
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
You are asked to design a 16-bit floating point number system to store the lengths of various man-made objects. This system should work in a similar way as the IEEE754 standard. Assume a value stored in the system denotes the length of an object in centimeters, assume also that the maximum length to be stored is 45845.0 centimeters (i.e. length of the biggest man-made oil-tanker, the “Seawise Giant”).
Note: This representation has normalized, de-normalized and special cases as you have seen in IEEE754 standard.
Answer the questions below:
a) Is sign bit needed in this system? Why yes or why not.
b) What is the minimum number of bits needed for the exponent? What is the value of the corresponding bias? Show your steps clearly. If you write the values directly without showing the steps, you will not get any point.
c) What is the maximum length the system can represent? Please show your steps clearly, otherwise no point will be given.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps with 1 images

Knowledge Booster
Similar questions
- Suppose the characters 0,1,...,8,9, A,B,C,D,E,F are used to represent a hex adecimal (base-16) number. Here A = 10 B =11,..., F = 15 What is the largest base-10 integer that can be represented with a two-digit hexadecimal number, such as 14 or 3A? (A) 32 (B) 225 (C) 255 (D) 256 (E) 272arrow_forwardHow many normalized numbers are represented by the floating point system F (β, t, L, U )? Provide a formula in terms of these parametersarrow_forwardWrite a code in sim8085 for the following problem: The pressure of two boilers is monitored and controlled by a microcomputer works based on microprocessor programming. A set of 6 readings of first boiler, recorded by six pressure sensors, which are stored in the memory location starting from 2050H. A corresponding set of 6 reading from the second boiler is stored at the memory location starting from 2060H. Each reading from the first set is expected to be higher than the corresponding position in the second set of readings. Write an 8085 sequence to check whether the first set of reading is higher than the second one or not. If all the readings of first set is higher than the second set, store 00 in the ‘D’ register. If any one of the readings is lower than the corresponding reading of second set, stop the process and store FF in the register ‘D’. Data (H): First set: 78, 89, 6A, 80, 90, 85 Second Set:71, 78, 65, 89, 56, 75arrow_forward
- VI. Floating point representation Consider a 12-bit variant of the IEEE floating point format as follows: • Sign bit 5-bit exponent with a bias of 15. • 6-bit significand All of the rules for IEEE 754 Standard apply. Fill in the numeric value represented by the following bit patterns. You must write your number in decimal form (e.g. 0.0146485375, -0.0146485375). Bit Pattern 010011101110 111011101011 100101001111 001010111010 Numerical Valuearrow_forwardIn a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs? A) The program attempted to perform an operation that is considered an undecidable problem. B) The precision of the result is limited due to the constraints of using a floating-point representation. C) The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value. D) The program cannot represent integers; the integers are converted into decimal approximations, leading to rounding errors.arrow_forwardSuppose that we use the floating-point format with 12 decimal digits, SEEEMMMMMMMM, to rep- resent a real number, where S is the digit to represent the sign of the mantissa (use 0 for pos- itive and 5 for negative), EEE are the 3 digits to represent the exponent in excess-500 format, MMMMMMMM are the 8 digits to represent the magnitude of the mantissa, and the decimal point of the mantissa is right to the left of MMMMMMMM (i.e., SEEEMMMMMMMM representing the real number +0.MMMMMMMM × 10EEE-500) What are the smallest positive number and the largest positive number that can be represented in this format? Write them in exponential notation.arrow_forward
- In this question, you are provided with a decimal floating-point number. You are asked to encode this value into its IEEE-754 floating-point representation in the form of 8 hexadecimal digits. If rounding is needed, use rounding to the nearest floating-point number. Do NOT add any spaces or commas to your answer. Represent, i.e., encode, 262148.140625 into a 32-bit single-precision IEEE-754 FP value. If rounding is needed, use rounding to the nearest FP number. Your answer MUST BE JUST 8 hexadecimal digits. Write each hexadecimal digit in a field by itself. B } Ox D R D = = }arrow_forwardPlease use C++ In this lab, you need to write a program which, given a seven digit binary input given below, it will check to see if there is a single bit error using the Hamming Code method discussed in lab. For a sample of Hamming Code, the input: 1110101 will reveal that ‘110’ is the location of the error (meaning the sixth slot in the input), so the corrected number would be 1010101, and the actual message transmitted, would be 1011, which is 11 in decimal. You can use this example to test your program to ensure it’s working correctly. Create a program which can, given a 7-bit long input, written in Hamming Code style, do the three following tasks, displaying the results as output. (1) Determine if there’s an incorrect bit, and if so, where it is. (2) Display what the CORRECT code should look like (if it needs to be corrected.) (3) Display the decimal form of the message that was sent, after any needed correction. Remember, when using Hamming…arrow_forwardConvert the decimal number -43.68 to a floating-point number expressed in the 14-bit simple model given in your textbook. Note: in the 14-bit simple model, the left-most bit is the sign, followed by 5 bits for the exponent, followed by 8 bits for the mantissa (There are no implied bits). The exponent is in Excess 15 notation. 101011.1010arrow_forward
- Implement the Hamming Code error detection and correction algorithm for a group message to be transmitted over a network. Hamming code algorithm allows the receiver to detect errors that may have been introduced due to many factors such as noise, interference, and many others. -> Assume the following: 1. The sender message length is 2 bytes. The data transmitted to the user is the 2-byte data in addition to the parity bits. 2. The receiver must be able to detect and correct 1-bit error. Report :In the report you must include an overview of the Hamming code algorithm and you need to show: 1. The detailed calculation of the minimum number of parity bits needed for a message of 2-byte length. 2. Details on how sender generates the parity bits. 3. Details on how thew receiver detects and corrects a 1-bit error. THANKS., PLEASE GIVE DETAILED DESCRIPTION.arrow_forwardAn interesting application of a PLA is conversion from the old, obsolete punched cards character codes to ASCII codes. The standard punched cards that were so pop- ular with computers in the past had 12 rows and 80 columns where holes could be punched. Each column corresponded to one character. so each character had a 12-bit code. However, only 96 characters were actually used. Consider an application that reads punched cards and converts the character codes to ASCII. a. Describe a PLA implementation of this application. b. Can this problem be solved with a ROM? Explain.arrow_forwardWhy must you be careful when comparing floating-point values for equality?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY