Q1. Create two n-bit codes C1 and C2 (where n is the minimum number of bits) sufficient to uniquely encode each letter (in upper and lower case) of your full name (exclude spaces between first/second/third names). Each letter, even if it repeats in the name (as S repeats in COMSATS), should get only one unique code. No two codes in Cl and C2 should be the same. For example, to encode upper and lower case letters of COMSATS, the binary codes Cl and C2 are given in the Table 1. Sum all the bits of code C2 and produce a sum (S) and a carry (C) bit for each row of code C2 as shown in the table 1. SUMing bits of C2 Sum bit (S) Upper case letters of name Code C1 Lower case letters of name Code C2 Carry bit (C) 1 C 0000 00 01 0010 0110 0111 1 1 M m 1000 S 0011 1001 1 A 0100 a 1010 1 T 0101 1011 1 1
Q1. Create two n-bit codes C1 and C2 (where n is the minimum number of bits) sufficient to uniquely encode each letter (in upper and lower case) of your full name (exclude spaces between first/second/third names). Each letter, even if it repeats in the name (as S repeats in COMSATS), should get only one unique code. No two codes in Cl and C2 should be the same. For example, to encode upper and lower case letters of COMSATS, the binary codes Cl and C2 are given in the Table 1. Sum all the bits of code C2 and produce a sum (S) and a carry (C) bit for each row of code C2 as shown in the table 1. SUMing bits of C2 Sum bit (S) Upper case letters of name Code C1 Lower case letters of name Code C2 Carry bit (C) 1 C 0000 00 01 0010 0110 0111 1 1 M m 1000 S 0011 1001 1 A 0100 a 1010 1 T 0101 1011 1 1
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
This question is from the subject Digital Logic Design.
Solve the question for name Ammad Naseer
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY