• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10

BTEC Unit 8: The Theory of Data Communications

Extracts from this document...

Introduction

The Theory Of Data Communications By Josh Hancock This book explains the basics of communication devices and forms of communication used within networking and the internet. Farnham College 14/10/2008 Assignment 1: The theory of data communications 2 Chapter 1 2 Chapter 1a 2 Identify and explain types of communication devices 2 Data Terminal Equipment (DTE) 2 Data Circuit-terminating Equipment (DCE) 2 Wireless Devices 2 Explain the principles of signal theory 3 Data 3 Denary to Binary 3 Data Packets 4 Asynchronous and Synchronous Transmissions 4 Bandwidth (Analogue) 4 Bandwidth (Digital) 4 Chapter 1b 5 Explain techniques that can be used to reduce errors in transmissions 5 Parity Checking 5 Cyclic Redundancy Check (CRC) 5 Chapter 2 5 Describe communication protocols used and explain why they are important 5 Hyper Text Transfer Protocol (HTTP) 5 Transmission Control Protocol/Internet Protocol (TCP/IP) 6 File Transfer Protocol (FTP) 6 Open Systems Interconnection (OSI) 6 Critically compare the OSI seven layer model and the TCP/IP model 7 OSI Seven Layer Model 7 TCP/IP Four Layer Model 8 Critical Comparison 8 The Session Layer (OSI) 8 The Presentation Layer (OSI) 8 The Application Layer (OSI) 8 OSI Approach in Constructing Application Entities 9 TCP/IP Approach in Constructing Application Entities 9 Transport Layer (OSI) 9 Transport Layer (TCP/IP) 9 Comparing Transport for both Models 9 Network Vs. Internet. 9 Data Link/Physical Vs. Subnet 9 Assignment 1: The theory of data communications I have taken a job as a junior technician at NetCo, a company that makes networking hardware (switches, routers, etc.). They are planning to set up a networking academy (rather like the Cisco Network Academy) ...read more.

Middle

Because the bit was lost, the receipt machine will see that there are an odd number of bits. The machine was told to look for an even number of bits and because there is an odd number, the data is corrupt and therefore rejected. There is a fatal flaw to this system, if 2 bits are lost within transmission, then the recipient will not recognise it as an error and will accept the corrupt data. While this is very rare, it is still a flaw in the system. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the answer is discarded and the remainder becomes the result. The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn't the same at the receipt, the data is corrupt and therefore rejected. Chapter 2 Describe communication protocols used and explain why they are important Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that dictate the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent. The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries such as proxies, tunnels and gateways. ...read more.

Conclusion

It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TCP/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn't. The reason this is, is because TCP required ACK (acknowledgement) to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur. Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI's CLNP is practically identical to the Internet's IP. Both are best-effort-delivery protocols. They are virtually identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses. Data Link/Physical Vs. Subnet In OSI, the Data Link and Physical layers correspond directly to the Subnet layer of TCP/IP. Most of the time, the lower layers below the Network layer of TCP/IP are rarely discussed. During the creation of both OSI and TCP/IP, it was decided that the Network layer for TCP/IP would match the Data Link layer of OSI. ?? ?? ?? ?? Farnham College BTEC National Certificate IT P (Software Development) Unit 8: Communications Technology Josh Hancock Unit 8: Communication Technology Page 10 of 10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Data Collection: - The date that a vehicle has been rented out is recorded whenever a customer makes a rental, along with the number of days the vehicle is to be rented for. Processes: - The computer uses a formula to calculate the return date of the rental.

  2. ict as level coursework

    The user will have to ensure that the fields are correct and double check with the client on the phone. Should be able to edit information The user is able to edit customer details via customer details spread sheet. Therefore phone numbers, addresses and orders are all up to date.

  1. Threats to Data

    Regular backups should be taken and preferably stored in another area in case something like a fire not only destroyed the machines but the backups as well. A backup is a copy of the data held on some form of removable media such as an external hard drive.

  2. The Digital Divide is used to describe the progressively growing gap between those who ...

    There are varying methods of digital disadvantage for example lower internet speeds, higher priced internet connections etc. The question of is the gap widening or narrowing always is put into perspective. From a UK report the government is addressing the issue and is working towards narrowing the digital divide within the UK.

  1. The Impact of Mobile Phones on social Interaction

    I emailed the questionnaire (see appendix 8.2) to the school requesting that eight questionnaires each be randomly distributed between the six age groups between 13 - 18. Similarly, I decided to keep the size of the questionnaires very short and limited it to thirteen questions to ensure efficiency of time and to avoid students loosing concentration, getting bored and thus affecting the accuracy of the data.

  2. Unit 5 - Communications Technology

    For the bus, all stations attach, through appropriate hardware interfacing known as a tap, directly to a linear transmission medium, or bus. 2. Ring Topology Ring topology devices are attached to a loop of cable. Data flows around the ring in one direction.

  1. Discuss the Causes and Effects of the Digital Divide

    can arguably make young people seem very lazy and not as hard working as previous generations where. In conclusion people that use IT everyday are more likely to be better off and have better paid jobs but on the other hand they can become to easy minded and become use

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Flexibility- This is when an employer expects something extra from their employees; the employees must be able to work without any problems. The employee must be able to adapt to the changing environments. All employers expect their employees to become flexible as they may ask them to stay back and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work