--%>

Analysis on Wireless Technology

1. Summarize what is being accomplished in this section in a few sentences.

What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates two PN sequences that we are watching on the oscilloscope.  

2. Use the two oscilloscope channels (ch A and ch B) to display TTL X and TTL Y of the Message Sequence Generator module.  Are these identical?  Should they be?  Could they be?

The two signals that we are looking at are not identical.They should not be identical because we are generating two different random signals. They technically could be the same but the chances of that are very very slim so no they really could not be identical. 

2417_paint 1.png

3. Display the multiple sequence generator output.  Are these binary?  Should they be?
Yes, these waveforms are a binary sequence. These outputs on the multiple sequence generator are our PN sequences. PN sequences are a sequence of binary numbers which appears to be random, but in fact perfectly deterministic. 

823_paint.png
 
4. When the bit rate of a message signal from the message sequence generator and the bit rate of a PN code from the multiple sequence generators are compared, which is higher?  How did you compare them?  Could you determine by how much the bit rate of one is higher?

 

 

   Related Questions in Computer Network Security

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.  

  • Q : Number of keys required to communicate

    Specify the number of keys required for the two people to communicate through a cipher?

  • Q : Kinds of cryptanalytic attacks Specify

    Specify the kinds of cryptanalytic attacks.

  • Q : What is triple encryption Explain the

    Explain the term triple encryption?

  • Q : Computer crime Explain the term

    Explain the term Computer crime and what are the Suggestion to stop them ?

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : Rot Word and Shift Rows Explain

    Explain difference between the Rot Word and Shift Rows?

  • Q : Key distribution center Explain the key

    Explain the key distribution center?

  • Q : Project to simulate network attack

    Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism. Encipher message by using a keyword;

    Discover Q & A

    Leading Solution Library
    Avail More Than 1445511 Solved problems, classrooms assignments, textbook's solutions, for quick Downloads
    No hassle, Instant Access
    Start Discovering

    18,76,764

    1944631
    Asked

    3,689

    Active Tutors

    1445511

    Questions
    Answered

    Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!

    Submit Assignment

    ©TutorsGlobe All rights reserved 2022-2023.