Communications technology, Computer Engineering

Assignment Help:

COMMUNICATIONS TECHNOLOGY:

The development of communications technology is, in a sense, a symbol of man's effort to communicate rapidly over great distances. Communications technology is older than computer technology. It has grown as rapidly as the computer technology in recent times. These two technologies are now fusing into what Anthony Oettinger has called 'compunications'. This newly emergent technology is changing our life styles as few technologies have before. This new technology has probable and important uses in the home, office, factory, community and in information exchange system and holds prospects of immediate relevance to information profession. Some of the significant aspects of information transmission technology are discussed briefly in the following paragraphs. 

A communication system can establish paths over which messages can be sent between any two instruments in specified locations at desired times. This type of system is generally known as switched .network.' Communications technology has advanced to the extent that now it is possible to hire services from a commercially operated network. Hence, there is a steady growth of computer-to-computer data traffic. Also, computer manufactures are offering network architectures which together offer multiple operating systems running on families of similar computers. A terminal of a computer network may have access to any of the computers within the network, if it is authorised to do so. A computer serves as a terminal when connected for providing computation, information retrieval, etc., in accordance with the request of the terminal. A multi-lateral access capability allows the users of the terminal to share these resources. Such networks are characterised by a new technique known as packet switching in which the message is divided into a number of message blocks called packets and are transmitted between nodes in store and forward basis. Among the information resources to be shared are the data bases. A number of information systems have come into operation based on this concept.  


Related Discussions:- Communications technology

Difference between shadow and override in programming, Overriding tell us o...

Overriding tell us only the methods, but shadowing tells us the entire element.

Describe architecture of wap gateway, Describe architecture of WAP gateway....

Describe architecture of WAP gateway. WAP GATEWAY : It is a very unique product giving semi-automatic redirection of HTML documents to WAP compatible mobile phones. Wir

What is selective complement - logic micro operations, SELECTIVE COMPLEMEN...

SELECTIVE COMPLEMENT The selective-complement process complements bits in register A where there are corresponding 1's inside register B. It does not affect bit positions which

Applications of electronic data interchange in business, What are the appli...

What are the applications of Electronic Data Interchange in business? The applications of Electronic Data Interchange are as given below: 1. Organisations that use EDI 2

Describe one graphics and image editing tool, Question : Multimedia inv...

Question : Multimedia involves multiple modalities of text, audio, images, drawings, animation, and video (a) Describe three popular file formats for images (b) Most imag

What is a pre-processor, What is a pre-processor? A pre-processor is a ...

What is a pre-processor? A pre-processor is a program that procedure the source code before it passes by the compiler. It handles under the control of pre-processor directive.

Returns information about present virtual machine, Q. Returns information a...

Q. Returns information about present virtual machine? int pvm_parent( void ) Returns the tid of process which spawned the calling process.  int pvm_tidtohost(

Target - data phase, Target abort -computer architecture: Usually, a t...

Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without

Implement a priority queue, 1. Insert the following characters with their r...

1. Insert the following characters with their respective priorities (shown as ordered pairs) into an empty treap: (K, 17), (F, 22), (P, 29), (M, 10), (N, 15), (L, 26), (G, 13),

C++, Write a program to find the area under the curve y = f(x) between x = ...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd