A businessman implemented a locking mechanism for the main door using an IOT-powered smart door lock where the VAULT and supplies for the business are stored. The smart door lock is implemented by keying in a 5-digit alphanumeric passcode to open the door and the self-locking mechanism allows the password to be utilized once and is reset when the door is locked again. The store owner encodes the passcode via the network for the door to be opened. Moreover, whenever there is a need to get items from the protected room including the vault, the store manager requests the binary-represented passcode wherein which is passed on to the store manager using SMS using a binary stream that represents the 5 alphanumeric passcodes. The bitstream is utilized to make sure that it is protected and can only be decrypted by someone who knows the process of decoding the binary bitstream. The rules of encoding the binary bitstream follow these steps/information: Bitstream represents a 5-digit alphanumeric passcode. Each character was encoded using the hamming code method adopting an EVEN parity bit to compute the check bit. Each character is represented using a 11-digit binary representation. Framing was done using a starting delimeter of 00 and ending delimeter of 11. Transmitted frame that represents the whole bitstream sent through SMS to the store manager is composed of a total of 75 binary digits that comprise 5 11-digit frames representing the 5-digit alphanumeric passcode and a 20 digit starting and ending delimiters used for the 5 frames. After computing for the value of each transmitted frame representation of each character on the passcode, the owner encodes a possible error bit on the frames to ensure a layer of added protection. The decoding process is done using the following steps: Bitstream is processed by determining the frames represented utilizing the 00 and 11 starting and ending delimeters respectively. Each frame is checked using the hamming code method using the rules that has been set for encoding the transmitted frame. Whenever an error-bit is determined, the error bit is corrected. Data bits on the transmitted frame is extracted and converted to its binary equivalent. A total of 5 alphanumeric characters will be extracted from the bitstream sent The following scheme represents how the passcode is INTERPRETED:  1st character – 1st character(number/alphabetic digit) of the passcode 2nd character – 2nd character(number/alphabetic digit) of the passcode 3rd character – 3rd character(number/alphabetic digit) of the passcode 4th character – 4th character(number/alphabetic digit) of the passcode 5th character – hour to be ENCODED character(number digit). Tells you when the door can be opened during the time of the day. Only the possible digits can be contained in this place: 8 – 8AM 9 – 8AM 10 – 8AM 11 – 8AM 2 – 2PM 3 – 2PM 4 – 2PM 5 – 2PM 6 – 2PM Question: The store owner intends to give the passcode code “2Bw5” and intends to have the password effectivity by 6PM only, help him encode the transmitted bitstream. For readability purposes. Your answer on your paper should be formatted n such a way that 5 consecutive binary digits are presented followed by a space. Use this scheme in writing the whole binary bitstream. Example: BITSREAM: 111000111000111 ANSWER PRESENTED ON YOUR PAPER: 11100 01110 00111

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

A businessman implemented a locking mechanism for the main door using an IOT-powered smart door lock where the VAULT and supplies for the business are stored. The smart door lock is implemented by keying in a 5-digit alphanumeric passcode to open the door and the self-locking mechanism allows the password to be utilized once and is reset when the door is locked again. The store owner encodes the passcode via the network for the door to be opened.

Moreover, whenever there is a need to get items from the protected room including the vault, the store manager requests the binary-represented passcode wherein which is passed on to the store manager using SMS using a binary stream that represents the 5 alphanumeric passcodes. The bitstream is utilized to make sure that it is protected and can only be decrypted by someone who knows the process of decoding the binary bitstream. The rules of encoding the binary bitstream follow these steps/information:

  1. Bitstream represents a 5-digit alphanumeric passcode.
  2. Each character was encoded using the hamming code method adopting an EVEN parity

bit to compute the check bit. Each character is represented using a 11-digit binary representation.

  1. Framing was done using a starting delimeter of 00 and ending delimeter of 11.
  2. Transmitted frame that represents the whole bitstream sent through SMS to the store manager is composed of a total of 75 binary digits that comprise 5 11-digit frames representing the 5-digit alphanumeric passcode and a 20 digit starting and ending delimiters used for the 5 frames.
  3. After computing for the value of each transmitted frame representation of each character on the passcode, the owner encodes a possible error bit on the frames to ensure a layer of added protection.

The decoding process is done using the following steps:

  1. Bitstream is processed by determining the frames represented utilizing the 00 and 11 starting and ending delimeters respectively.
  2. Each frame is checked using the hamming code method using the rules that has been set for encoding the transmitted frame. Whenever an error-bit is determined, the error bit is corrected.
  3. Data bits on the transmitted frame is extracted and converted to its binary equivalent.
  4. A total of 5 alphanumeric characters will be extracted from the bitstream sent

The following scheme represents how the passcode is INTERPRETED: 

  1. 1st character – 1st character(number/alphabetic digit) of the passcode
  2. 2nd character – 2nd character(number/alphabetic digit) of the passcode
  3. 3rd character – 3rd character(number/alphabetic digit) of the passcode
  4. 4th character – 4th character(number/alphabetic digit) of the passcode
  5. 5th character – hour to be ENCODED character(number digit). Tells you when the door can be opened during the time of the day. Only the possible digits can be contained in this place:
  1. 8 – 8AM
  2. 9 – 8AM
  3. 10 – 8AM
  4. 11 – 8AM
  5. 2 – 2PM
  6. 3 – 2PM
  7. 4 – 2PM
  8. 5 – 2PM
  9. 6 – 2PM

Question:

The store owner intends to give the passcode code “2Bw5” and intends to have the password effectivity by 6PM only, help him encode the transmitted bitstream. For readability purposes. Your answer on your paper should be formatted n such a way that 5 consecutive binary digits are presented followed by a space. Use this scheme in writing the whole binary bitstream.

Example: BITSREAM: 111000111000111
ANSWER PRESENTED ON YOUR PAPER: 11100 01110 00111

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY