• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10

BTEC Unit 8: The Theory of Data Communications

Extracts from this document...

Introduction

The Theory Of Data Communications By Josh Hancock This book explains the basics of communication devices and forms of communication used within networking and the internet. Farnham College 14/10/2008 Assignment 1: The theory of data communications 2 Chapter 1 2 Chapter 1a 2 Identify and explain types of communication devices 2 Data Terminal Equipment (DTE) 2 Data Circuit-terminating Equipment (DCE) 2 Wireless Devices 2 Explain the principles of signal theory 3 Data 3 Denary to Binary 3 Data Packets 4 Asynchronous and Synchronous Transmissions 4 Bandwidth (Analogue) 4 Bandwidth (Digital) 4 Chapter 1b 5 Explain techniques that can be used to reduce errors in transmissions 5 Parity Checking 5 Cyclic Redundancy Check (CRC) 5 Chapter 2 5 Describe communication protocols used and explain why they are important 5 Hyper Text Transfer Protocol (HTTP) 5 Transmission Control Protocol/Internet Protocol (TCP/IP) 6 File Transfer Protocol (FTP) 6 Open Systems Interconnection (OSI) 6 Critically compare the OSI seven layer model and the TCP/IP model 7 OSI Seven Layer Model 7 TCP/IP Four Layer Model 8 Critical Comparison 8 The Session Layer (OSI) 8 The Presentation Layer (OSI) 8 The Application Layer (OSI) 8 OSI Approach in Constructing Application Entities 9 TCP/IP Approach in Constructing Application Entities 9 Transport Layer (OSI) 9 Transport Layer (TCP/IP) 9 Comparing Transport for both Models 9 Network Vs. Internet. 9 Data Link/Physical Vs. Subnet 9 Assignment 1: The theory of data communications I have taken a job as a junior technician at NetCo, a company that makes networking hardware (switches, routers, etc.). They are planning to set up a networking academy (rather like the Cisco Network Academy) ...read more.

Middle

Because the bit was lost, the receipt machine will see that there are an odd number of bits. The machine was told to look for an even number of bits and because there is an odd number, the data is corrupt and therefore rejected. There is a fatal flaw to this system, if 2 bits are lost within transmission, then the recipient will not recognise it as an error and will accept the corrupt data. While this is very rare, it is still a flaw in the system. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the answer is discarded and the remainder becomes the result. The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn't the same at the receipt, the data is corrupt and therefore rejected. Chapter 2 Describe communication protocols used and explain why they are important Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that dictate the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent. The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries such as proxies, tunnels and gateways. ...read more.

Conclusion

It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TCP/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn't. The reason this is, is because TCP required ACK (acknowledgement) to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur. Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI's CLNP is practically identical to the Internet's IP. Both are best-effort-delivery protocols. They are virtually identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses. Data Link/Physical Vs. Subnet In OSI, the Data Link and Physical layers correspond directly to the Subnet layer of TCP/IP. Most of the time, the lower layers below the Network layer of TCP/IP are rarely discussed. During the creation of both OSI and TCP/IP, it was decided that the Network layer for TCP/IP would match the Data Link layer of OSI. ?? ?? ?? ?? Farnham College BTEC National Certificate IT P (Software Development) Unit 8: Communications Technology Josh Hancock Unit 8: Communication Technology Page 10 of 10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Signal Theory - Communications Technology. Analogue signals are converted to digital using sampling, ...

    Asynchronous are two different transmission methods; both of these methods have two clock signals to lock on to the packet when it's sent and when it is received. Asynchronous is used with low bitrates. Figure 4 - Asynchronous Packet With the Asynchronous packet you have one start bit, eight data bits, one parity bit and one stop bit.

  2. Information: G061 - Systems and Communication

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data 8. Personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory

  1. Threats to Data

    Threats from Inside an Organisation Information is valuable and information you have given to a transactional web-site can be of value to a third party for various reasons. For instance other companies could want your address so they could send you junk mail, they may want your telephone number so

  2. Communications Technology - Assignment 1

    As you can see, if you add up the numbers in each of the rows they equal the same number that they are representing on the left. This is how a computer converts between denary and binary. Each of these binary digits (bits)

  1. Theory of data communication

    which explains the techniques that can be used to reduce data transmission errors. TASK 2 AND GRADING CRITERIA COVERED Task 2 P3 Describe communication protocols used and explain why they are important D1 Critically compare the OSI seven layer model and the TCP/IP model Write section 3 (entitled 'Communication protocols'),

  2. Health Book

    These factors are rapidly growing in importance as day-to-day life continues. (Department of Defence-Intelligence and Security 2010) Advantages of Healthbook Healthcare Information and Management Systems Society defines E-Health as, "the application of internet and other related technologies in the healthcare industry to improve the access, efficiency, effectiveness, and quality of

  1. Discuss the Causes and Effects of the Digital Divide

    into what counties are keeping up with technology like having computers because if these countries are able to bridge the gap in technology and train people then many of these people will be employed and contribute into the countries GDP.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Giving and Accepting Criticism- if you have done something wrong then saying ?sorry? in a professional and in a genuine way. If someone has views against you then you should accept it and collaborate on the work instead of arguing with them back.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work