Question: The store owner sends a binary bitstream to the store manager after a request from the latter that he will be depositing on the vault the last day’s collection and also to get supplies from the protected room. The owner sends this bitstream to the manager: 00100 10001 01011 00101 01010 11011 00110 11000 11111 00111 00001 01111 00010 00011 01011 Decode the given bitstream and interpret the message that was sent.

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter13: Internet And Distributed Application Services
Section: Chapter Questions
Problem 15VE
icon
Related questions
Question

A businessman implemented a locking mechanism for the main door using an IOT-powered smart door lock where the VAULT and supplies for the business are stored. The smart door lock is implemented by keying in a 5-digit alphanumeric passcode to open the door and the self-locking mechanism allows the password to be utilized once and is reset when the door is locked again. The store owner encodes the passcode via the network for the door to be opened.

Moreover, whenever there is a need to get items from the protected room including the vault, the store manager requests the binary-represented passcode wherein which is passed on to the store manager using SMS using a binary stream that represents the 5 alphanumeric passcodes. The bitstream is utilized to make sure that it is protected and can only be decrypted by someone who knows the process of decoding the binary bitstream. The rules of encoding the binary bitstream follow these steps/information:

  1. Bitstream represents a 5-digit alphanumeric passcode.
  2. Each character was encoded using the hamming code method adopting an EVEN parity

bit to compute the check bit. Each character is represented using a 11-digit binary representation.

  1. Framing was done using a starting delimeter of 00 and ending delimeter of 11.
  2. Transmitted frame that represents the whole bitstream sent through SMS to the store manager is composed of a total of 75 binary digits that comprise 5 11-digit frames representing the 5-digit alphanumeric passcode and a 20 digit starting and ending delimiters used for the 5 frames.
  3. After computing for the value of each transmitted frame representation of each character on the passcode, the owner encodes a possible error bit on the frames to ensure a layer of added protection.

The decoding process is done using the following steps:

  1. Bitstream is processed by determining the frames represented utilizing the 00 and 11 starting and ending delimeters respectively.
  2. Each frame is checked using the hamming code method using the rules that has been set for encoding the transmitted frame. Whenever an error-bit is determined, the error bit is corrected.
  3. Data bits on the transmitted frame is extracted and converted to its binary equivalent.
  4. A total of 5 alphanumeric characters will be extracted from the bitstream sent

The following scheme represents how the passcode is INTERPRETED: 

  1. 1st character – 1st character(number/alphabetic digit) of the passcode
  2. 2nd character – 2nd character(number/alphabetic digit) of the passcode
  3. 3rd character – 3rd character(number/alphabetic digit) of the passcode
  4. 4th character – 4th character(number/alphabetic digit) of the passcode
  5. 5th character – hour to be ENCODED character(number digit). Tells you when the door can be opened during the time of the day. Only the possible digits can be contained in this place:
  1. 8 – 8AM
  2. 9 – 8AM
  3. 10 – 8AM
  4. 11 – 8AM
  5. 2 – 2PM
  6. 3 – 2PM
  7. 4 – 2PM
  8. 5 – 2PM
  9. 6 – 2PM

Question:

The store owner sends a binary bitstream to the store manager after a request from the latter that he will be depositing on the vault the last day’s collection and also to get supplies from the protected room. The owner sends this bitstream to the manager:

00100 10001 01011 00101 01010 11011 00110 11000
11111 00111 00001 01111 00010 00011 01011


Decode the given bitstream and interpret the message that was sent.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Knowledge Booster
Huffman coding
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning