Written Exam Information Transmission - EIT100

Similar documents
Written Exam Information Transmission - EIT100

Written Exam Channel Modeling for Wireless Communications - ETIN10

Lecture 7/8: UWB Channel. Kommunikations

Wireless Physical Layer Concepts: Part II

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

WIRELESS COMMUNICATIONS PRELIMINARIES

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

Transmission Fundamentals

Aalto University School of Electrical Engineering. ELEC-E4750 Radiowave Propagation and Scattering Session 1: Prerequisite

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

APPENDIX A TEST PLOTS. (Model: 15Z970)

RF Design Final Spring 2005

The Radio Channel. COS 463: Wireless Networks Lecture 14 Kyle Jamieson. [Parts adapted from I. Darwazeh, A. Goldsmith, T. Rappaport, P.

EXAMINATION FOR THE DEGREE OF B.E. Semester 1 June COMMUNICATIONS IV (ELEC ENG 4035)

TSEK02: Radio Electronics Lecture 8: RX Nonlinearity Issues, Demodulation. Ted Johansson, EKS, ISY

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

ARTEMIS: Low-Cost Ground Station Antenna Arrays for Microspacecraft Mission Support. G. James Wells Mark A. Sdao Robert E. Zee

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Solution: NF=6 db, B=2.1 GHz, SNR min =7dB T=290 k, P in,1db = 10.5 dbm

Communication Channels

HY448 Sample Problems

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

UNIVERSITY OF SOUTHAMPTON

Wireless Communication System

Wireless Channel Propagation Model Small-scale Fading

EE228 Applications of Course Concepts. DePiero

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

TSEK02: Radio Electronics Lecture 8: RX Nonlinearity Issues, Demodulation. Ted Johansson, EKS, ISY

The University of Texas at Austin Dept. of Electrical and Computer Engineering Final Exam

Unit 3 - Wireless Propagation and Cellular Concepts

Sirindhorn International Institute of Technology Thammasat University

Wireless Communication Fundamentals Feb. 8, 2005

Selected answers * Problem set 6

RECOMMENDATION ITU-R F.1402*, **

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss

Communications IB Paper 6 Handout 2: Analogue Modulation

Vehicle Networks. Wireless communication basics. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

CARLETON UNIVERSITY Department of Systems and Computer Engineering

Mm- Wave Propaga-on: Fundamentals and Models

Algorithm to Improve the Performance of OFDM based WLAN Systems

Lab course Analog Part of a State-of-the-Art Mobile Radio Receiver

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication

Chapter 3. Mobile Radio Propagation

Chapter-2 SAMPLING PROCESS

Solutions for the Practice Final

EECS 380: Wireless Technologies Week 7-8

White Paper. 850 MHz & 900 MHz Co-Existence. 850 MHz Out-Of-Band Emissions Problem xxxx-xxxreva

UNIVERSITY OF MANITOBA DATE: December 7, FINAL EXAMINATION TITLE PAGE TIME: 3 hours EXAMINER: M. Davidson

EXAM QUESTION EXAMPLES

EITG05 Digital Communications

Antennas & Propagation. CSG 250 Fall 2007 Rajmohan Rajaraman

ELT Receiver Architectures and Signal Processing Fall Mandatory homework exercises

Refresher on Digital Communications Channel, Modulation, and Demodulation

Sheet 1: Introduction to prime numbers.

Lecture 2 Review of Signals and Systems: Part 1. EE4900/EE6720 Digital Communications

Review: Theorem of irrelevance. Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for

RADIO RECEIVERS ECE 3103 WIRELESS COMMUNICATION SYSTEMS

Handout 13: Intersymbol Interference

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Chapter 1: Introduction. EET-223: RF Communication Circuits Walter Lara

Introduction to wireless systems

Submission on Proposed Methodology for Engineering Licenses in Managed Spectrum Parks

Revision of Lecture One

Antennas: Problems and exercises: Answers

TSEK02: Radio Electronics Lecture 6: Propagation and Noise. Ted Johansson, EKS, ISY

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I

Communications IB Paper 6 Handout 1: Introduction, Signals and Channels

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world

Other Modulation Techniques - CAP, QAM, DMT

03_57_104_final.fm Page 97 Tuesday, December 4, :17 PM. Problems Problems

Qiz 1. 3.discrete time signals can be obtained by a continuous-time signal. a. sampling b. digitizing c.defined d.

Massachusetts Institute of Technology Dept. of Electrical Engineering and Computer Science Fall Semester, Introduction to EECS 2

Study of Factors which affect the Calculation of Co- Channel Interference in a Radio Link

zt ( ) = Ae find f(t)=re( zt ( )), g(t)= Im( zt ( )), and r(t), and θ ( t) if z(t)=r(t) e

Outline / Wireless Networks and Applications Lecture 3: Physical Layer Signals, Modulation, Multiplexing. Cartoon View 1 A Wave of Energy

Antennas and Propagation. Chapter 5

INFN Laboratori Nazionali di Legnaro, Marzo 2007 FRONT-END ELECTRONICS PART 2

Antennas and Propagation. Chapter 5

PULSE SHAPING AND RECEIVE FILTERING

Antennas and Propagation

ETSF15 Physical layer communication. Stefan Höst

Lecture 6 SIGNAL PROCESSING. Radar Signal Processing Dr. Aamer Iqbal Bhatti. Dr. Aamer Iqbal Bhatti

Data and Computer Communications Chapter 3 Data Transmission

Data security (Cryptography) exercise book

Problem Sheets: Communication Systems

Final exam. Question Points Score. Total: 150

Overview. M. Xiao CommTh/EES/KTH. Wednesday, Feb. 17, :00-12:00, B23

Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

y(n)= Aa n u(n)+bu(n) b m sin(2πmt)= b 1 sin(2πt)+b 2 sin(4πt)+b 3 sin(6πt)+ m=1 x(t)= x = 2 ( b b b b

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

TSEK02: Radio Electronics Lecture 6: Propagation and Noise. Ted Johansson, EKS, ISY

Unit 5 - Week 4 - Multipath Fading Environment

Revision of Wireless Channel

Review of Lecture 2. Data and Signals - Theoretical Concepts. Review of Lecture 2. Review of Lecture 2. Review of Lecture 2. Review of Lecture 2

Final Exam Solutions June 14, 2006

Announcement : Wireless Networks Lecture 3: Physical Layer. A Reminder about Prerequisites. Outline. Page 1

Narrow- and wideband channels

Data Communications & Computer Networks

Chapter 4 Radio Communication Basics

Transcription:

Written Exam Information Transmission - EIT100 Department of Electrical and Information Technology Lund University 2016-06-03 8.00 13.00 *** SOLUTION *** The exam consists of five problems. 20 of 50 points are required to pass. Permitted aids: Pocket calculator without any programs, scripts or files stored, formula collection without any notes. Write your personal identifier on each page. Each solution must be written on separate sheets. Your solutions must clearly reveal your method of solution. 1

Information Transmission - EIT100, 2016-06-03 2 1. Consider the following circuit: + x(t) - R 1 R 2 C + - y(t) Figure 1: Circuit diagram (a) Find the frequency function H(f). (3 p) Solution: The output, when x(t) = e jω 0t acts as the input, is y(t) = Z 2 Z 1 + Z 2 e jω 0t where Z 1 = R 1 R 2 = R 1 R 2 /(R 1 + R 2 ) and Z 2 = 1/(jω 0 C), which gives a frequency function H(f) = R 1 + R 2 R 1 + R 2 + CR 1 R 2 jω. (b) What is the impulse response h(t). (3 p) Solution: The impulse response h(t) is the inverse Fourier transform of the frequency function. Since the table with transform pairs tells us that e αt u(t) 1 α + jω, we rewrite the frequency function to match this expression as well as possible, and get H(f) = R 1 + R 2 1 R CR 1 R 1 +R 2 2 CR 1 R 2 + jω where we identify and the impulse response becomes α = R 1 + R 2 CR 1 R 2 h(t) = R 1 + R 2 e R 1 +R 2 CR 1 R t 2 u(t). CR 1 R 2 (c) Find the output y(t) for the input x(t) = 3(u(t) u(t 2)). (4 p) Solution: This can be done in essentially two ways: (i) Directly in the time domain, where we perform the convolution or y(t) = h(t) x(t) = h(τ)x(t τ)dτ

Information Transmission - EIT100, 2016-06-03 3 (ii) we can also perform it in the frequency domain as a multiplication Y (f) = H(f)X(f) followed by an inverse transform of Y (f) to the time domain. The convolution integral is quite simple in this case, so let s use the first method (i). For simplicity, let α = R 1+R 2 CR 1 R 2 and h(t) = αe αt u(t). First we graphically illustrate the two convolved functions and the different cases for our convolution integral: Case 1: y(t) = 0 Case 2: y(t) = t 3h(τ)dτ = 3 0 [ e ατ ] τ=t τ=0 = 3(1 e αt ) Case 3: y(t) = t 3h(τ)dτ = 3 t 2 [ e ατ ] τ=t τ=t 2 = 3(e α(t 2) e αt ) Written as a single expression, 0, t < 0 y(t) = 3(1 e αt ), 0 t < 2 3(e α(t 2) e αt ), 2 t where α = R 1 + R 2 CR 1 R 2. 2. In the current 5G standardization there is a focus on mm wave systems, where 28 GHz carrier frequency is used instead of 2.6 GHz as in 4G (LTE)

Information Transmission - EIT100, 2016-06-03 4 (a) From a cellular communications perspective, state two main advantages of using this high frequency, clearly motivate your answer. (2 p) Solution: For instance... Larger bandwidths are available (not used for other things) at higher frequencies. This allows for higher data rates. If we use, e.g., dish antennas the antenna gain increases with frequency even if the area is the same, allowing for large antenna gains with relatively small antennas. (b) From a cellular communications perspective, state two main disadvantages (challenges) using this high frequency, clearly motivate your answer. (2 p) Solution: For instance... Without antennas with high gain, we will suffer from the higher path loss at higher frequency. Higher frequency makes the Doppler effect more pronounced, which makes wireless communication in mobile environments more complicated. (c) Assume that two wireless units communicate at 28 GHz with a data rate of 100 Mbit/s. The antenna gains are 13 dbi and 7 dbi at the receiver and transmitter, respectively, the output power is 20 dbm, the Doppler frequency is 20 khz, the bandwidth is 100 MHz, the bit error rate is 10 6, Boltzmann s constant is 1.28 10 23 (typo in original exam... should be 1.38 10 23 ), the noise temperature is 1500 K, the noise factor is 7 db the weather is sunny and free space conditions apply. If the demodulator needs a SNR of 10 db to work properly, what is the maximum range for reliable communication? Make reasonable assumptions if there is information missing and clearly motivate your choice. (6 p) Solution: There is a lot of information in the text. Let s read it and then start from the back, figuring out what we need to calculate in the end. Seems like we need to find an expression for the SNR at the receiver side and figure out how we can assure that it is at least 10 db. As an equation that would be expressed SNR db 10 db or, in linear (non-db) scale, SNR 10 times, where we have used that 10 db = 10 times. The next step would be to figure out how we calculate the SNR, which is the signal-to-noise ratio SNR = Signal power Noise power at the receiver. The formula collection has expressions for both the nominator and denominator, as formulas 4.2 (Frii s formula for free-space propagation) and 4.3. This leads to a requirement ( λ 4πd SNR = P r N = P tg t G r kt K B ) 2 10 [times],

Information Transmission - EIT100, 2016-06-03 5 from which we can calculate the requested maximum range d λ Pt G t G r 4π 10kT K B for reliable communication. We now need to identify values on the variables in the expression from the text. Let s do it in a table: Quote from problem text Conclusion communicate at 28 GHz λ = c/f = 3 108 = 10.7 10 3 m 2.8 10 9 output power is 20 dbm P t = 10 20/10 mw = 0.1 W antenna gains are 13 dbi... G r = 10 13/10 = 20 times and 7 dbi, respectively G t = 10 7/10 = 5 times Boltzmann s constant is 1.38 10 23 k = 1.38 10 23 W/Hz/K noise temperature is 1500 K T K = 1500 K bandwidth is 100 MHz B = 100 10 6 Hz The rest of the information in the problem text, e.g. the weather is sunny and data rate of 100 Mbit/s, is not required to solve the problem. Inserting these values in the expression gives us that d 10.7 10 3 4π to ensure reliable communication. 0.1 5 20 10 1.38 10 23 1500 100 10 6 = 592 m 3. A company is trying to develop an effective radio that transmits using simple on-off keying (i.e. only one bit can be transmitted at each symbol time). For this radio to function properly a block code must be effectively implemented. The company has developed two block codes and needs you determine which one their radio should use. Here are the two different block codes which have been developed: Code A Code B Data words Code words Data words Code words 00 000 00 00000 01 011 01 01011 10 101 10 10101 11 110 11 11110 To better understand each block code, the employer needs you to determine a few key facts about this each code. Remember to motivate your answers well.

Information Transmission - EIT100, 2016-06-03 6 (a) Are either of these block codes non-linear? (1 p) Solution: Both codes contain the all-zero code word and adding any two code words gives a codeword in the code. Hence, both codes are linear! (b) Find the hamming distances (typo in original exam, should say minimum distance) for each of the block codes. (1 p) Solution: Since both codes are linear we can find the minimum distance by finding the (non-zero) code word with the least Hamming weight. Code A: d min = 2, Code B: d min = 3. (c) What is the rate of each block code, how many errors can each of these schemes detect, how many errors can be corrected? (2 p) Solution: Given the 2-bit data word length, the code word lengths of 3 and 5 bits, together with the minimum distances... Code A: Rate is R = 2/3, can correct 2 1 = 0 bit errors, and detect 2 2 1 = 1 bit errors. Code B: Rate is R = 2/5, can correct 3 1 = 1 bit errors, and detect 2 3 1 = 2 bit errors. (d) You decided to implement and test both codes to see how they perform in a noisy environment. Receiver 1 is using block code A and receives the bits 001. Receiver 2 is using block code B and receives the bits 01001. Where any errors detected by either receiver? If it is assumed there are less than two errors in the received code word for Receiver 1, and less than 3 errors in the received code word for Receiver 2, can either receiver determine what code was transmitted? If so what was the received data word from each receiver? (3 p) Solution: None of the received words are valid code words, which makes both receivers detect that there is some sort of error. Since both numbers of possible bit errors (less than 2 and less than 3) exceed the error correcting capability of the codes, correct decoding cannot be guaranteed by any of the receivers. (e) You now know a great deal about each block code, you now go back to the company and must tell them a scenario where each code should be used. Provide a scenario in which block code A would outperform block code B, provide a second scenario in which block code B would outperform block code A. (3 p) Solution: With low bit error probabilities and only single bit-error detection needed, Code A will give a solution that requires less transmission bandwidth (since it has a higher rate than Code B). If error correction is required and bit-error probabilities are higher, Code B will be the better choice... despite requireing more bandwidth (it has lower rate). 4. Consider an RSA public key crypto system with the public parameters n = 221 and e = 23.

Information Transmission - EIT100, 2016-06-03 7 (a) Encrypt the plaintext P = 24 (3 p) Solution: RSA encryption is done according to C = P e = 24 23 (mod 221), where we use the fact that AB mod n = (A (mod n))(b (mod n)) (mod n) and break down the calculation as C = 24 16+4+2+1 = 24 16 24 4 24 2 24 (mod 221). Starting with the lowest power (1) and moving up to the largest one (16), we get the partial results: 24 = 0 221 + 24 24 (mod 221) 24 2 = 524 = 2 221 + 134 134 (mod 221) 24 4 = (24 2 ) 2 134 2 = 17956 = 81 221 + 55 55 (mod 221) 24 8 = (24 4 ) 2 55 2 = 3025 = 13 221 + 152 152 (mod 221) 24 16 = (24 8 ) 2 152 2 = 23104 = 104 221 + 120 120 (mod 221) and this leads to C = 24 134 55 120 = 3216 6600 = (14 221 + 122) (29 221 + 191) 122 191 = 23302 = 105 221 + 97 97 (mod 221) (b) Find the plaintext P corresponding to the the ciphertext C = 80. Hint: one of the factors of n is q = 13. (7 p) Solution: If one of the (prime) factors in n = 221 is q = 13, then the other prime factor is 221/13 = 17. This means that φ(n) = φ(221) = φ(13 17) = (13 1) (17 1) = 192. Since e = 23 and we want to find the d that fulfils ed 1 (mod φ(n)), we need to find d so that 1 = ed + tφ(n), i.e. find d so that 1 = 23d + 192t. We can find d by first using Euclid s algorithm for calculating the greatest common divisor gcd(φ(n), e) (which we know to be one, but we need the intermediate results): 192 = 8 23 + 8 23 = 2 8 + 7 8 = 1 7 + 1 7 = 7 1 + 0 Now, solve for the remainders above in reverse order: 1 = 8 1 7 which leads to 7 = 23 2 8 8 = 192 8 23 1 = 8 1 7 = 8 1 (23 2 8) = 1 23 + 3 8

Information Transmission - EIT100, 2016-06-03 8 = 1 23 + 3 (192 8 23) = 25 23 + 3 192, where we can identify d = 25 167 (mod 192). Now we can take on the decryption. RSA decryption works pretty much the same way as the encryption, but using d instead of e in the exponent. In our case, using the same calculation strategy as for the encryption, P = C d = 80 167 = 80 128+32+4+2+1 (mod 221). Calculate the necessary factors (not as detailed as above, but same strategy): 80 80 (mod 221) and we get 80 2 212 (mod 221) 80 4 212 2 81 (mod 221) 80 8 81 2 152 (mod 221) 80 16 152 2 120 (mod 221) 80 32 120 2 35 (mod 221) 80 64 35 2 120 (mod 221) 80 128 120 2 35 (mod 221) P = 80 167 = 35 35 81 212 80 7 (mod 221). 5. Consider a deck of cards where you have got 4 spades at hand, and you do not know anything about the other cards. (a) What is the uncertainty (entropy) about the next card you get? (2 p) Solution: With 4 spades at hand (which I assume I have observed ), there are 52 4 = 48 cards left in the deck. I can only assume that there is an equal probaility for all these 48 cards being the next one, namely 1/48. With 48 equally probable outcomes, the uncertainty (entropy) is H(next card) = log 2 48 5.6 bit. (b) What is the uncertainty (entropy) of the color of the next card? (2 p) Solution: Since I have 4 of the 13 spades at hand, there are only 9 spades left in the deck, while the other three suites have all 13 cards in the deck. This gives probability 22/48 for a black card (spades or cloves) and 26/48 for a red card (hearts or diamonds). This gives an uncertainty (entropy) H(next color) = 22 48 log 22 2 48 26 48 log 26 2 48 0.99 bit.

Information Transmission - EIT100, 2016-06-03 9 (c) How much information about the next card do you get if the dealer says it is another spades? (3 p) Solution: If the dealer says that the next card is another spades, there are only 9 equally probable outcomes (one of the 9 spades) and the uncertainty about the next card becomes H(next card it is a spades) = log 2 9 3.2 bit. Comparing this to the uncertainty (entropy) before I was told that it is another spades (problem (a)), H(next card) 5.6 bit, the information I got was H(next card) H(next card it is a spades) 5.6 3.2 2.4 bit. (d) How much information about the next card do you get if the dealer says it is red? (3 p) Solution: If the dealer says that the next card is red, there are 26 equally probable outcomes (one of the 13+13 hearts and diamonds) and the uncertainty about the next card becomes H(next card it is a red card) = log 2 26 4.7 bit. Comparing this to the uncertainty (entropy) before I was told that it is another spades (problem (a)), H(next card) 5.6 bit, the information I got was H(next card) H(next card it is a red card) 5.6 4.7 0.9 bit.