Premium Essay

Nt1310 Unit 9 Final Report

Submitted By
Words 447
Pages 2
to (01110)3 to get the equivalent ternary number as (12210)3 = (156)10.
By performing exactly reverse process, we can reconvert the received m digit ternary message to its equivalent binary form. That is first we scan the given ternary number from its most significant (leftmost) digit position in a digit by digit manner, and convert the part of the so far scanned ternary digits to its equivalent binary representation.
Because of Binary to ternary conversion of data we have the advantage of reduction in the total number of symbols to be transmitted and hence the total transmission duration gets saved. As we know both the transmitter and the receiver consume energy with respect to their duration for which they are switched on, regardless of the symbol transmitted, this recoding to a higher radix will lead to a savings in energy at both the transmitter and the receiver simultaneously.
The transmission protocol of TSS involves the following steps:
Protocol Transmit TSS …show more content…
Step 2: Transmit this recoded ternary data symbol by symbol, using the following rules:
Step 2.1: If the transmitted symbol is to be 0, then switch off the transmitter for the symbol period.
Step 2.2: switch on the transmitter and for the transmission of symbol (1 or 2) in the time slot.
The receiver side protocol is the reverse of the transmitter side protocol.
Protocol Receive TSS
Step 1: Receive the ternary encoded data symbol by symbol as follows:
Step 1.1: If a signal is received in the given time slot (symbol period), then the received symbol is either a 1 or a 2, depending on the predetermined received signal to symbol mapping.
Step 1.2: Otherwise, if the channel remains silent, then the received symbol is a 0.
Step 2: Convert the received ternary message to binary using the Ternary2Binary protocol.

IV.

Similar Documents

Premium Essay

Nt1310 Unit 9 Final Report

...1) Describe what you did and how you did it. Last week before finals. I cannot believe that this term is almost over. Well, in this week the main topics were “Common Vulnerability Scoring System (CVSS), Common Vulnerability Scoring System (CCSS), and Common Misuse Scoring System (CMSS). We basically continue learning and developing new skills to be good in the software engineering world. This week the discussion was not that complicated I think, I guess I got used to discussion where you really have to do your research in order to find the expected answer, but regardless to me any discussion is of great help and give you different perspectives based on how the rest of the students think and respond. No assignment, probably because we have to cover a lot of material before that final exam and we need as much time as we can get to study, and last but no least we had a self-quiz but we also had a review quiz of the entire course, basically intended for us to practice for the final exam, which I think is great; I want to get as much help and practice as I can to end up getting a good final grade. 2)...

Words: 565 - Pages: 3

Premium Essay

Nt1310 Unit 9 Final Report

...9.8. KARPLUS CURVE – VARIATION OF COUPLING CONSTANTS WITH DIHEDRAL ANGLE The Coupling constant, J varies with dihedral angle Figure 9.15. Staggered and eclipsed conformations Vicinal Coupling (3J) For Vicinal protons value of coupling constant varies with dihedral angle. Vicinal protons are the protons separated by three bonds. Dihedral angle between two axial hydrogen is 180° while the axial equatorial and equatorial equatorial dihedral angles are both 60°. The coupling constant reaches a maximum when the dihedral angle is 180° i.e when the hydrogen is anti-periplanar with the most effective overlap of orbitals. It is slightly smaller than maximum when the dihedral is 0° i.e. when the vicinal hydrogen is syncoplanar and reaches a minimum. When the dihedral angle between the hydrogen is 90° and orbitals are orthogonal. One of the most important consequences of the karplus equation is on the order of magnitude of diaxial, axial- equatorial and diequatorial coupling constants (Jaa, Jac, and Jee resp) in a cyclohexane ring chair system. The axial axial coupling constant in rigid cyclohexanes is normally large 8-15Hz, since the dihedral angle between two axial hydrogen is 180°. The axial–equatorial and equatorial equatorial coupling constant are in the range 2-5 Hz since their corresponding dihedral angles are both 60° Figure 9.16. Karplus Curve The magnitude of JHH’ between the vicinal protons (H-C-C-H’) is influenced by the dihedral angle θ between the vicinal protons. The magnitude...

Words: 991 - Pages: 4

Free Essay

Nt1310 Exams

...NT1310 Physical Networking ITT TECHNICAL INSTITUTE NT1310 Physical Networking ASSESSMENTS -1- 09/27/2012   NT1310 Physical Networking Mid-Term Exam Scope This exam tests the objectives in Units 1-4. 1. Which of the following is not a common cable used today? a. Twisted-Pair b. Fiber-Optic c. Plenum d. Coaxial 2. What unit of measurement is a tenfold logarithmic ratio of power output to power input? a. Volts b. Hertz c. Watts d. Decibel 3. Which of the following does not contribute to attenuation? a. Conductor resistance b. Mutual capacitance c. Impedance d. Frequency increases 4. Which of the following is not a type of crosstalk? a. Alien Crosstalk b. Pair-to-Pair Crosstalk c. Equal-Level Far-End Crosstalk d. Mutual Crosstalk 5. Which organization is part of the US government? a. Federal Communications Commission b. Underwriters Laboratories c. National Fire Protection Association d. Institute of Electrical and Electronic Engineers 6. What is the National Fire Protection Associate (NFPA) responsible for? a. Works with cabling and other manufacturers to ensure that electrical devices are safe. b. The development and publication of the National Electric Code. c. Helps promote standardization of electrical components, power wires and cables. d. Responsible for 30 percent of the electrical-engineering, computer and controltechnology literature published in the world today. -2- 09/27/2012   NT1310 Physical Networking 7. A telecommunications...

Words: 3426 - Pages: 14

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10