Question: When transmitting information via fixed wireless broadband, rain, snow, and leaves can interfere with microwave transmissions. While other kinds of transmissions can simply detect errors

When transmitting information via fixed wireless broadband, rain, snow, and leaves can interfere with microwave transmissions. While other kinds of transmissions can simply detect errors and re-transmit, fixed wireless would most likely suffer from errors in the re-transmission. Thus it is more efficient to correct the errors. You are in the situation of needing to receive a transmission via fixed wireless, but you know the transmission is not secure. Therefore, each character of the message was treated as a decimal number and then converted to Excess-3. The excess-3 word was then converted to a Gray code word. And finally, the code word was encoded using a hamming code. Your job is to write the code in c++ that will receive a code word and reverse the process and print out the character. You will need to correct any transmission errors before decoding. Since there is no telling how many characters will be in any given transmission, your program needs to keep reading and decoding and printing characters until there are no more transmissions. We will use extended ASCII characters. Thus a message will require 8 bits - which implies a 12-bit code word. Since you cannot actually read transmissions, we will simulate the transmissions with a file. Specifically, all transmitted code words will be in a file called packets.dat

Do NOT have the program ask for ANY input from the user. The program should simply print the message. If you name the input file anything other than packets.dat, you will lose significant points.

A sample packets.dat file follows this file

As always, no pointers, classes, structs, standard template library. You can do this program with simple arrays.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!