Communications technology, Computer Engineering

Assignment Help:

COMMUNICATIONS TECHNOLOGY:

The development of communications technology is, in a sense, a symbol of man's effort to communicate rapidly over great distances. Communications technology is older than computer technology. It has grown as rapidly as the computer technology in recent times. These two technologies are now fusing into what Anthony Oettinger has called 'compunications'. This newly emergent technology is changing our life styles as few technologies have before. This new technology has probable and important uses in the home, office, factory, community and in information exchange system and holds prospects of immediate relevance to information profession. Some of the significant aspects of information transmission technology are discussed briefly in the following paragraphs. 

A communication system can establish paths over which messages can be sent between any two instruments in specified locations at desired times. This type of system is generally known as switched .network.' Communications technology has advanced to the extent that now it is possible to hire services from a commercially operated network. Hence, there is a steady growth of computer-to-computer data traffic. Also, computer manufactures are offering network architectures which together offer multiple operating systems running on families of similar computers. A terminal of a computer network may have access to any of the computers within the network, if it is authorised to do so. A computer serves as a terminal when connected for providing computation, information retrieval, etc., in accordance with the request of the terminal. A multi-lateral access capability allows the users of the terminal to share these resources. Such networks are characterised by a new technique known as packet switching in which the message is divided into a number of message blocks called packets and are transmitted between nodes in store and forward basis. Among the information resources to be shared are the data bases. A number of information systems have come into operation based on this concept.  


Related Discussions:- Communications technology

Write a bash shell script, Write a BASH/C shell script which takes name of ...

Write a BASH/C shell script which takes name of one or more files as a command line argument, and prints the following information for each file: owner, number of words in the file

Examples of input, (i)  Input a single ASCII character into BL register wit...

(i)  Input a single ASCII character into BL register without echo on screen  CODE SEGMENT  MOV AH, 08H;         Function 08H  INT 21H          ;         the character inpu

Generate the output that the temperature entered is outside , Write a pseud...

Write a pseudocode for a program that reads a temperature as a whole number from a user and outputs a "probable" season (winter, sprint, summer, or fall) depending on the temperatu

Design of structure chart, Design of structure chart - Standard qualit...

Design of structure chart - Standard quality structure charts result in programs that are modular, reusable and simple to execute. - Measures include: Cohesion

m-files and the power point presentation, Power point presentation Arra...

Power point presentation Arrange a 20 minutes power point presentation showing the original and processed filters.  Discuss the methods used for processing and comment on each r

What is the concept of lock, Q. What is the Concept of Lock? Locks are ...

Q. What is the Concept of Lock? Locks are used for protected access of data in a shared variable system.  There are numerous kinds of locks:  1)  Binary Locks: These locks a

Use of typewriters for multiple copies, Use of Typewriters for Multiple Cop...

Use of Typewriters for Multiple Copies : Offices frequently require copies of various letters and documents. The simplest method is to make the copies at the same time along with

Differentiate between protection and security, Differentiate between Protec...

Differentiate between Protection and Security Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a

What are the advantages of hierarchical networks, What are the advantages o...

What are the advantages of Hierarchical Networks? Hierarchical networks are able of handling heavy traffic where needed, and at similar time use minimal number of trunk groups

Proof by contradiction - artificial intelligence, Proof by Contradiction - ...

Proof by Contradiction - Artificial intelligence So, both backward chaining andforward chaining have drawbacks. Another approach is to think regarding proving theorems by contr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd