Concept of data transmission, Computer Networking

Assignment Help:

Overview of Data transmission network model

A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that we expect from a network.

 When sending data from software to actual physical transmission link (medium), there are several layers. Each layer provides certain services. The Open System Interconnection (OSI) layer model is the international standard, and it has 7 layers.

914_Concept of data transmission.png

Fig. General digital control system

When the digital data is transmitted through real line, these digital data should be converted to either a digital signal or an analog signal. In this project, we will convert a data to a digital signal. There are several conversion methods, and we use one of the simple methods as below.

1918_Concept of data transmission1.png

Fig. Example of signal conversion from digital data

 The waveform pattern of 1V or -1V used to represent the 1s and 0s of a digital data on a transmission channel. Suppose the transmission link is not ideal, some noises can be added to original signal. If the amplitude of the noise follows the normal distribution, the noise is called Gaussian noise.

 

 

375_Concept of data transmission2.png

Fig. 3. Data transmission on noise channel

 The function that generates 'Gaussian noise' will be given, and the argument of the function is SNR (Signal-to-noise ratio) dB(decibel). SNR is defined as the ratio of signal power to the noise power, and SNRdB is defined as 10*Log(SNR). Large SNR means that signal power is relatively higher than noise power, so noise is less effective. If noise is less effective, received data has less error.

Even though sending the data on the channel whose SNR is identical, reliable communication is possible when using error-detecting code or error-correcting code.

 


Related Discussions:- Concept of data transmission

What is meant by asymmetric multiprocessing (amp), It imposes hierarchy and...

It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated t

How is computer networks used in marketing and sales, How is computer netwo...

How is computer networks used in marketing and sales, financial services, teleconferencing? Computer network have led to a new age of all of these services. They have helped in

What is the routing algorithm used by rip and igrp, Distance vector-based r...

Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

What are the main differences between ripv1 and ripv2, 1.  What does RIP st...

1.  What does RIP stand for? 2.  What metric does RIP use for Path Selection? 3.  If the metric used by RIP exceeds this value for a route it is considered unreachable, effec

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Explain about stored procedure, A stored procedure is a named collection of...

A stored procedure is a named collection of SQL statements and procedural logic that is compiled, verified and kept in a server database. It is typically treated like any other dat

What is kerberos in networking, What is Kerberos in Networking? It is a...

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd