Concept of data transmission, Computer Networking

Assignment Help:

Overview of Data transmission network model

A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that we expect from a network.

 When sending data from software to actual physical transmission link (medium), there are several layers. Each layer provides certain services. The Open System Interconnection (OSI) layer model is the international standard, and it has 7 layers.

914_Concept of data transmission.png

Fig. General digital control system

When the digital data is transmitted through real line, these digital data should be converted to either a digital signal or an analog signal. In this project, we will convert a data to a digital signal. There are several conversion methods, and we use one of the simple methods as below.

1918_Concept of data transmission1.png

Fig. Example of signal conversion from digital data

 The waveform pattern of 1V or -1V used to represent the 1s and 0s of a digital data on a transmission channel. Suppose the transmission link is not ideal, some noises can be added to original signal. If the amplitude of the noise follows the normal distribution, the noise is called Gaussian noise.

 

 

375_Concept of data transmission2.png

Fig. 3. Data transmission on noise channel

 The function that generates 'Gaussian noise' will be given, and the argument of the function is SNR (Signal-to-noise ratio) dB(decibel). SNR is defined as the ratio of signal power to the noise power, and SNRdB is defined as 10*Log(SNR). Large SNR means that signal power is relatively higher than noise power, so noise is less effective. If noise is less effective, received data has less error.

Even though sending the data on the channel whose SNR is identical, reliable communication is possible when using error-detecting code or error-correcting code.

 


Related Discussions:- Concept of data transmission

Unix for multiprocessor system, UNIX For Multiprocessor System:- The UN...

UNIX For Multiprocessor System:- The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let

Acknowledgment number - transport layer, Acknowledgment number This 32...

Acknowledgment number This 32 bit  field  defines  the byte  number that the  from the  segment is expecting to  receive the segment is expecting to receive from the other par

Identify the purpose of the dlci, DLCI stands for Data Link Connection Iden...

DLCI stands for Data Link Connection Identifier. It identifies the local PVC.

What are the features of star and ring topology, What are the features of s...

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

Describe mail access protocols, Q. Describe Mail Access Protocols? Mai...

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited

Evolution of data communication, Question 1 Discuss the following         ...

Question 1 Discuss the following                     Evolution of Data Communication                     Elements of Data Communication System Question 2 Explain the following

What is primary and secondary ring - fddi, What is primary and secondary ri...

What is primary and secondary ring One of the two FDDI rings is known as the primary ring; the other is called the secondary ring. The primary ring is utilized for data tra

Html, Write an HTML program segment that contains hypertext links from one ...

Write an HTML program segment that contains hypertext links from one document to another.

What is the mac address, The address for a device as it is recognized at th...

The address for a device as it is recognized at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card a

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd