• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10

BTEC Unit 8: The Theory of Data Communications

Extracts from this document...

Introduction

The Theory Of Data Communications By Josh Hancock This book explains the basics of communication devices and forms of communication used within networking and the internet. Farnham College 14/10/2008 Assignment 1: The theory of data communications 2 Chapter 1 2 Chapter 1a 2 Identify and explain types of communication devices 2 Data Terminal Equipment (DTE) 2 Data Circuit-terminating Equipment (DCE) 2 Wireless Devices 2 Explain the principles of signal theory 3 Data 3 Denary to Binary 3 Data Packets 4 Asynchronous and Synchronous Transmissions 4 Bandwidth (Analogue) 4 Bandwidth (Digital) 4 Chapter 1b 5 Explain techniques that can be used to reduce errors in transmissions 5 Parity Checking 5 Cyclic Redundancy Check (CRC) 5 Chapter 2 5 Describe communication protocols used and explain why they are important 5 Hyper Text Transfer Protocol (HTTP) 5 Transmission Control Protocol/Internet Protocol (TCP/IP) 6 File Transfer Protocol (FTP) 6 Open Systems Interconnection (OSI) 6 Critically compare the OSI seven layer model and the TCP/IP model 7 OSI Seven Layer Model 7 TCP/IP Four Layer Model 8 Critical Comparison 8 The Session Layer (OSI) 8 The Presentation Layer (OSI) 8 The Application Layer (OSI) 8 OSI Approach in Constructing Application Entities 9 TCP/IP Approach in Constructing Application Entities 9 Transport Layer (OSI) 9 Transport Layer (TCP/IP) 9 Comparing Transport for both Models 9 Network Vs. Internet. 9 Data Link/Physical Vs. Subnet 9 Assignment 1: The theory of data communications I have taken a job as a junior technician at NetCo, a company that makes networking hardware (switches, routers, etc.). They are planning to set up a networking academy (rather like the Cisco Network Academy) ...read more.

Middle

Because the bit was lost, the receipt machine will see that there are an odd number of bits. The machine was told to look for an even number of bits and because there is an odd number, the data is corrupt and therefore rejected. There is a fatal flaw to this system, if 2 bits are lost within transmission, then the recipient will not recognise it as an error and will accept the corrupt data. While this is very rare, it is still a flaw in the system. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the answer is discarded and the remainder becomes the result. The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn't the same at the receipt, the data is corrupt and therefore rejected. Chapter 2 Describe communication protocols used and explain why they are important Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that dictate the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent. The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries such as proxies, tunnels and gateways. ...read more.

Conclusion

It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TCP/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn't. The reason this is, is because TCP required ACK (acknowledgement) to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur. Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI's CLNP is practically identical to the Internet's IP. Both are best-effort-delivery protocols. They are virtually identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses. Data Link/Physical Vs. Subnet In OSI, the Data Link and Physical layers correspond directly to the Subnet layer of TCP/IP. Most of the time, the lower layers below the Network layer of TCP/IP are rarely discussed. During the creation of both OSI and TCP/IP, it was decided that the Network layer for TCP/IP would match the Data Link layer of OSI. ?? ?? ?? ?? Farnham College BTEC National Certificate IT P (Software Development) Unit 8: Communications Technology Josh Hancock Unit 8: Communication Technology Page 10 of 10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Onscreen form for storing vehicle details Inputs: - All of the vehicle details. Vehicle ID, Model, Manufacturers Code, Registration Number, Current Mileage, Daily Rental Price, Class, Colour, Availability. Data Collection: - The vehicle details will be collected from the vehicles manufacturer when a new vehicle is ordered.

  2. ict as level coursework

    Invoices need to be produced quickly The beauty of this system is that all information that is being entered on the 'buy products' user form are automatically transferred on the invoice so information does not have to be entered twice which saves time.

  1. Threats to Data

    Many things can happen to data from accidentally deleting it to a hacker signing on to your machine and deliberately deleting or changing something. Add to this the possibility of machine failure or fire then there must be a way of reloading data if the worst happens.

  2. Signal Theory - Communications Technology. Analogue signals are converted to digital using sampling, ...

    Asynchronous are two different transmission methods; both of these methods have two clock signals to lock on to the packet when it's sent and when it is received. Asynchronous is used with low bitrates. Figure 4 - Asynchronous Packet With the Asynchronous packet you have one start bit, eight data bits, one parity bit and one stop bit.

  1. Information: G061 - Systems and Communication

    graphic is high - individual elements of the image can be edited - when resized, image quality is reduced - each pixel has to be saved individually, so the file size can be very large - components are only stored as pixels - more consistent with computing environment - bitmap

  2. Communications Technology - Assignment 1

    0 0 1 1 0 0 7 = 0 0 0 0 0 1 1 1 0 8 = 0 0 0 0 1 0 0 0 0 9 = 0 0 0 0 1 0 0 1 0 10 = 0 0 0 0 1 0 1 0 0

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    and how they represent their work, they must portray a professional and a positive image towards the workplace. From this they can inspire others to do well and make others confident so that they can do what is expected from them.

  2. Discuss the Causes and Effects of the Digital Divide

    can arguably make young people seem very lazy and not as hard working as previous generations where. In conclusion people that use IT everyday are more likely to be better off and have better paid jobs but on the other hand they can become to easy minded and become use

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work