• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10

BTEC Unit 8: The Theory of Data Communications

Extracts from this document...

Introduction

The Theory Of Data Communications By Josh Hancock This book explains the basics of communication devices and forms of communication used within networking and the internet. Farnham College 14/10/2008 Assignment 1: The theory of data communications 2 Chapter 1 2 Chapter 1a 2 Identify and explain types of communication devices 2 Data Terminal Equipment (DTE) 2 Data Circuit-terminating Equipment (DCE) 2 Wireless Devices 2 Explain the principles of signal theory 3 Data 3 Denary to Binary 3 Data Packets 4 Asynchronous and Synchronous Transmissions 4 Bandwidth (Analogue) 4 Bandwidth (Digital) 4 Chapter 1b 5 Explain techniques that can be used to reduce errors in transmissions 5 Parity Checking 5 Cyclic Redundancy Check (CRC) 5 Chapter 2 5 Describe communication protocols used and explain why they are important 5 Hyper Text Transfer Protocol (HTTP) 5 Transmission Control Protocol/Internet Protocol (TCP/IP) 6 File Transfer Protocol (FTP) 6 Open Systems Interconnection (OSI) 6 Critically compare the OSI seven layer model and the TCP/IP model 7 OSI Seven Layer Model 7 TCP/IP Four Layer Model 8 Critical Comparison 8 The Session Layer (OSI) 8 The Presentation Layer (OSI) 8 The Application Layer (OSI) 8 OSI Approach in Constructing Application Entities 9 TCP/IP Approach in Constructing Application Entities 9 Transport Layer (OSI) 9 Transport Layer (TCP/IP) 9 Comparing Transport for both Models 9 Network Vs. Internet. 9 Data Link/Physical Vs. Subnet 9 Assignment 1: The theory of data communications I have taken a job as a junior technician at NetCo, a company that makes networking hardware (switches, routers, etc.). They are planning to set up a networking academy (rather like the Cisco Network Academy) ...read more.

Middle

Because the bit was lost, the receipt machine will see that there are an odd number of bits. The machine was told to look for an even number of bits and because there is an odd number, the data is corrupt and therefore rejected. There is a fatal flaw to this system, if 2 bits are lost within transmission, then the recipient will not recognise it as an error and will accept the corrupt data. While this is very rare, it is still a flaw in the system. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the answer is discarded and the remainder becomes the result. The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn't the same at the receipt, the data is corrupt and therefore rejected. Chapter 2 Describe communication protocols used and explain why they are important Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that dictate the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent. The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries such as proxies, tunnels and gateways. ...read more.

Conclusion

It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TCP/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn't. The reason this is, is because TCP required ACK (acknowledgement) to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur. Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI's CLNP is practically identical to the Internet's IP. Both are best-effort-delivery protocols. They are virtually identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses. Data Link/Physical Vs. Subnet In OSI, the Data Link and Physical layers correspond directly to the Subnet layer of TCP/IP. Most of the time, the lower layers below the Network layer of TCP/IP are rarely discussed. During the creation of both OSI and TCP/IP, it was decided that the Network layer for TCP/IP would match the Data Link layer of OSI. ?? ?? ?? ?? Farnham College BTEC National Certificate IT P (Software Development) Unit 8: Communications Technology Josh Hancock Unit 8: Communication Technology Page 10 of 10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Data Collection: - The date that a vehicle has been rented out is recorded whenever a customer makes a rental, along with the number of days the vehicle is to be rented for. Processes: - The computer uses a formula to calculate the return date of the rental.

  2. The Impact of Mobile Phones on social Interaction

    Helen Gilchrist (9) argues that just because friends are physically together at the same place, does not mean they will necessarily talk to each other due to the interruption caused by the ringing mobile phone. Timo Kopomaa (6), lecturer at Helsinki University describes this problem caused by mobile phones as creating a "culture of interruption".

  1. Threats to Data

    Regular backups should be taken and preferably stored in another area in case something like a fire not only destroyed the machines but the backups as well. A backup is a copy of the data held on some form of removable media such as an external hard drive.

  2. The Digital Divide is used to describe the progressively growing gap between those who ...

    Drawbacks of narrowing the divide could be: The Internet isn't always used effectively; is a playing game online really going to help feed those hungry in Africa? Censorships and online monitoring allow governments to control the content available to their citizens and there is a lot of cost, as computers require a continued investment in resources maintenance and education.

  1. Unit 5 - Communications Technology

    For the bus, all stations attach, through appropriate hardware interfacing known as a tap, directly to a linear transmission medium, or bus. 2. Ring Topology Ring topology devices are attached to a loop of cable. Data flows around the ring in one direction.

  2. Communications Protocol

    File Sharing 2. Application Sharing 3. Peripheral Sharing - Shared Printers 4. Client/Server Applications; * Email * Internet 5. Multimedia Applications - Network games! As with all other communications protocol, TCP/IP is composed of layers: TCP - This is used for verifying the correct delivery of data from client to server.

  1. Discuss the Causes and Effects of the Digital Divide

    can arguably make young people seem very lazy and not as hard working as previous generations where. In conclusion people that use IT everyday are more likely to be better off and have better paid jobs but on the other hand they can become to easy minded and become use

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Another example would be if a computer program doesn?t work. Responding to it calmly and trying to solve it on your own would include problem solving. This will include independent work to help solve the problem. Analysing and investigating-This will require a lot of thinking and will help you to exactly find out what your problem may be.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work