Concept of data transmission, Computer Networking

Assignment Help:

Overview of Data transmission network model

A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that we expect from a network.

 When sending data from software to actual physical transmission link (medium), there are several layers. Each layer provides certain services. The Open System Interconnection (OSI) layer model is the international standard, and it has 7 layers.

914_Concept of data transmission.png

Fig. General digital control system

When the digital data is transmitted through real line, these digital data should be converted to either a digital signal or an analog signal. In this project, we will convert a data to a digital signal. There are several conversion methods, and we use one of the simple methods as below.

1918_Concept of data transmission1.png

Fig. Example of signal conversion from digital data

 The waveform pattern of 1V or -1V used to represent the 1s and 0s of a digital data on a transmission channel. Suppose the transmission link is not ideal, some noises can be added to original signal. If the amplitude of the noise follows the normal distribution, the noise is called Gaussian noise.

 

 

375_Concept of data transmission2.png

Fig. 3. Data transmission on noise channel

 The function that generates 'Gaussian noise' will be given, and the argument of the function is SNR (Signal-to-noise ratio) dB(decibel). SNR is defined as the ratio of signal power to the noise power, and SNRdB is defined as 10*Log(SNR). Large SNR means that signal power is relatively higher than noise power, so noise is less effective. If noise is less effective, received data has less error.

Even though sending the data on the channel whose SNR is identical, reliable communication is possible when using error-detecting code or error-correcting code.

 


Related Discussions:- Concept of data transmission

Advantages and disadvantages of public and private network, The disadvantag...

The disadvantages and advantages of Private and Public networks are shown in the table below:

Distributed shared memory systems, Distributed Shared Memory (DSM) systems ...

Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo

Layered concept of computer networks, Q1.  What  advantages  do  you  see  ...

Q1.  What  advantages  do  you  see  in  having  a  layered  concept  of  computer  networks?  Which layers or OSI structure deals with identification of a host? Explain the proces

Overview of the transport layer protocols, Overview of the Transport  Laye...

Overview of the Transport  Layer Protocols Transport layer  can be  available  more than  protocols  to the  network  applications. For  example the network  applications. For

Show the process of mail delivery, Q. Show the process of Mail Delivery? ...

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

Merge sort circuit, First, split the given series of n numbers into two par...

First, split the given series of n numbers into two parts, each consisting of n/2 numbers. After that, recursively split the series into two parts until each number acts as an inde

Illustrate addressing, Addressing Complicated addressing scheme because...

Addressing Complicated addressing scheme because there may be intermediate stations (APs), identified by flags

Explain about the middleware support, Explain about the Middleware support ...

Explain about the Middleware support All the connectivity interface related tools come under the category of middleware. Middleware provides the link for data exchange between

Explain token passing -token ring, Token Passing - Token Ring (IEEE 802.5) ...

Token Passing - Token Ring (IEEE 802.5) Needs that station take turns sending data Token passing coordinates process Token is a especially formatted three-byte fr

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd