• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10

BTEC Unit 8: The Theory of Data Communications

Extracts from this document...

Introduction

The Theory Of Data Communications By Josh Hancock This book explains the basics of communication devices and forms of communication used within networking and the internet. Farnham College 14/10/2008 Assignment 1: The theory of data communications 2 Chapter 1 2 Chapter 1a 2 Identify and explain types of communication devices 2 Data Terminal Equipment (DTE) 2 Data Circuit-terminating Equipment (DCE) 2 Wireless Devices 2 Explain the principles of signal theory 3 Data 3 Denary to Binary 3 Data Packets 4 Asynchronous and Synchronous Transmissions 4 Bandwidth (Analogue) 4 Bandwidth (Digital) 4 Chapter 1b 5 Explain techniques that can be used to reduce errors in transmissions 5 Parity Checking 5 Cyclic Redundancy Check (CRC) 5 Chapter 2 5 Describe communication protocols used and explain why they are important 5 Hyper Text Transfer Protocol (HTTP) 5 Transmission Control Protocol/Internet Protocol (TCP/IP) 6 File Transfer Protocol (FTP) 6 Open Systems Interconnection (OSI) 6 Critically compare the OSI seven layer model and the TCP/IP model 7 OSI Seven Layer Model 7 TCP/IP Four Layer Model 8 Critical Comparison 8 The Session Layer (OSI) 8 The Presentation Layer (OSI) 8 The Application Layer (OSI) 8 OSI Approach in Constructing Application Entities 9 TCP/IP Approach in Constructing Application Entities 9 Transport Layer (OSI) 9 Transport Layer (TCP/IP) 9 Comparing Transport for both Models 9 Network Vs. Internet. 9 Data Link/Physical Vs. Subnet 9 Assignment 1: The theory of data communications I have taken a job as a junior technician at NetCo, a company that makes networking hardware (switches, routers, etc.). They are planning to set up a networking academy (rather like the Cisco Network Academy) ...read more.

Middle

Because the bit was lost, the receipt machine will see that there are an odd number of bits. The machine was told to look for an even number of bits and because there is an odd number, the data is corrupt and therefore rejected. There is a fatal flaw to this system, if 2 bits are lost within transmission, then the recipient will not recognise it as an error and will accept the corrupt data. While this is very rare, it is still a flaw in the system. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the answer is discarded and the remainder becomes the result. The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn't the same at the receipt, the data is corrupt and therefore rejected. Chapter 2 Describe communication protocols used and explain why they are important Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that dictate the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent. The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries such as proxies, tunnels and gateways. ...read more.

Conclusion

It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TCP/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn't. The reason this is, is because TCP required ACK (acknowledgement) to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur. Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI's CLNP is practically identical to the Internet's IP. Both are best-effort-delivery protocols. They are virtually identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses. Data Link/Physical Vs. Subnet In OSI, the Data Link and Physical layers correspond directly to the Subnet layer of TCP/IP. Most of the time, the lower layers below the Network layer of TCP/IP are rarely discussed. During the creation of both OSI and TCP/IP, it was decided that the Network layer for TCP/IP would match the Data Link layer of OSI. ?? ?? ?? ?? Farnham College BTEC National Certificate IT P (Software Development) Unit 8: Communications Technology Josh Hancock Unit 8: Communication Technology Page 10 of 10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Signal Theory - Communications Technology. Analogue signals are converted to digital using sampling, ...

    Asynchronous are two different transmission methods; both of these methods have two clock signals to lock on to the packet when it's sent and when it is received. Asynchronous is used with low bitrates. Figure 4 - Asynchronous Packet With the Asynchronous packet you have one start bit, eight data bits, one parity bit and one stop bit.

  2. Information: G061 - Systems and Communication

    Personal data shall be accurate and, where necessary, kept up to date 5. Personal data processed for any purposes shall not be kept for longer than is necessary for those purposes 6. Personal data shall be processed in accordance with the rights of data subjects under this Act 7.

  1. Threats to Data

    Threats from Inside an Organisation Information is valuable and information you have given to a transactional web-site can be of value to a third party for various reasons. For instance other companies could want your address so they could send you junk mail, they may want your telephone number so

  2. Communications Technology - Assignment 1

    Each of these binary digits (bits) makes one byte because there are 8 bits in a byte (the 0 column does not count as one). Before being transmitted, bit sequences are also given a source and destination IP address so they know where they are going and who has sent them.

  1. Theory of data communication

    which explains the techniques that can be used to reduce data transmission errors. TASK 2 AND GRADING CRITERIA COVERED Task 2 P3 Describe communication protocols used and explain why they are important D1 Critically compare the OSI seven layer model and the TCP/IP model Write section 3 (entitled 'Communication protocols'),

  2. Health Book

    The speed at which practitioners would be able find the records would increase greatly, as all records would be streamlined and patient's records could be found by simply entering of the patient's identification number into the Graphical User Interface (GUI)

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Allowing matters in the public and open so that they can be dealt with instead of keeping the problem inside and letting it build up over time. Persuading and negotiating- This is when you back up your work or point of view with evidence and facts this could also include

  2. Discuss the Causes and Effects of the Digital Divide

    stuck their with low income and cannot afford basic things to advance into a more better lifestyle. ?Willy Brandt, born Herbert Ernst Karl Frahm (18 December 1913 - 8 October 1992), was a German politician, Chancellor of West Germany 1969?1974, and leader of the Social Democratic Party of Germany.? Brandt made a review international development issues.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work