• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Flow Control and Data Compression

Extracts from this document...


Ricki Lambert Communications Technology Task 2 Introduction In this assignment the following topics shall be covered. They are, 1. Flow control 2. Data compression 3. Error correction and detection Firstly flow control shall be looked at and the methods it undergoes when being implemented. Flow control is an efficient way of handling data when it's to be sent to an external entity. For example this maybe the likes of a printer, further a modem may be the entity. All information that is to be sent to the entities must have a place to be stored. This is within the built in buffer, when the memory gets to full flow control is implemented and the jobs again can be stored. This ensures a faster speed of processing jobs whether they be print jobs or e-mails and helps maintain stability. Flow Control An example of flow control to be used will be the sending of information to a printer. A printer will contain what is known as a buffer. A buffer is there to aid the printer when to many jobs are sent. ...read more.


When data has been compressed and sent over the network it is in a "reduced" form. This saves speed as previously said. The problem with this is the decompression methodology at the other end. If this algorithm/process is not very efficient then the overall speed may not decrease that significantly at all. Run Length Encoding It is important to compress data to make file sizes smaller and increase speed times. When sending faxes users wish to send the information at the quickest speeds possible and this may only be done by the use of compression. For example if a page was made of black and white dots and was to be sent, instead of writing W W W W W W W W B B B W to represent white dots we may write 8W, this represents 8 white dots. There are also three black dots present and this would then be written as follows, 8W3B1W Overall this would compress a bigger file size immensely. It is called R.L.E run length encoding. ...read more.


respectively again, as was sent in the first place, so this is a floor in the check, further it only has a 50:50 chance of detecting burst errors. Error Correction Error correction is a simple process. When sending information such as text, for example mother and donkey, there are a number of ways in which the computer can correct the errors that have occurred. Word Character Difference Mother Donkey Comment Likely Match Donkey 4 0 Perfect Match to donkey but 4 to mother Donkey Hotter 2 4 Closer to mother than donkey Mother Mother 0 4 Perfect match to mother and maximum difference to donkey Mother Mither 1 5 Closer to mother than donkey Mother Monkey 3 1 Closer to donkey than mother Donkey Cables 5 5 As close to mother as donkey. Cannot determine correct message. ???????????? The process is simple. The programme will try to match the exact phrase to a list of comparisons and will then define what fits into the original word the best. This will work on the process of elimination and when complete can define what the exact word should be. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    Servers - These are high-performance computer which serve information to other computers. Also known as clients can connect to other servers on the internet via a LAN or a WAN network. There are lots of different servers which are hosted and can be connected to via the internet, normally they

  2. Different ways of data capture

    INTEGRATED PACKAGES AND SOFTWARE SUITES Integrated Packages: These are a combination between five applications packages Word processor, Databases, Spreadsheets, Presentation Graphics and Communications software e.g MS Works. These are less sophisticated than an individual package but are relatively cheaper. Software Suites: These are software products packaged together at a much lower price e.g MS office provides word, excel, access, powerpoint.

  1. Different Control Sensors

    There are then thermocouple types derived which can be used for differing purposes. Thermocouples are easy to use and require no batteries or fancy electronics. However, the voltage signals generated are very small so an amplifier may be required if you wish to read the temperatures into a computer Control

  2. Smart Card System

    Time Constraint The time allocated to develop the system is very short. Thus, the team does not have much more time to explore more Java programming tools. Besides that, while learning and improving programming skills, the team found that it is very difficult to learn at one time within the short period of time.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    ShowMessage('Password successfully changed'); // Notify user that password has been changed FormPassword.Close; // Close the form Assignfile(logonfile, 'userpass.pwd'); // Associate logonfile with userpass.pwd BEGIN Rewrite(logonfile); // Open file Write(logonfile, logonlist[position]); // Writes the new password to correct position in file Closefile(logonfile); // Terminates the use of the file END; END

  2. Flexible Architectures in Communication Security Application

    The key size is the length of the key used to encrypt or decrypt data. The block size is the amount of data processed each time the cipher kernel is invoked. The number of rounds specifies the total number of iterations executed by the cipher kernel loop.


    of your company, then seek the services of a vendor that meets you needs closely. f) Hardware/Software Hardware issues include the decision on where and how to move from manual system to EDI and how this change will be implemented.

  2. The Data Management Structure: Components and the data structure

    These "files" are objects, managed by the system the Data Manager. You merely name the system-defined File through which you plan to manipulate your data. The Data Manager will connect your program to the file at run time, feeding data to the program when the data and the program are

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work