Concept of data transmission, Computer Networking

Assignment Help:

Overview of Data transmission network model

A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that we expect from a network.

 When sending data from software to actual physical transmission link (medium), there are several layers. Each layer provides certain services. The Open System Interconnection (OSI) layer model is the international standard, and it has 7 layers.

914_Concept of data transmission.png

Fig. General digital control system

When the digital data is transmitted through real line, these digital data should be converted to either a digital signal or an analog signal. In this project, we will convert a data to a digital signal. There are several conversion methods, and we use one of the simple methods as below.

1918_Concept of data transmission1.png

Fig. Example of signal conversion from digital data

 The waveform pattern of 1V or -1V used to represent the 1s and 0s of a digital data on a transmission channel. Suppose the transmission link is not ideal, some noises can be added to original signal. If the amplitude of the noise follows the normal distribution, the noise is called Gaussian noise.

 

 

375_Concept of data transmission2.png

Fig. 3. Data transmission on noise channel

 The function that generates 'Gaussian noise' will be given, and the argument of the function is SNR (Signal-to-noise ratio) dB(decibel). SNR is defined as the ratio of signal power to the noise power, and SNRdB is defined as 10*Log(SNR). Large SNR means that signal power is relatively higher than noise power, so noise is less effective. If noise is less effective, received data has less error.

Even though sending the data on the channel whose SNR is identical, reliable communication is possible when using error-detecting code or error-correcting code.

 


Related Discussions:- Concept of data transmission

State the fundamental principles of 3gpp security, Question : a) What ...

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

Explain the term- encryption, Explain the term- Encryption Because all ...

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

State token bus frame format, Token Bus Frame Format No length fiel...

Token Bus Frame Format No length field Data is able to be much larger (timers prevent hogs) Frame control Ack required? Data vs Control frame and how is

Determine the term- cyberspace, Determine the term- Cyberspace The c...

Determine the term- Cyberspace The conceptual or virtual area where pages, data, images, and all the rest are stored. It is the area from where requests are accepted and ful

Dns in the internet, DNS in the Internet -Domain name space is split i...

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are

Design the user interface for mode switching, Design the user interface for...

Design the user interface for mode switching and data entry any way that you like. For example, to switch an application from transmit mode to receive mode, you can give it special

TRAFFIC CONGESTION ASSESSMENT, Can I get help for traffic congestion anlysi...

Can I get help for traffic congestion anlysis using GIS

What is subnet mask, What is subnet mask? A subnet mask is combined wit...

What is subnet mask? A subnet mask is combined with an IP address in order to recognize two parts: the extended network address and the host address. Such as an IP address, a s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd