Communications technology, Computer Engineering

Assignment Help:

COMMUNICATIONS TECHNOLOGY:

The development of communications technology is, in a sense, a symbol of man's effort to communicate rapidly over great distances. Communications technology is older than computer technology. It has grown as rapidly as the computer technology in recent times. These two technologies are now fusing into what Anthony Oettinger has called 'compunications'. This newly emergent technology is changing our life styles as few technologies have before. This new technology has probable and important uses in the home, office, factory, community and in information exchange system and holds prospects of immediate relevance to information profession. Some of the significant aspects of information transmission technology are discussed briefly in the following paragraphs. 

A communication system can establish paths over which messages can be sent between any two instruments in specified locations at desired times. This type of system is generally known as switched .network.' Communications technology has advanced to the extent that now it is possible to hire services from a commercially operated network. Hence, there is a steady growth of computer-to-computer data traffic. Also, computer manufactures are offering network architectures which together offer multiple operating systems running on families of similar computers. A terminal of a computer network may have access to any of the computers within the network, if it is authorised to do so. A computer serves as a terminal when connected for providing computation, information retrieval, etc., in accordance with the request of the terminal. A multi-lateral access capability allows the users of the terminal to share these resources. Such networks are characterised by a new technique known as packet switching in which the message is divided into a number of message blocks called packets and are transmitted between nodes in store and forward basis. Among the information resources to be shared are the data bases. A number of information systems have come into operation based on this concept.  


Related Discussions:- Communications technology

Define keyword and identifiers, Q. Define Keyword and Identifiers? Key...

Q. Define Keyword and Identifiers? Keyword:   A keyword is a statement which defines nature of that statement. If statement is a directive then keyword would be the title of t

Use of overlapped register windows, Q. Use of Overlapped Register Windows? ...

Q. Use of Overlapped Register Windows? Register file comprises 138 registers. Let them be called by register number 0 - 137.  Diagram demonstrates the use of registers: when

Support for high-level language, With the increasing use of more and higher...

With the increasing use of more and higher level languages manufacturers had offered more powerful instructions to support them. It was claimed that a stronger instruction set will

Role of internet, What are the roles of Internet, Intranet and extranet in ...

What are the roles of Internet, Intranet and extranet in e-business? Role of Internet, Intranet and extranet into e-business: The given information activities are carried

Specifying optimisation criteria of describe function, Specifying Optimisat...

Specifying Optimisation Criteria Specify values to be minimized, maximized or optimized. You can understand it as way you normalize data in database. For instance, you should

What are the user interfaces of interactive lists, What are the user interf...

What are the user interfaces of interactive lists? If you require the user to communicate with the system during list display, the list must be interactive.  You can describe

Advantages and disadvantages of e-commerce, E-commerce is one of the most s...

E-commerce is one of the most significant aspects of the internet. Having emerged recently and growing at a steady state, it becomes essential to look at the advantages and disadva

Give explanation about the use of SSL to secure the network, Give explanati...

Give explanation about the use of SSL to secure the network. SS L stands for Secure Sockets Layer is a protocol developed through Netscape for transmitting private document

What is the role of a controller in an mvc application, The controller resp...

The controller responds to user interactions, with the application, by selecting the act method to implement and also selecting the view to render.

What are the steps to design algorithm, What are the steps to design algori...

What are the steps to design algorithm? Formulate algorithm for each operation. Analysis specification tells what the operation does. The algorithm shows how it is done. The st

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd