Telecommunication protocols, Basic Computer Science

Assignment Help:

TELECOMMUNICATION PROTOCOLS:

The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The network protocol defines the format in. which data are sent through the media. Protocols are rules governing the initiation and *maintenance of data flows. These are implemented in different ways for different types of equipment and networks. Information professionals are most likely to encounter these when setting up their sat-ware and hardware for online searching. In such situations, all should deal with such parameters as: 

  • bit rate 
  • parity 
  • stop bits 
  • flow control 
  • echoplex 
  • duplex 

Besides the above, other important parameters are word length used, and whether transmission is synchronous or asynchronous. The significance of these parameters is summarised below 

Line bit rate is measured in bits per second (bps) and also referred to as baud rate. The speed at which data can be transmitted is determined by the service being accessed, and the quality and characteristics of the telecommunications link. 

Parity: The parity bit is a rudimentary form of error checking which can be employed when a word length of 7 bits is in use. The full range of values is: odd, even, ignore; mark (always set to 1); none (word length of bits in use). 

If odd parity is selected the computer assigns a value to the parity bit so that the numbers of '1' bits in each character is odd, for even parity, the parity is set so that the number of bits is even. 

Stop bits: These are a means of keeping the transmitting and receiving computers in step with one another. Normally one stop bit is used. 

Flow Control: When data is flowing into a computer at a rate greater than that at which it can be printed, displayed or stored to disk, the connection between the transmitting and receiving computers may be severed. This is avoided by using X-ON X-OFF. If the receive buffer is nearly full, the computer sends an X-OFF signal to the transmitting system to tell it to temporarily suspend transmission. When the receive buffer has emptied, an X-ON signal is sent and the transmission is resumed. X-OFF and X-ON can be sent from keyboard by pressing control/s and control/q respectively. 

Echoplex: Echo ON/OFF is sometimes referred to as echoplex. In other words, the characters are displayed on the screen either as they are typed in or after being echoed back by the remote computer. 

Duplex: Data flows in both directions at the same time are referred to as duplex mode. 

Word Length: This defines the number of bits that make up a character, (i.e.,) 7 or 8 bits. The most common codes are ASCII (American Standard Code for Information Interchange) and EBCDIC, Telex uses the Band of code which has a word length of 5 bits, thus limiting the number of characters that can be generated. 

Synchronous Communication 

In synchronous communication, data is sent from one machine to another in a continuous stream. The sending and receiving computers must be in step with each other through out the transmission. Synchronous transmission is used for high speed data transmission, generally between two mainframes. 

Asynchronous Transmission 

In asynchronous mode of transmission data is sent character by character. This form of communication is used by most information systems attached to the public telephone network.  

 


Related Discussions:- Telecommunication protocols

Magnetic memory, Magnetic Memory:  In the above section we have seen v...

Magnetic Memory:  In the above section we have seen various types of semiconductor RAMs. These high speed semiconductor storage devices (i.e. RAMs) are expensive. So we need s

Number system , NUMBER SYSTEM:  We are familiar with decimal number sy...

NUMBER SYSTEM:  We are familiar with decimal number system which uses ten distinct symbols from 0...9, and has base 10. In the decimal number system a number n 4 n 3 n 2 n 1

Integers, what is the size of a void integer and what is it''s range

what is the size of a void integer and what is it''s range

Computer processing, Computer Processing: Most of the earliest compute...

Computer Processing: Most of the earliest computer memories have been based on physical elements which can exist in just one of the two states (on or off): such an element cor

Goals of autonomous rational agents, Goals of Autonomous Rational Agents: A...

Goals of Autonomous Rational Agents: Artificial intelligence One possible way to improve an agent's performance is to enable it to have some kind of details about what it is tr

Explain the components of it infrastructure, Question 1 Explain in detail ...

Question 1 Explain in detail the different modes of Transportation Question 2 State the meaning of Distribution Strategies. Discuss the different Distribution Strategies

Explain actual process of ftp applications, Question 1 How do you inse...

Question 1 How do you insert Image source code in HTML Question 2 Explain actual process of FTP applications Question 3 Write a short note on TIFF BMP

Looping statement, Looping Statement:  The purpose of a loop structure is...

Looping Statement:  The purpose of a loop structure is to repeat certain tasks until some condition is satisfied. Several variations of a loop structure are available in each pro

Explain briefly about gnome desktop, Question 1 Brief about the shells of ...

Question 1 Brief about the shells of Linux operating system Question 2 Explain briefly about GNOME desktop Question 3 Write note on the following Encryption Sig

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd