SlideShare a Scribd company logo
EE 333, Communication Networks
Mid-Term Exam (2014-15S)
Maximum Marks = 30 Time = 2 hours
1. For N-packet blocks, let XN be the time taken from the instant the transmission of the block begins for the first
time to the time when the transmission of the next block can be started.
(a) N=1
   1 1
1
1
1
1
2 2 (1 )
1 2
2
where
1 2
X T d T d X
d
XT d dTX b
T b T
 


 


     
 
  
            
 
[2]
(b) N=2
   
 
2 2
2 2
2
1
2
2
(2 2 ) 2 2 2 (1 ) 2 2 (1 )
(2 ) (2 2 ) 2( 2 )(1 ) 2 (2 ) 2 (3 2 )
2 2 (3 2 ) 1 (3 2 )
(2 ) (2 )
T d
X T d T d T d X
X T d T d T d
T d b
X
   

    
 

     

 
          
 
         
  
     
  
[4]
(c) N=3 with d=0 10 20
2T T
X X
 
 
     
   
 
 
3 2 2 3
30 10 20 30
3 2
30
2 3 2
30
2 2
30
30
30
3 3 3 (1 ) 3 3 (1 ) 3 (1 )
1 (1 ) 3 3 (1 ) 6(1 )
3 3 3 1 (1 ) 2(1 )
3 3 3 3 3
3 3
X T T X T X T X
X T T T
X T
X T
T T
X
X
     
   
     
    
 

         
        
        
      
   
[4]
We can logically argue that in this ARQ scheme, each packet is sent α-1
times as in a simple Stop-&-Wait ARQ
system. (This is because every packet is repeated until it is correctly received and only the packets in error are
repeated.) The differences between schemes with different block-lengths arise only because of the effects of the
propagation delay d. When d=0, all the schemes will perform similarly and will have the same efficiency as the
equivalent Stop-&-Wait approach.
2. (a) Consider the code word to be 1 2
1 2 1 0( ) ...........n n
n nT x T x T x T x T 
     
A circular right shift of T(x) by one position yields the polynomial T*(x) as follows –
1 2 3
0 1 2 2 1*( ) ...........n n n
n nT x T x T x T x T x T  
      
Note that T*(x) can also be obtained by circularly left shifting T(x) by n-1 positions.
We can show (given below) that circularly left shifting T(x) by one position also creates a code word.
Therefore, circularly left shifting by n-1 positions will also create a code word.
To show that circularly left shifting T(x) by one position creates another code word -
Circular Left shift by one position, 1 1 1
ˆ( ) ( ) ( ) (1 )n n
n n nT x xT x T x T xT x T x       
In ˆ( )T x , (a) T(x) is obviously divisible by g(x)
(b) (1+xn
) has (1+x) as a factor and (1+xn
) is also divisible by P(x). Therefore (1+xn
) is also
divisible by g(x)
Therefore ˆ( )T x is also a code word.
(b) Comparing ( )C x and ( )C x , it is easy to see that the error polynomial ( )E x is –
10 9 8 4 2
( ) 1E x x x x x x     
This error pattern will be detectable if ( )E x is divisible by ( )g x . We can check this by long division
and verify that Rem
10 9 8 4 2
8 2
1
0
1
x x x x x
x x x
     
 
   
Note: Actually 10 9 8 4 2 2 8 2
1 ( 1)( 1)x x x x x x x x x x           from the long division
Therefore, the error pattern ( )E x will not be detectable by CRC-8 and ( )C x will be accepted by the
receiver as a valid code word.
We can also verify that
17 14 12 11 10 9 7 5 4 2
9 6 4 8 2
( ) 1
( 1)( 1)
C x x x x x x x x x x x x
x x x x x x
           
      
Therefore ( )C x is indeed a valid code word and will be accepted by the receiver.
[By long division, we get
17 14 12 11 8 7 5 9 6 4 2 8 2
( ) ( )( 1)C x x x x x x x x x x x x x x x x x                 ]
3.
(a) State Transition Diagram
(b) 3 2 2 2 2 2 2
0 1 1 23 (1 ) (1 ) (1 ) 2 (1 ) 2 (1 )P q q q P q q P q q q q q P q q                       
Therefore,
2 2
1 0 2 1 02 2 4
(3 2 ) 1 (3 2 )(1 )
(1 ) 2(1 ) 2(1 )
q q q q q q q q
P P P P P
q q q
     
  
  
(c) It is easy to show that  2 2
0 1 2 33 (1 ) 3 (1 )S q q P P P P q q      
Differentiating this with respect to q, we find that the maximum occurs at
1
3
q  and the
maximum value of S is max
4
0.444
9
S  

More Related Content

PPTX
Linear transformations-thestuffpoint.com
PDF
A Note on TopicRNN
PDF
A Note on Latent LSTM Allocation
PPT
linear transfermation.pptx
PDF
Lesson 7: Vector-valued functions
DOC
pradeepbishtLecture13 div conq
PPTX
Signals Processing Homework Help
PDF
Linear transformations-thestuffpoint.com
A Note on TopicRNN
A Note on Latent LSTM Allocation
linear transfermation.pptx
Lesson 7: Vector-valued functions
pradeepbishtLecture13 div conq
Signals Processing Homework Help

What's hot (18)

PDF
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
PDF
Discretization
PDF
Estimation of numerical schemes in heat convection by OpenFOAM
PDF
Time complexity (linear search vs binary search)
PDF
Week3 ap3421 2019_part1
PDF
QMC: Operator Splitting Workshop, Forward-Backward Splitting Algorithm withou...
PPTX
Signals Processing Assignment Help
PPT
Composition Of Functions & Difference Quotient
PPT
Orthogonal basis and gram schmidth process
PPT
002 ray modeling dynamic systems
PPTX
2021 Quantum Challenge ex.1
PPT
Randomized algorithms ver 1.0
PDF
Temp kgrindlerverthree
PDF
Convergence methods for approximated reciprocal and reciprocal-square-root
PPTX
Signal Processing Assignment Help
PPTX
Digital Signal Processing Assignment Help
PDF
Linear Cryptanalysis Lecture 線形解読法
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
Discretization
Estimation of numerical schemes in heat convection by OpenFOAM
Time complexity (linear search vs binary search)
Week3 ap3421 2019_part1
QMC: Operator Splitting Workshop, Forward-Backward Splitting Algorithm withou...
Signals Processing Assignment Help
Composition Of Functions & Difference Quotient
Orthogonal basis and gram schmidth process
002 ray modeling dynamic systems
2021 Quantum Challenge ex.1
Randomized algorithms ver 1.0
Temp kgrindlerverthree
Convergence methods for approximated reciprocal and reciprocal-square-root
Signal Processing Assignment Help
Digital Signal Processing Assignment Help
Linear Cryptanalysis Lecture 線形解読法
Ad

Viewers also liked (11)

PDF
BEye product presentation
PDF
Doing a TED Talk_ The Full Story - Wait But Why
PDF
SNCR OnStar Final PR 12.31.15
PPTX
Autoradio dvd gps skoda
PPTX
FYE 2015_Got Motivation combined_final
PDF
Introduction to a Responsive Master Page with the Design Manager
PPTX
PDF
Cpap uso y causas
PPTX
Apego al tratamiento con cpap
PPTX
SPSDenver - SharePoint & jQuery - What I wish I would have known
PPTX
Mit Fm
BEye product presentation
Doing a TED Talk_ The Full Story - Wait But Why
SNCR OnStar Final PR 12.31.15
Autoradio dvd gps skoda
FYE 2015_Got Motivation combined_final
Introduction to a Responsive Master Page with the Design Manager
Cpap uso y causas
Apego al tratamiento con cpap
SPSDenver - SharePoint & jQuery - What I wish I would have known
Mit Fm
Ad

Similar to Mid term solution (20)

PDF
Mid term
PDF
Quiz 1 solution
PPT
Data linklayer
PPT
06 ET 351_Lecture_06_January_07_2023.ppt
PPT
3320 cyclic codes.ppt
PPT
Lecture 5 from virtual university of pakistan
PDF
Error Control Coding -Introduction
PPTX
Data link layar
PPT
15CS46 - Data communication or computer networks 1_Module-3.ppt
PPTX
Presentation ppt 3.pptx
PPTX
Cyclic code non systematic
PPTX
Data Communications- Unit-4.pptx
PPTX
basicsofcodingtheory-160202182933-converted.pptx
PDF
cn computer netwok module 1 computer nep
PPTX
linear codes and cyclic codes
PPT
lect5.ppt
PDF
Unit 2 part-1
PDF
Coding
PPT
Defense Senior College on Error Coding presentation 4/22/2010
Mid term
Quiz 1 solution
Data linklayer
06 ET 351_Lecture_06_January_07_2023.ppt
3320 cyclic codes.ppt
Lecture 5 from virtual university of pakistan
Error Control Coding -Introduction
Data link layar
15CS46 - Data communication or computer networks 1_Module-3.ppt
Presentation ppt 3.pptx
Cyclic code non systematic
Data Communications- Unit-4.pptx
basicsofcodingtheory-160202182933-converted.pptx
cn computer netwok module 1 computer nep
linear codes and cyclic codes
lect5.ppt
Unit 2 part-1
Coding
Defense Senior College on Error Coding presentation 4/22/2010

More from Gopi Saiteja (20)

