Data communications, Basic Computer Science

 

Data communication as a need developed in the 1960s with the interconnection of peripheral devices to mainframe computers. Within the immediate vicinity of the mainframe computer the interconnection would be via a high-speed interconnection network, or Local Area Network. Communication to remote terminals was originally by text.

The communication between computers introduced a new discipline of communication protocols. A human being at one end of the connection can apply reasoning to correct most errors; however a computer is unable to apply reasoning. The protocols have to be capable of precise and unambiguous interpretation by a computer.

To separate the design of protocols they are separated into layers and formed into a layered architecture. The Open Systems Interconnection (OSI) is the model for a layered architecture, although most protocol architectures adhere to the principles of OSI rather then the strict definition of the layers.

 

Posted Date: 7/8/2012 11:27:58 AM | Location : United States







Related Discussions:- Data communications, Assignment Help, Ask Question on Data communications, Get Answer, Expert's Help, Data communications Discussions

Write discussion on Data communications
Your posts are moderated
Related Questions
Question 1 What do you mean by semantic networks? Explain inheritance in semantic networks Question 2 Explain Partitioned semantic networks with an example Question

Given an operating system that supports a one – to –one relationship between user-level threads and kernel – level threads and allows one or more threads from a process to issue b

What is CAI? Explain its pitfalls

Problem Write the steps to use the Network setup wizard. Elaborate the optional subcomponents in the windows component wizard. 1. Click Next to skip past the Welcome screen.

QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati

#questionConsider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event

There is a path between two vertices if there is a series of edges that you can use to travel between them. For example, between vertices 1 and 3 above, there is a path made up of

what can you do and what and how who can becbgbfbvuidfgvbkjfdhvb98dshrnfjkbhqdbnfiubnfdjbhdfiubndfubhfdbhfdiubhdfuibhyfdubhdfbhfbhdf8u

A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networ

A Python identifier is a name used for classify a function, variable, class, module or any other object. An identifier begins with a letter A to Z or a to z or an underscore (_) fo