代写CAN309 Information Theory and Data Communications Assessment 2代做留学生Matlab程序

- 首页 >> Web

CAN309

Information Theory and Data Communications

Assessment 2

Assessment Number

2

Contribution to Overall Marks

10%

Submission Deadline

15th Dec., 2024, Sunday, Week 13 (23:59)

Assessment Objective

This assessment aims at evaluating students’ understanding and problem solving skills in Channel Coding, Cryptography, Transceiver Design and Data Communications Networking, which are accumulated during lectures, tutorials and after-class study.

Submission Procedure

Please submit the electronic copy on Learning Mall Online.

Marking Scheme

The specific marks assigned are shown on the right column of each question and sub-question. The assessment of Exercise 3 and Exercise 6 includes MATLAB implementation. Please include your MATLAB code script in the context of the report (NOT as a separate .m file) for Exercise 3. The assessment of Exercise 6 is in the form of a short report. It should include:

a)   A   short  analysis  of  the  questions  and  the   equations   used  in  deriving  your results/codes.

b)   Results and plots (if needed).

c)    Discussion and conclusion.

The assignment covering the 6 Exercises should be submitted as a single report in PDF format and  named as ‘Student ID_GivenName_Surname.pdf’. The designed  MATLAB  codes in  .m format for Exercise 6 should beenclosed together with the report as the separate file(s).

Please compress your report and MATLAB codes as a single .zip file and named as ‘Student ID_GivenName_Surname.zip’ for the submission.

EXERCISE 1 - (15 POINTS)

Repetition code achieves error correction by repeating the transmitted information bits r additional times. If the transmitted information is 1 bit and the number of the redundant binary bits r = 6, answer the following questions:

i)    Construct the repetition codeword set. (2 points)

ii)   What is the minimum Hamming distancedmin of the code? (2 points)

iii)  How many errors in a block can the code a) detect, b) correct, and c) detect and correct

at the sametime? (4 points)

iv)  Given a noisy channel with symbol error probability of p, p = 0.01, calculate the bit

error rate (BER) with this repetition code. (7 points)

EXERCISE 2 - (15 POINTS)

Consider a public-key Rivest–Shamir–Adleman (RSA) system. Given two prime numbers 43 and 71, derive

i)     A valid public key for the RSA algorithm. (5 points)

ii)    The corresponding private key for the RSA algorithm. (10 points)

EXERCISE 3 - (15 POINTS)

For the received pulse pr(t),let pr (0) = 1, pr (T) =  −0.3,  pr (2T) = 0.1,   pr (3T) = −0.07,  pr (4T) = 0.02,  pr (−T) = −0.2,  pr (−2T) = 0.05,  pr (−3T) =   −0.01,

pr (−4T) = 0.005. Design a 5-tap (N=2) Zero-forcing (ZF) equaliserand keep the     calculation accurate to the fourth decimal place. Please provide the matrix inverse calculation procedure with TWO methods:

a) manual calculation with Gauss elimination or determinant method (See Appendix A), and b) with MATLAB.

* Hint: For manual calculation, you may skip some of the calculation steps and keep the key steps in your final answer.

EXERCISE 4 - (15 POINTS)

i)    Describe the forms of data units for the 5-layer TCP/IP model. (9 points)

ii)   Given the following IP source and destination addresses (in Hexadecimal format) which are identified in the IP Header (as specified in Appendix B):

IP source address: 81 7E 7B 01

IP destination address: 81 7E 7B 24,

convert the addresses to standard dotted-decimal format. (6 points)

EXERCISE 5 - (20 POINTS)

Identify protocols involved in email communication and interpret the procedure.

* Hint: Use block diagrams or flowcharts as necessary for better clarity. (20 points)

EXERCISE 6 - Open Ended Question (20 POINTS)

The theorems and principles in Channel Coding and Cryptography could be quite mathematical and difficult to comprehend. Using MATLAB to visualize specific theorems, concepts and properties helps to strengthen our understanding on the challenging part   of the knowledge. Please select ONE theorem/concept that was introduced in Channel Coding and Cryptography, and design the MATLAB code to visualize the related formulation/properties.

Note: The MATLAB codes in .m format should be typeset properly and be included together with Assignment 2 (in PDF) as a single compressed document for submission.

Quick Guidance on the Open Ended Question:

The solution should be in the form. of a short report covering the following three sections; the section marks are given below.

Section 1: A description of the theorem or concept with formulation. (5 points)

Section 2: MATLAB codes and Graphs to visualize the theorem/concept. (10 points) Section 3: Detailed comments and discussion. (5 points)

Appendix A: Matrix Inverse Calculation

1.   Gauss elimination method

Let A bean × n matrix, the inverse of A, if it exists, can be computed, by row reduction via the following steps:

Step 1: Then × n identity matrix is augmented to the right of A, forming an × 2n block matrix [A  | I].

Step 2: Through application of elementary row operations, find the reduced echelon form of this n × 2n matrix, [I  | B].

Step 3: There is BA = I, and therefore, B = A −1 which is the inverse matrix of A.

Note: The matrix A is invertible if and only if the left block can be reduced to the identity matrix I; in this case the right block of the final matrix is A−1 .

2.   The determinant method

Given a square matrix A, the inverse of A can be calculated via the following steps:

Step 1:  Find determinant of A, |A|.

If |A| = 0, A−1 does not exist.

If |A| ≠ 0,  one can proceed to find the inverse of the matrix.

Step 2: Replace each element of A by its cofactor.

Step 3: Transpose the result to form. the adjoint matrix, adj(A).

Step 4: The matrix inverse is then given by A−1 = |A|/1 adj(A)



站长地图