Skip to main content

Basic Elements of Communication System(Networking)

A Communication is the process of transferring messages from one point to another. It is a very vital process in a network. When two networks are connected with each others they have to share data to each others so this process of communication system has three basic elements which are as follows -

1. A sender (source), which creates the message to be transmitted.

2. A medium, which carries the message,

3. A receiver (sink), which receives the message.


Data communication is the function of transmitting data from one point to another. In this case, the sender and receiver are normally machines, in particular, computer devices (computers, terminals, peripheral devices like printers, plotters, disks, etc), and the transmission medium may be telephone lines, microwave links, satellite links, etc. However, the messages that are transmitted are only in data form, but not in voice conversations form. Hence, the electronic systems, which transfer data from one point to another, are called data communication systems unlike computers, which process and communication systems transmit data from one point rearrange to another without any change.


Data Transmission Modes:


There are three ways, or modes of transmitting data from one point to another. These are simplex, half  duplex and full duplex.

1.Simplex: If transmission is simplex, comm unication can take place in only one direction. Devices connected to such a circuit are either a send-only or a receive-only device.
 

2.Half Duplex: A half duplex system can transmit data in both directions, but only in one direction at a time. Hence, a half duplex line can alternately send and receive data. It requires two wires.
 

3.Full Duplex: Some applications require simultaneous transmission in both directions. In such cases, a full duplex system is used, which allows information to flow simultaneously in both directions on the transmission path. Use of a full duplex line improves efficiency, because the line turn-around time required in a half duplex arrangement is eliminated. It requires four wires.

 

Data Transmission Speed:


1. Narrowband: Narrowband or subvoice grade. channels range in speed from 45 to 300 band. They are used for handling low data volumes, and are adequate for low-speed devices. They are used mainly for telegraph lines and low speed terminals.

2.Voiceband: Voiceband channels handle moderate data volumes, and can transmit data at speeds up to 9600 band. They are so called because their major application is for ordinary telephone voice communication. They are also used for data transmission from slow I/O devices to CPU or vice-versa. Moreover, most remote terminals are connected to computers through voiceband channels.

3. Broadband: Broadband or wideband channels are used when large volumes of data are to be transmitted at high speed. These systems provide data transmission rates of 1 million baud or more. A company might use a broadband facility for high speed computer-to-computer communication, or for simultaneous transmission of data to several different devices.

Comments

Post a Comment

Popular Posts

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than...

Types of Softwares

Software generally categorized into two types, which are as follows : System Softwares Application Softwares.        System Softwares:      A system software is a set of programs which is designed to control different-different operations and more extend processing capabilities of a computer system. It can perform these functions one or more depending on program requirements on a given task. Supports the development of other application software. Supports the execution of other application software. Handles the effective & efficient use of various hardware resources, such as CPU, memory peripherals etc.  Controls and communicate with the operation of peripheral devices such as printer disk, tape etc.     And system software makes the operation of a computer system more effective and efficient as we can see in its functions. It help the hardware components work together. These programme which are included in a system software p...