SlideShare a Scribd company logo
EE 333, Communication Networks
Solutions to Quiz-I (2014-15S)
Maximum Marks = 10 Time=45 minutes
1. Let M be the number of times A has to transmit to deliver the packet to D and let N be the
number of times B has to transmit to deliver the packet to D.
Then 1 1
{ } (1 ) { } (1 )m n
P M m P P P N n P P 
     
Let K be the number of times (both) A and B transmit for the packet to reach D where K=min
(M, N). Therefore,
1 1 2( 1) 2
1
1 2( 1) 2
2( 1) 2 2
2 1 2
{ } 2 (1 ) (1 ) (1 )
2 (1 ) (1 )
[2 2 1 2 ]
( ) (1 )

  
 
 


     
   
    
 
k j k
j k
k k k
k
k
P K k P P P P P P
P P P P P
P P P P P
P P
This is the required distribution.
Note that this could have been derived by simple logical arguments without doing the explicit calculation given
above. I will accept that as a solution if you have clearly given your arguments – even though that is an answer that
can be given in just a few lines!
Using this, E{K}= 2
1
1 P
2. (a) Factoring, one can show that 8 2 7 6 5 4 3 2
1 ( 1)( 1)x x x x x x x x x x          
We assume that 7 6 5 4 3 2
( 1)x x x x x x      is a Primitive Polynomial and will therefore not
divide any 1n
x  for n < 27
-1=127 but will exactly divide 127
1x 
All single errors will be detected (more than one term)
All error patterns with an odd number of errors will be detected (1+x is a factor)
All double errors will be detected if the codeword has less than 127 bits (i.e. 118 bits of data
and 8 check bits) (using the assumption of the other factor being a primitive polynomial)
All burst errors with burst length of 8 or less will be detected.
(b)
Feed in the polynomial to be divided, MSB first. The bits in the shift register after all the bits
have been fed will be remainder.

More Related Content

PDF
Lesson 29
PDF
Lect 18
PDF
Mid term
PDF
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
PDF
11X1 T14 09 mathematical induction 2 (2010)
PDF
Ee693 sept2014midsem
PPTX
Introduction to the AKS Primality Test
Lesson 29
Lect 18
Mid term
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
11X1 T14 09 mathematical induction 2 (2010)
Ee693 sept2014midsem
Introduction to the AKS Primality Test

What's hot (19)

PDF
Unequal-Cost Prefix-Free Codes
PDF
Quantum Noise and Error Correction
PDF
Solution 3.
PDF
Answers withexplanations
PPTX
The Complexity Of Primality Testing
PDF
Rsa encryption
PDF
Quantum Computation and the Stabilizer Formalism for Error Correction
PDF
Chapter 06 boolean algebra
PDF
Chapter 06 boolean algebra 2o-p
KEY
1112 ch 11 day 12
PPTX
Stochastic Processes Homework Help
PPTX
Cryptography - key sharing - RSA
PPT
Fskik 1 nota
PPT
Approx
PDF
An efficient algorithm for the computation of Bernoulli numbers
PDF
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
PPTX
Signal Processing Assignment Help
PDF
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Unequal-Cost Prefix-Free Codes
Quantum Noise and Error Correction
Solution 3.
Answers withexplanations
The Complexity Of Primality Testing
Rsa encryption
Quantum Computation and the Stabilizer Formalism for Error Correction
Chapter 06 boolean algebra
Chapter 06 boolean algebra 2o-p
1112 ch 11 day 12
Stochastic Processes Homework Help
Cryptography - key sharing - RSA
Fskik 1 nota
Approx
An efficient algorithm for the computation of Bernoulli numbers
Chapter-3: DIRECT PROOF AND PROOF BY CONTRAPOSITIVE
Signal Processing Assignment Help
Wei Yang - 2014 - Consistent Improvement in Translation Quality of Chinese–Ja...
Ad

Viewers also liked (20)

PDF
Quiz 2-solution
DOC
Wk2 questions
PDF
Health Informatics In Asia (Gunadarma U)Joko
PDF
HI 201: Health Informatics
PDF
FP 303 COMPUTER NETWORK PAPER FINAL
PDF
Data Science: Case "Political Communication 2/2"
PDF
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
PPT
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
PPT
INTRODUCTION OF PSYCHOLOGY
PDF
Data communication and network Chapter - 2
PPTX
Data communication & networks
PDF
SC161-Lecture4-1
DOCX
Ccn(Data communication and networking) edited solution-manual suitable to be ...
PDF
Overview of Health Informatics (July 2, 2015)
PPTX
Health informatics: Introduction, History and general presentation
PPTX
Health informatics
PPT
General physiology lecture 2
PPT
Final exam review answer(networking)
PPT
Health Informatics - The Big Picture
PPTX
Lec1 :- Data communication and network
Quiz 2-solution
Wk2 questions
Health Informatics In Asia (Gunadarma U)Joko
HI 201: Health Informatics
FP 303 COMPUTER NETWORK PAPER FINAL
Data Science: Case "Political Communication 2/2"
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION OF PSYCHOLOGY
Data communication and network Chapter - 2
Data communication & networks
SC161-Lecture4-1
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Overview of Health Informatics (July 2, 2015)
Health informatics: Introduction, History and general presentation
Health informatics
General physiology lecture 2
Final exam review answer(networking)
Health Informatics - The Big Picture
Lec1 :- Data communication and network
Ad

