Communications programs , Basic Computer Science

Assignment Help:

Communications Programs : By communications programs, we mean those programs which allow a computer to communicate via a transmission cable to another electronic device. Here we do not include multi-user system or small networks. We are mainly interested in communications for rapid data input and retrieval, and so we consider the telephone network as the transmission medium. Computer communications are most easily explained in Figure.

1567_micro telephn.png

Figure: Computer Communications

This allows one personal computer 'talking' to another. PC A reads a data file, say, from its floppy disk and sends it to a modem (Modulator - Demodulator). Here, PC A's electronic signal (the data file) is converted into a signal that can be transmitted over a telephone line. B can only read PC A's signal by receiving the signal via its own modem which translates the signal back into a computer signal. In fact, this example is typical for most computer communications over telephone lines:

(I) Between mainframe computers, or

(2) Between PCs and mainframes.

This situation is illustrated in Figure and is the basis on which PC users can communicate with the outside world.

1279_modem.png

Figure: PC Mainframe Communicates

There are two main uses of PC to mainframe communications which may assist you in the management of your work. The first is accessing national databases and the second is electronic mail.

There are many databases for which you can become a subscriber and which your computer can access more or less at the touch of a button to obtain specialist information.


Related Discussions:- Communications programs

Explain erlang family of distributions of service times, Question 1 Explai...

Question 1 Explain the structure of Mathematical Model in your own words Question 2 Describe Erlang family of distributions of service times Question 3 Describe the algo

Explain web cache, To satisfy client needs through proxy server and not thr...

To satisfy client needs through proxy server and not through main server, as some other user have already accessed that file and its copied to the proxy server, so next time a user

Theory of computation, If L is a regular language show that L U {a} is regu...

If L is a regular language show that L U {a} is regular

Create a queue, QUESTION (a) Give the representation of a queue as an a...

QUESTION (a) Give the representation of a queue as an abstract data type. (b) What is a priority queue? Give two types of priority queues. (c) The following program does

Software development, requirement analysis and specification for online vot...

requirement analysis and specification for online voting

Computer science, Explain Canonical cover and Extraneous Attributes with ex...

Explain Canonical cover and Extraneous Attributes with examples.

C, Byteland county is very famous for luminous jewels. Luminous jewels are ...

Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec

Prelude to programming concepts and design 5th edition, Input a list of pos...

Input a list of positive numbers, terminated by 0, into an array numbers []. Then display the array and the largest and smallest number in it.

Opening documents situated on different computers - network, Opening Docume...

Opening Documents Situated on Different Computers In order to work with documents situated on other computers, you need sufficient rights to access the folder in which it is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd