• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Flow Control and Data Compression

Extracts from this document...

Introduction

Ricki Lambert Communications Technology Task 2 Introduction In this assignment the following topics shall be covered. They are, 1. Flow control 2. Data compression 3. Error correction and detection Firstly flow control shall be looked at and the methods it undergoes when being implemented. Flow control is an efficient way of handling data when it's to be sent to an external entity. For example this maybe the likes of a printer, further a modem may be the entity. All information that is to be sent to the entities must have a place to be stored. This is within the built in buffer, when the memory gets to full flow control is implemented and the jobs again can be stored. This ensures a faster speed of processing jobs whether they be print jobs or e-mails and helps maintain stability. Flow Control An example of flow control to be used will be the sending of information to a printer. A printer will contain what is known as a buffer. A buffer is there to aid the printer when to many jobs are sent. ...read more.

Middle

When data has been compressed and sent over the network it is in a "reduced" form. This saves speed as previously said. The problem with this is the decompression methodology at the other end. If this algorithm/process is not very efficient then the overall speed may not decrease that significantly at all. Run Length Encoding It is important to compress data to make file sizes smaller and increase speed times. When sending faxes users wish to send the information at the quickest speeds possible and this may only be done by the use of compression. For example if a page was made of black and white dots and was to be sent, instead of writing W W W W W W W W B B B W to represent white dots we may write 8W, this represents 8 white dots. There are also three black dots present and this would then be written as follows, 8W3B1W Overall this would compress a bigger file size immensely. It is called R.L.E run length encoding. ...read more.

Conclusion

respectively again, as was sent in the first place, so this is a floor in the check, further it only has a 50:50 chance of detecting burst errors. Error Correction Error correction is a simple process. When sending information such as text, for example mother and donkey, there are a number of ways in which the computer can correct the errors that have occurred. Word Character Difference Mother Donkey Comment Likely Match Donkey 4 0 Perfect Match to donkey but 4 to mother Donkey Hotter 2 4 Closer to mother than donkey Mother Mother 0 4 Perfect match to mother and maximum difference to donkey Mother Mither 1 5 Closer to mother than donkey Mother Monkey 3 1 Closer to donkey than mother Donkey Cables 5 5 As close to mother as donkey. Cannot determine correct message. ???????????? The process is simple. The programme will try to match the exact phrase to a list of comparisons and will then define what fits into the original word the best. This will work on the process of elimination and when complete can define what the exact word should be. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    Servers - These are high-performance computer which serve information to other computers. Also known as clients can connect to other servers on the internet via a LAN or a WAN network. There are lots of different servers which are hosted and can be connected to via the internet, normally they

  2. Smart Card System

    The system will proceed to the next form if the smart card is verified. Once the smart card is verified, this form will appear. In this form the user has to key in their user name and password in order to use the computer.

  1. Different Control Sensors

    There are then thermocouple types derived which can be used for differing purposes. Thermocouples are easy to use and require no batteries or fancy electronics. However, the voltage signals generated are very small so an amplifier may be required if you wish to read the temperatures into a computer Control

  2. Flexible Architectures in Communication Security Application

    As shown in Figure 5, introducing these stalls has a significant affect on dataflow machine performance. The most prevalent factors leading to poor performance are insufficient issue bandwidth and lack of function unit resources, with Rijndael and RC4 having the largest impacts.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Integer 10 Preferred contact method String 5 Availability file This file holds the information on the apartment's availability. It will be separate to the contact file because having bother files together will make matters confusing and difficult to code the program.

  2. ELECTRONIC DATA INTERCHANGE

    Reduced Administration The process of checking invoices to statements is a time consuming process. EDI enables the invoices to be passed for payments more quickly. g) Central Control Internal EDI is of great significance for retailers that have many branches.

  1. Data flow diagrams.

    Drawing the diagram in this way emphasizes the Input-Output properties of a system. The Context diagram above, and the decomposition which follows, are a first attempt at describing part of a 'Home Catalogue' sales system. In the modeling process it is likely that diagrams will be reworked and amended many

  2. Investigate Data Communications.

    This group was founded in 1946 and has issue more than 5000 standards on a wide range of areas. Its purpose is to promote the development of standardisation and related activities to facilitate international exchange of goods and services. Standards have been made to cover items from screw threads to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work