PPT
Trees gt(1)
PPT
Topic11 sortingandsearching
PPT
Heapsort
PPT
Hashing gt1
PDF
Ee693 sept2014quizgt2
PDF
Ee693 sept2014quizgt1
PDF
Ee693 sept2014quiz1
PDF
Ee693 sept2014midsem
PDF
Ee693 questionshomework
PPT
Dynamic programming
PPT
Cs105 l15-bucket radix
PPT
Chapter11 sorting algorithmsefficiency
PDF
Answers withexplanations
PDF
Sorting
PDF
Solution(1)
PDF
Pthread
PDF
Open mp
PDF
Introduction
PDF
PDF
Vector space interpretation_of_random_variables
Trees gt(1)
Topic11 sortingandsearching
Heapsort
Hashing gt1
Ee693 sept2014quizgt2
Ee693 sept2014quizgt1
Ee693 sept2014quiz1
Ee693 sept2014midsem
Ee693 questionshomework
Dynamic programming
Cs105 l15-bucket radix
Chapter11 sorting algorithmsefficiency
Answers withexplanations
Sorting
Solution(1)
Pthread
Open mp
Introduction
Vector space interpretation_of_random_variables

Mid term solution

  • 1. EE 333, Communication Networks Mid-Term Exam (2014-15S) Maximum Marks = 30 Time = 2 hours 1. For N-packet blocks, let XN be the time taken from the instant the transmission of the block begins for the first time to the time when the transmission of the next block can be started. (a) N=1    1 1 1 1 1 1 2 2 (1 ) 1 2 2 where 1 2 X T d T d X d XT d dTX b T b T                                   [2] (b) N=2       2 2 2 2 2 1 2 2 (2 2 ) 2 2 2 (1 ) 2 2 (1 ) (2 ) (2 2 ) 2( 2 )(1 ) 2 (2 ) 2 (3 2 ) 2 2 (3 2 ) 1 (3 2 ) (2 ) (2 ) T d X T d T d T d X X T d T d T d T d b X                                                          [4] (c) N=3 with d=0 10 20 2T T X X                   3 2 2 3 30 10 20 30 3 2 30 2 3 2 30 2 2 30 30 30 3 3 3 (1 ) 3 3 (1 ) 3 (1 ) 1 (1 ) 3 3 (1 ) 6(1 ) 3 3 3 1 (1 ) 2(1 ) 3 3 3 3 3 3 3 X T T X T X T X X T T T X T X T T T X X                                                                [4] We can logically argue that in this ARQ scheme, each packet is sent α-1 times as in a simple Stop-&-Wait ARQ system. (This is because every packet is repeated until it is correctly received and only the packets in error are repeated.) The differences between schemes with different block-lengths arise only because of the effects of the propagation delay d. When d=0, all the schemes will perform similarly and will have the same efficiency as the equivalent Stop-&-Wait approach.
  • 2. 2. (a) Consider the code word to be 1 2 1 2 1 0( ) ...........n n n nT x T x T x T x T        A circular right shift of T(x) by one position yields the polynomial T*(x) as follows – 1 2 3 0 1 2 2 1*( ) ...........n n n n nT x T x T x T x T x T          Note that T*(x) can also be obtained by circularly left shifting T(x) by n-1 positions. We can show (given below) that circularly left shifting T(x) by one position also creates a code word. Therefore, circularly left shifting by n-1 positions will also create a code word. To show that circularly left shifting T(x) by one position creates another code word - Circular Left shift by one position, 1 1 1 ˆ( ) ( ) ( ) (1 )n n n n nT x xT x T x T xT x T x        In ˆ( )T x , (a) T(x) is obviously divisible by g(x) (b) (1+xn ) has (1+x) as a factor and (1+xn ) is also divisible by P(x). Therefore (1+xn ) is also divisible by g(x) Therefore ˆ( )T x is also a code word. (b) Comparing ( )C x and ( )C x , it is easy to see that the error polynomial ( )E x is – 10 9 8 4 2 ( ) 1E x x x x x x      This error pattern will be detectable if ( )E x is divisible by ( )g x . We can check this by long division and verify that Rem 10 9 8 4 2 8 2 1 0 1 x x x x x x x x             Note: Actually 10 9 8 4 2 2 8 2 1 ( 1)( 1)x x x x x x x x x x           from the long division Therefore, the error pattern ( )E x will not be detectable by CRC-8 and ( )C x will be accepted by the receiver as a valid code word. We can also verify that 17 14 12 11 10 9 7 5 4 2 9 6 4 8 2 ( ) 1 ( 1)( 1) C x x x x x x x x x x x x x x x x x x                    Therefore ( )C x is indeed a valid code word and will be accepted by the receiver. [By long division, we get 17 14 12 11 8 7 5 9 6 4 2 8 2 ( ) ( )( 1)C x x x x x x x x x x x x x x x x x                 ]
  • 3. 3. (a) State Transition Diagram (b) 3 2 2 2 2 2 2 0 1 1 23 (1 ) (1 ) (1 ) 2 (1 ) 2 (1 )P q q q P q q P q q q q q P q q                        Therefore, 2 2 1 0 2 1 02 2 4 (3 2 ) 1 (3 2 )(1 ) (1 ) 2(1 ) 2(1 ) q q q q q q q q P P P P P q q q             (c) It is easy to show that  2 2 0 1 2 33 (1 ) 3 (1 )S q q P P P P q q       Differentiating this with respect to q, we find that the maximum occurs at 1 3 q  and the maximum value of S is max 4 0.444 9 S  