Question

In: Computer Science

For the bit stream 1000000010110000000001, sketch the waveform for B8ZS and HDB3. You may make any...

For the bit stream 1000000010110000000001, sketch the waveform for B8ZS and HDB3. You may make any assumptions.

Solutions

Expert Solution

Let's understand some background first:

AMI - it stands for Alternate Mark Inversion. Here, there are three voltage levels +v, 0 and -v. Binary 0 is represented using 0 voltage. And binary 1 is represented as +v if last 1 was represented as -v and vice versa. It means no two consecutive 1's can be represented as same voltage level, either +v or -v. Two consecutive 1's must be represented using opposite polarity.

Scramling is a technique used in case of 8 consecutive 0's.

B8ZS means Binary 8 Zero Substitution and is used for scrambling. 8 consecutive 0's are replaced by 000VB0VB.

V - It means violation of AMI rule. That means if previous 1 was represented using +v, then this bit will also be +v, and if previous 1 was represented using -v, then this bit will also be -v.

B - It means Bipolar, it simply means opposite voltage or polarity of previous bit.

HDB3 means High density bipolar 3 zero. Here 4 consecutive 0's are replaced by 000V or B00V according to following rule:

000V - This pattern will be used when the no. of non-zero (+v or -v) pulses are odd after last substitution.

B00V - This pattern will be used in case of no. of non-zero (+v or -v) pulses being even after last substitution.

Here, odd and even refers to the number of non-zero pulses after last substitution. For 1st substitution, there was only 1 non-zero pulse, hence odd.

For 2nd substitution, there were 3 non-zero pulses after 1st substitution hence, odd. For 3rd substitution, there were 0 non-zero pulses hence even.


Related Solutions

Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In...
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In exclusive or, 0⊕0 = 0, 1⊕0 = 1, 0⊕1 = 1, and 1⊕1 = 0.) a. Recover the original message from the random stream and encrypted stream, by filling in the blanks in the “Recovered” and “ASCII” rows. (In the ASCII column, interpret the byte as an ASCII character and write the value in that row.) Message: ? ? ? ? ? ? ?...
Sketch the waveform of the letter g when it is transmitted via the USART interface, using...
Sketch the waveform of the letter g when it is transmitted via the USART interface, using the format of 1 start bit, 8 data bits and 1 stop bit
Sketch the waveform of the letter g when it is transmitted via the USART interface, using...
Sketch the waveform of the letter g when it is transmitted via the USART interface, using the format of 1 start bit, 8 data bits and 1 stop bit
In a few sentences and include a simple sketch and make it clear if you handwriting...
In a few sentences and include a simple sketch and make it clear if you handwriting ———————— How does the positron emission tomography (PET scan) work ? ———————- In a few sentences and include a simple sketch and make it clear if you handwriting
A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit...
A stream of bits, 01111011111011111101111100, needs to be transmitted at the data link layer using bit stuffing, what is actually transmitted after the bit stuffing? 2) We are transmitting 16-bit data using a Hamming code. What is the minimum number of check bits is needed to ensure that the receiver can correct a single-bit error?
Can someone explain and sketch what a distillation would look like "in a slow stream of...
Can someone explain and sketch what a distillation would look like "in a slow stream of nitrogen introduced through a capillary leak"? Or how I could do that in a student lab type setting? We received a synthesis for a product which has the procedure, but we are supposed to write it up where we could do it in the lab.
?(?) = (? + 5)/[s(s+2)(s^2+6s+10)] Sketch the root locus by hand. You may verify your sketch...
?(?) = (? + 5)/[s(s+2)(s^2+6s+10)] Sketch the root locus by hand. You may verify your sketch using MATLAB but you must show sufficient intermediate work for sketching. Use MATLAB to identify the proportional controller value (to the tenth decimal point) that would cause your system to be unstable. Be sure to show evidence of this value. Plot your system response due to a step input for this controller.
True or False Label the following statements -Although any state may make a treaty with a...
True or False Label the following statements -Although any state may make a treaty with a foreign government, only the federal government makes common law. -A federal district court may hear any lawsuit in which there is a bona fide question of federal law. -Jurisdiction refers to the legal power of a court to deal with either the subject or the persons in the case. -Obscene speech is not protected by the First Amendment. -The equal protection clause applies to...
You are allowed to use any sources you like. Make sure to cite any sources you...
You are allowed to use any sources you like. Make sure to cite any sources you use (any reasonable citation style is fine). Do not copy text from any source (short, cited quotes OK). Question: In a species of deer, you find an allele that causes females to always produce an equal number of male and female offspring. Present an argument affirming that this sex ratio is an evolutionary stable strategy. Then, try to present a plausible scenario in this...
Make a sketch that shows a carbon atom and the molecule it is a part of...
Make a sketch that shows a carbon atom and the molecule it is a part of before soil is wet. A second sketch should show the same carbon atom now as a part of CO2 in the atmosphere. Describe what happened to cause the carbon atom to become a part of a different molecule.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT