Data transmission, Basic Computer Science

Data transmission:

Most digital communication data is transmitted in a serial form, that is, only one bit at a time. Transmission of data in serial form means each bit is transmitted for only a very short time period. In most systems, the data transmitted requires less than a milli-second. After one bit is sent, the next bit follows; this process is repeated until all the desired bits have been transmitted. This type of system is often referred to as "Time Sharing", because each transmitted signal shares the wires for a short time interval.

Parallel data transmission is a continuous-type of transmission requiring two wires (or one wire and ground) for each bit to be sent. Parallel transmission is so called because each circuit is wired in parallel with respect to the next circuit.

With serial data, one pair of transmitting wires can be used to send enormous amounts of serial data. If the data were sent using the parallel method, then hundreds of wires would be required. Most computer systems use the parallel method to transmit data within them, however if the data must be sent to another system, serial data transmission is used.

An interpretation circuit is required to convert all parallel data to serial-type data prior to transmission. The device for sending serial data is called a "Multiplexer (MUX), and the device for receiving serial data is called a "Demultiplexer" (DEMUX). Figure shows a data transfer system.

21_data transmission.png

Posted Date: 9/13/2012 7:45:00 AM | Location : United States







Related Discussions:- Data transmission, Assignment Help, Ask Question on Data transmission, Get Answer, Expert's Help, Data transmission Discussions

Write discussion on Data transmission
Your posts are moderated
Related Questions
Network Control, Engineering and Management Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In

Problem 1. Explain with diagram the internal components of ALU. Diagram Explaining Internal components 2. What is addressing mode? Explain any five addressing mo

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Previously two sections the fundamentals of the workings and architecture of the central processing unit has been explained. There has been a common look at easy processor architec

To find the minimum number of shelves in the loading process in cars


Image Processing: This technology is quite advanced and devices are now available for routine scanning and storage of printed pages, graphics, etc., which can then be retrieve

Briefly explain all the networking components and devices that are needed to set up a computer network. This is just a brief explanation of devices needed and their reason for usin


QUESTION (a) Given the graph as shown in figure, apply Lagrangian technique to complete the table assuming μ=1 and T=14                        Path P