• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Communications Protocol

Extracts from this document...

Introduction

Communications Technology Assignment 2 5 June 2003 Communications Protocol A communications protocol is similar to a data link protocol. An example is the 'token ring' topology as shown below; This is where each computer listens to the data cable before sending anything through the network. If the network is clear of any involvement from other computers, then the computer will transmit. However if another node is already transmitting data on to the network, the computer will wait until the cable becomes available. Within a 'token ring' network, individual hosts are arranged in a ring and a special data token circulates around this ring. When a host wants to transmit, it retrieves and holds the token, transmits the data and then places the token back within the ring. When back in the ring it is able to be taken by another host, which will take the same actions as before. There is a risk that two or more computers attempt to transmit at the same time, causing a 'collision'! It is seen as quite normal these occur and when this happens all of the computers involved pause for a moment and attempt to send again. The delay in which this all happens is very small and does not normally affect the speed of transmission of data over the network. Another access method that allows this type of sharing between computers is the IEEE 802.5, which is nearly identical but differs in a few aspects, so this counts as another method! ...read more.

Middle

This layer is responsible for transferring frames from one computer to another. After sending a frame, it waits for an acknowledgment from the receiving computer. � The Physical layer transmits bits from one computer to another and regulates the transmission of a stream of bits over a physical medium. This layer defines how the cable is attached to the network adapter (Coaxial etc.) and what transmission technique is used to send data over the cable. Data going to and from the network is passed layer to layer. Each layer is able to communicate with the layer immediately above it and the layer immediately below it. This way, each layer is written as an efficient, streamlined software component. When a layer receives a packet of information, it checks the destination address, and if its own address is not there, it passes the packet to the next layer. Communication Channels A communication channel refers to the various methods that a particular media can be used for. In this case it is the different methods in which the internet can be used for. The communication channel is a crucial part of the communication network. Internet Applications A complete set of application layer programs are available for use on the internet. These can be using internet technology or be internet applications directly, like a browser. However, each application program type is associated with its own application 'protocol'. The application layer is just another protocol layer in the OSI model, the programs interface with application layer protocols. ...read more.

Conclusion

These could be files or devices, like CD drives and hard disks. They are configured so that they are shared resources and that they can be accessed from any other PC that might be connected to the P2P. Instead of network information being kept on one machine, like client server networks, the information and resources are stored across the entire P2P network. This information is stored on the users own hard disk and shared to any other machine on the network. This means that each PC acts as both a client and a server. Each PC can communicate directly with each other and share each others resources. Main Differences; 1. Network access speeds in client servers are usually faster than those found on P2P. 2. Client servers can support vast numbers of PC's, as a result of the architecture. 3. P2P clients can communicate directly to each other. 4. Client server networks can be monitored through one machine, the file server. 5. In a P2P network each PC can make backups for security purposes. 6. The file server on the Client server can improve efficiency and can easily update software on one machine instead of 'x' amount of PC's. 7. If a client PC wants to communicate directly with another client PC, it will have to be routed through the file server, which is not as efficient as a direct connection. 8. In P2P, no network administrator is needed. 9. P2P networks are fast and not expensive to build or maintain. 10. P2P can be used at both home and for businesses. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    These will be separated into quantitative and qualitative objectives. Quantitative Objectives * System will hold details of customers; * A new customer can be entered into the system in less than 2 minutes; * Customer records can be located in less than 10 seconds; * System will automatically identify customers

  2. ict as level coursework

    Backup Once you have finished using the system then it is good to save any modifications or updates made this enables you to keep track of only relevant records in the future. It is beneficial to have the system backed up every evening.

  1. Using ICT to communicate

    The house style in this letter should remain the same throughout the documents. The pages could be filled properly making the pages appear more full and professional. The pages should not be too full that they look crowded as this makes the page appear less professional and looks odd.

  2. Computer Architecture

    A tri-state buffer allows multiple outputs to connect to a wire, but only one of them to actually drive a 1 or a 0 onto the line. Program Counter - The program counter holds the memory address of the current location in the program.

  1. BTEC Unit 8: The Theory of Data Communications

    DTE varies widely depending on its purpose, for example, with Bluetooth, size and range are an important factor and with mobile phones, the quality and bandwidth are more important. Network cards and modems exist in a range of formats that are designed for a wide range of speeds depending on the type of network being used.

  2. Unit 5 - Communications Technology

    Topologies There are 4 basic types of LAN topologies, where layout of the devices and interconnections can be classified between them. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.

  1. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    Is the information presented clearly, so that it can be easily understood? The information is hand-written which can sometimes be difficult to understand if clients are unfamiliar with the handwriting. 16. What does the system cost to operate? The system is financially free apart from the costs of paper

  2. Database Coursework on a Rental System: Design

    Yes Date of Membership Date/Time n/a <=Date() Yes Default Value "=Date() Date of Last Rental Date/Time n/a <=Date() Yes The customer table's purpose is to store details on all of the shop's customers. This enables customer details to be viewed when required; for instance, in the event that a customer with an overdue item needs to be

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work