• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data communications and neetworks

Extracts from this document...


Data Communications & Networks Assignment 1 Signal Generation & Encoding Contents Page Task 1 a Page 3 b Page 4 c Page 4 d Page 5 Task 2 a Page 6 b Page 7 What is signalling? Signalling is a term used for the use of data being transmitted or carried across a medium for example in a network this could be a cat 5 cable. There has to be a way also for the receiver to interpret the data being sent and this is controlled by what's called "encoding" however the word "modulation" also means the same thing. The signal that is sent it modified in a way for it to signify data. There are different types of transmission methods which differ from what type of medium you are using for example cables or wireless - there are four which are listed below: 1. Electrical - uses your cables to transport data between nodes 2. Radio Waves - this would be your wireless networks and could also include Bluetooth devices. 3. Light - this would use fibre optic cabling to send high speeds of data 4. Microwave Analogue & Digital Signalling There are two different types of signalling and these can be done in Analogue which means it changes all time in both amplitude and frequency. ...read more.


http://moodle.derby-college.ac.uk/mod/resource/view.php?id=2346 Digital With digital signalling there are no in betweens like there in analogue its simply either 1 or 0, digital represents separate states and the change between these are practically unnoticeable. http://moodle.derby-college.ac.uk/mod/resource/view.php?id=2346 Asynchronous Transmission Asynchronous transmission is when signals are not sent at regular intervals. A good example of this would be a user using a keyboard attached to a computer. The characters are sent irregularly however the bits must be sent at known intervals. This is done by having accurate clocks at both ends of the link. The receiving clock starts when it receives the first bit from the transmitter, this is also known as the start bit. The receiver then expects to receive a known number of bits every tick of the clock. When it has received these bits the clock may stop; the last bit is known as the stop bit. Synchronous Transmission However when large volumes of data are to be transferred, the waste of the stop and stop bits with every character means that asynchronous transmission is not an efficient method. With high-speed devices, and buffered low-speed devices, data can be transmitted in large, timed, synchronous blocks. The clocks, in the receiver and transmitter, are kept synchronised by sending regular groups of special characters called SYN characters. ...read more.


This is a process that the data needs to have done to it before the computer can understand it and process it. There are different types of encoding which are * Manchester Encoding is a data communications line code which provides a way of encoding binary data sequences. Each bit is related to by at least one voltage level transition. Manchester encoding is said to be self clocking this means that synchronisation of a data stream is possible. * Huffman Encoding is another algorithm used for data compression; the coding uses a specific method for choosing the representation for each symbol. * Unipolar Encoding This type of encoding has 2 voltage states, one of these states is zero and because of this its also know as Return to Zero (RTZ) Unipolar encoding is used in computers & logic and an example of where its used in computers is the TTL logic. * Polar Encoding Polar encoding is when the digital encoding is on a level with zero volts for example the RS232 standard interface uses Polar encoding and unlike Unipolar the value doesn't return to zero, its either a positive or negative voltage. With polar encoding it reduces most of the residual DC problem. ?? ?? ?? ?? Adam Smith Signal Generation & Encoding Unit 25 Assignment 1 ND2G - 1 - 508794 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Graphs/Charts Spreadsheet can convert all the information which has been gathered and processed within its files into either a chart or a graph. Each one has specialist uses for different types of information and each one stores the information in different ways and views There is a graph or chart

  2. ICT Sample Work India Red

    The reason for the network being secure is that the network is backed up on a daily basis, onto a removable hard disk. The hard drive is than taken off the premises and stored at Tom's house. This is done just in case of natural disasters happening and they lose the data, than there is at least back-up of it.

  1. Asynchronous and Synchronous

    This is very in efficient. Its packet structure is known as a packet frame. Asynchronous Transmission Start bit Stop bit Parity bit The synchronous transmission form occurs when bits are sent in the packet form. This form of data sending is normally sent through bigger Networks.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    This is the form that displays the availability of the apartment. This form also allows the user to access the other administrative features of the program through the main menu and all other units involved in the program. FormCustomers Ucustomers This unit allows the adding of new customers and modification and deletion of existing customers.


    The wholesalers' ability to dispatch the goods efficiently and as per the requirements of the organization is also enhanced by the implementation of Electronic data Interchange. e) Up to Date Product Knowledge Because of the order acknowledge the number of enquiries to the concerned departments goes down and all the internal functions have the latest information.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    less complex algorithms that are used in the WTLS protocol due to the low power environment that is used in wireless devices to extend lifetime. These problems will be addressed and a solution will be addressed that can decrease the likelihood of problems associated with this translation, along with algorithmic study of the WTLS.

  1. Definition-nature of the problem solved - Car Mechanic business

    will appear broken down into various segments so it is clear to them how a total was reached. In order to produce receipts quickly the system will also include a mail merge system linking the database to a word processor.

  2. data representation

    With ASCII, every character in a character set uses 8 bits (1 byte) so this sentence would use 104 bytes. Check it out. A common standard is the ASCII code (American Standard Code for Information Interchange) which was initially designed for communications purposes and upon which many other character sets are based.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work