• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Signalling Theory

Extracts from this document...

Introduction

Communications Technology Task1 Signaling Theory There are two different types of signals in today's communicational world, they are digital and analog. Living in today's society depends upon multiple telecommunications, especially in business. Tele is a word that has derived from the Greeks and means at a distance. Combine this with communications and you have "telecommunications" this is a term to describe communication at a distance. This is something which takes place on a daily basis throughout the world and whichever way you look at it, communications are sent with a signal. From here alternative methods and forms of communications can be explained. The two variant forms are analogue and digital. They both have their positives and negatives however in today's society can there really be room for both? The answer to this question is yes. Analogue comes in the form of a "wave" as seen in figure 1. Analogue Signal This consequently is only the case when it comes to photography. Analogue is superior because it has a wider range of values than its counterpart - digital. For telecommunications analogue really is outdated and is inefficient. An example will now be given. When the signal starts from the source, "the sender", it has a perfect wave shape, like in the diagram above. ...read more.

Middle

This is likely to happen with any new brand of technology and it just costs money. When digital signals are sent through the channels they still receive resistance. It's however on a lesser scale due to the encryption and so on. Using basic numbers such as 0 and 1 in a methodological approach can assist in fixing these errors. There will always be some sort of deviation from the original signal, however today things need to work to their optimum performance levels. Analogue in its day was just that but is now far too outdated. With such extreme advances in technology, digital is the way forward. Role of the Modem The modem is vital for making communications happen in computing. It's the central figure of the way communications from computer to computer occur. As described, computers are forms of digital applications. They are in turn only capable of producing a digital output. As the globe has only been using analogue signals to communicate for the last 10 - 20 years, this rather limits opportunity in sending digital data from one computer to another. Phone lines are all forms of analogue signaling and this is perfect for telephone calls, however this generation need more. ...read more.

Conclusion

For frequency modulation 0 = For Frequency Modulation 1 = For Phase Modulation 0 = For Phase Modulation 1 = Once the signals have been modulated into their variant forms they are then able to be sent through a channel. What form the digital signal is modulated into depends on the nature of what it shall be used for. For Radio the likely hood will be that it will be in either a Frequency or Amplitude modulated signal. This is due to the channel it is being sent through. The channel it's being sent through constrains the signal to be sent. Amplitude is suitable for radio as it can increase the amps of wave strength to suit whilst the frequency remains a constant. Frequency modulation is commonly preferred today due to its vast array of differences although it does use a much higher bandwidth than its counterpart. It's an adaptable radio wave and comes in many forms. It has a narrow band feature which can be used in day to day radio for speech and music. Narrow band ensures that a low bandwidth is to be used. Further, frequency modulated waves are used to record on basic VHS recording systems. VHS has a large range of frequency components which range from a few mega hertz to several. ?? ?? ?? ?? Ricki Lambert ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Visual basic

    If godown = True Then 'make the ball go down ball.Top = ball.Top + 40 'if godown equals to false then... ElseIf godown = False Then 'do nothing End If End Sub Private Sub setlifes_Timer() 'sets the caption on the label life to the integer lifes life.Caption = lifes 'if

  2. Signal Theory

    If the frame is comes from the same port as the destined port than it simply discards the frame. If the destined location is not known than it will be flooded throughout the outgoing ports and segments. Repeaters -One of the less complex hardware of the networking world, because it

  1. Analysis of Johnson Music

    In my A-level studies at college I have to produce a system that will solve a problem by computerising a situation that is not yet computerised. My proposal to you is that you let me help you with your stock control system by producing a computerised system that will significantly

  2. AQA Computing CPT3

    Evidence and Explanations * Begin Fuelling (Lift Nozzle & Start Dispensing Button) A button has been created and called 'startDispensing_btn', once this button is clicked; an event listener allows the action of startDispensingClick to function, the event listener used is shown below.

  1. Smart Card System

    The comparison digest on the server must be stored in a fashion that it is retrievable. It stores the password using the one way "crypt() function". When the password comes across, the server uudecoded it and then crypts it to check against the stored value.

  2. Flexible Architectures in Communication Security Application

    output[2] = IV[0] = x[0] � key[2]; output[3] = IV[0] = x[1] � key[3]; Figure 3. The Twofish Cipher Kernel. All variables are 32-bit integers. Rotates are indicated by <<< and >>>. Lisa Wu Page 14 4/22/01 a random perturbation of each output bit with probability 50%.

  1. Data communications and neetworks

    An analogue clock will never stop, as the second hand is always ticking, therefore one can record an accurate reading of the time to the second, or even millisecond. For example, 1 hour 15 minutes and 24 seconds. Appose this to digital signalling where one can not get an accurate

  2. Definition-nature of the problem solved - Car Mechanic business

    Interview with manager The system must provide a report that lists customers who have requested a job in the last 7 days. Interview with manager The system must produce printouts regarding the requirements for a job to be given to the customer so they are fully aware of what they are paying for and also as an insurance policy.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work