100
=2500mbps
(Liew, Kai, Leung, & Wong, 2010)
802.11ac is the next generation of wifi that promises to deliver not only speed but also enhancing multiple users access to the wifi connection. This in effect improves the efficiency of the network as more devices such as mobile phones, laptops, and other wifi certified products shall be networked within the network. 802.11ac is again recommended standard since it enhances backward compatibility with the older standards. This makes it suitable for integrating with the legacy components of the network hence improving on utility. Thirdly, most new wifi certified devices come with the 802.11ac as the default standard hence it is imperative for the network to implement the 802.11ac to make it compatible with newer equipment that is 802.11ac certified. (Ong et al., 2011)
In order to ensure all the traffic through the network is secure and that all the data on transit through the network are not compromised in terms of confidentiality, integrity, and availability, the following security strategies and measures could be taken to secure the network.
First, ensure all the traffic is encrypted with the Advance encryption standards. This is the most secure data encryption algorithm going by today standards. To effect this, all the access points should be WPA2 enabled.
Second, choose a strong WPA2 key. A strong encryption system is as strong as the weakest link. Here, the encryption key which comes in form of passphrase should be very strong to reduce being compromised by dictionary and or brute force attacks which exploit vulnerabilities due to the weak password for the access points.
Third, it is best practice to always put the SSID broadcasting to off to ensure the eavesdropper does not get much information about the availability of the wifi. Such information linked to the SSID can be used by a sophisticated attacker to bypass the otherwise secure network(Stallings, Brown, Bauer, & Bhattacharjee, 2012).
Fourth, it is recommended to set up a firewall to filter all the traffic ingress and egress of the network to ensure malicious packets from the internet does not have a chance to get into the private network. The firewall should have also the Intrusion detection and prevention systems to alert the administrators of potential network intrusions attempts.
Fifth, it is recommended for the organization to set up ICT security policies and procedure to provide a legal framework that could be used to deter rogue employees from coming cyber crimes inside the organization’s network. This policy should have a top-down approach in design and dissemination.
Last but not the least, all software and applications should be updated regularly and then patched and hotfixes applied promptly to reduce vulnerabilities due to software and applications configurations being exploited.
References
Chow, C. W., Talli, G., Ellis, A. D., & Townsend, P. D. (2008). Rayleigh noise mitigation in DWDM LR-PONs using carrier suppressed subcarrier-amplitude modulated phase shift keying. Optics Express, 16(3), 1860–1866.
Cui, Y., Wang, L., Wang, X., Wang, H., & Wang, Y. (2015). FMTCP: A fountain code-based multipath transmission control protocol. IEEE/ACM Transactions on Networking (ToN), 23(2), 465–478.
Han, F.-M., & Zhang, X.-D. (2009). Wireless multicarrier digital transmission via Weyl-Heisenberg frames over time-frequency dispersive channels. IEEE Transactions on Communications, 57(6).
Koenig, S., Lopez-Diaz, D., Antes, J., Boes, F., Henneberger, R., Leuther, A., … Palmer, R. (2013). Wireless sub-THz communication system with high data rate. Nature Photonics, 7(12), 977.
Lee, Y.-H., & Pan, C.-W. (2015). Fully reused VLSI architecture of FM0/Manchester encoding using SOLS technique for DSRC applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23(1), 18–29.
Liew, S. C., Kai, C., Leung, H. C., & Wong, P. (2010). Back-of-the-envelope computation of throughput distributions in CSMA wireless networks. IEEE Transactions on Mobile Computing, 9(9), 1319–1331.
Manfrini, M., Devolder, T., Kim, J.-V., Crozat, P., Chappert, C., Van Roy, W., & Lagae, L. (2011). Frequency shift keying in vortex-based spin torque oscillators. Journal of Applied Physics, 109(8), 083940.
Meltzer, D. (2011). Sampling demodulator for amplitude shift keying (ASK) radio receiver. Google Patents.
Olson, C. H., Grohoski, G. F., & Spracklen, L. A. (2013). Apparatus and method for implementing instruction support for performing a cyclic redundancy check (CRC). Google Patents.
Ong, E. H., Kneckt, J., Alanen, O., Chang, Z., Huovinen, T., & Nihtilä, T. (2011). IEEE 802.11 ac: Enhancements for very high throughput WLANs. In Personal indoor and mobile radio communications (PIMRC), 2011 IEEE 22nd international symposium on (pp. 849–853). IEEE.
Palanki, R., & Khandekar, A. (2012). Pilot transmission and channel estimation for a communication system utilizing frequency division multiplexing. Google Patents.
Ratasuk, R., Ghosh, A., & Xiao, W. (2012). Method and apparatus for providing downlink acknowledgments and transmit indicators in an orthogonal frequency division multiplexing communication system. Google Patents.
Reed, I. S., & Chen, X. (2012). Error-control coding for data networks (Vol. 508). Springer Science & Business Media.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice. Pearson Education.
Tsonev, D., Sinanovic, S., & Haas, H. (2012). Novel unipolar orthogonal frequency division multiplexing (U-OFDM) for optical wireless. In Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th (pp. 1–5). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download