Similar to Quiz 1 solution (20)

PDF
Mid term solution
PPT
PDF
End sem
PPT
Channel coding
PPT
Defense Senior College on Error Coding presentation 4/22/2010
PDF
A method to determine partial weight enumerator for linear block codes
PDF
Lecture6
PPTX
Information Theory and Coding - Lecture 4
PDF
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
PDF
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
PPT
Data linklayer
PDF
Its323 y09s1e01 midterm-exam-answers
PPT
Matched filter
PDF
Channel Coding (Digital communication)
PPTX
Bits and queues in information theory and coding
PPT
15CS46 - Data communication or computer networks 1_Module-3.ppt
PDF
A method to determine partial weight enumerator for linear block codes
PPT
Source coding
PPTX
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
PPTX
Digital Communication Exam Help
Mid term solution
End sem
Channel coding
Defense Senior College on Error Coding presentation 4/22/2010
A method to determine partial weight enumerator for linear block codes
Lecture6
Information Theory and Coding - Lecture 4
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
Data linklayer
Its323 y09s1e01 midterm-exam-answers
Matched filter
Channel Coding (Digital communication)
Bits and queues in information theory and coding
15CS46 - Data communication or computer networks 1_Module-3.ppt
A method to determine partial weight enumerator for linear block codes
Source coding
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Digital Communication Exam Help

More from Gopi Saiteja (20)

PPT
Trees gt(1)
PPT
Topic11 sortingandsearching
PPT
Heapsort
PPT
Hashing gt1
PDF
Ee693 sept2014quizgt2
PDF
Ee693 sept2014quizgt1
PDF
Ee693 sept2014quiz1
PDF
Ee693 questionshomework
PPT
Dynamic programming
PPT
Cs105 l15-bucket radix
PPT
Chapter11 sorting algorithmsefficiency
PDF
Sorting
PDF
Solution(1)
PDF
Pthread
PDF
Open mp
PDF
Introduction
PDF
PDF
Vector space interpretation_of_random_variables
PDF
Statistical signal processing(1)
PDF
Prob review
Trees gt(1)
Topic11 sortingandsearching
Heapsort
Hashing gt1
Ee693 sept2014quizgt2
Ee693 sept2014quizgt1
Ee693 sept2014quiz1
Ee693 questionshomework
Dynamic programming
Cs105 l15-bucket radix
Chapter11 sorting algorithmsefficiency
Sorting
Solution(1)
Pthread
Open mp
Introduction
Vector space interpretation_of_random_variables
Statistical signal processing(1)
Prob review

Quiz 1 solution

  • 1. EE 333, Communication Networks Solutions to Quiz-I (2014-15S) Maximum Marks = 10 Time=45 minutes 1. Let M be the number of times A has to transmit to deliver the packet to D and let N be the number of times B has to transmit to deliver the packet to D. Then 1 1 { } (1 ) { } (1 )m n P M m P P P N n P P        Let K be the number of times (both) A and B transmit for the packet to reach D where K=min (M, N). Therefore, 1 1 2( 1) 2 1 1 2( 1) 2 2( 1) 2 2 2 1 2 { } 2 (1 ) (1 ) (1 ) 2 (1 ) (1 ) [2 2 1 2 ] ( ) (1 )                            k j k j k k k k k k P K k P P P P P P P P P P P P P P P P P P This is the required distribution. Note that this could have been derived by simple logical arguments without doing the explicit calculation given above. I will accept that as a solution if you have clearly given your arguments – even though that is an answer that can be given in just a few lines! Using this, E{K}= 2 1 1 P 2. (a) Factoring, one can show that 8 2 7 6 5 4 3 2 1 ( 1)( 1)x x x x x x x x x x           We assume that 7 6 5 4 3 2 ( 1)x x x x x x      is a Primitive Polynomial and will therefore not divide any 1n x  for n < 27 -1=127 but will exactly divide 127 1x  All single errors will be detected (more than one term) All error patterns with an odd number of errors will be detected (1+x is a factor) All double errors will be detected if the codeword has less than 127 bits (i.e. 118 bits of data and 8 check bits) (using the assumption of the other factor being a primitive polynomial) All burst errors with burst length of 8 or less will be detected. (b) Feed in the polynomial to be divided, MSB first. The bits in the shift register after all the bits have been fed will be remainder.