Nt1310 Unit 7 Data Communication

Great Essays
In data communication, they are always striving to increase throughput, this would include allowing nodes to transmit information over a single broadcast link without interfering with each other. To achieve this, multiple access protocols coordinate the transmission. The three classes of multiple access protocols are, random access, taking-turns and channel partitioning. With random access protocol, each node tries to randomly to use the complete broadcast link, without any regard to the other nodes. Taking-turns protocol uses some type of turning mechanism, which designates which node is allowed to transmit. Channel partitioning protocol divides the channel (time slots, frequency, code) and assigns them evenly between all the nodes in the …show more content…
TDM divides time into time frames and further divides each time frame into time slots. Each time slot is then assigned to one of the nodes. Whenever a node has a packet to send, it transmits the packet’s during its assigned time slot in the revolving TDM frame. (Kurose 448) Advantage of TDM is no collisions and each node gets dedicate transmission rate during each time frame. A disadvantage is nodes must always wait for its turn in the transmission sequence even if it is the only device with a frame to transmit. FDM divides the channel into different frequencies and assigns each frequency to a node. FDM thus creates smaller channels of out of the single, larger channel. FDM shares both the advantages and disadvantages of TDM. While TDM and FDM assign time slots and frequencies, to the nodes, CDMA assigns a different code to each node. Each node, then uses its unique code to encode the data bits it sends. In CDMA networks different nodes can transmit simultaneously and their respective receivers correctly receive a sender’s encoded data in spite of interfering transmissions by other nodes. (Kurose 449) CDMA was first used during World War II by English allies to stop German attempts at jamming transmissions by transmitting over several frequencies, making it difficult for the Germans to pick up the complete signal. The company Qualcomm created communication chips for CDMA technology, and were the first to commercialize it. CDMA is widely used in cellular networks. CDMA main competitor cellular networks is GSM (Global System for Mobile communication). CDMAis prevalent in most parts of North America, while GSM is widespread in Western Europe and other parts of the world. CDMA has several advantages, encrypted communication channels, simultaneously transmit numerous conversations. Disadvantages are

Related Documents

  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    B. Steady-state phase: Data transmission starts; Nodes forward their data during their assigned TDMA slot to the CH. This transmission utilizes a minimum amount of energy (selected depending on the obtained strength of the CH advertisement). The radio of every non-CH node can be turned off until the nodes assigned TDMA…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Data Encryption and Decryption 4. Data compression Data Transcription: Networks has the ability to connect many servers on the same single network. The presentation layer is constructed for uncertainty while transferring data between networked systems. Data Conversion: Presentation layer also implement bit order reversal functions. It converts carriage return data to carriage return with line feed data and it also converts integers to floating point numbers.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Step1: Start the program Step2: Initialize the nodes by fixing the number of nodes, type of antenna used, type of routing protocol and plotting circumference Step3: Frequency is allocated for the MIMO antennas. Step4: Positioning and plotting the nodes Step5: Base Bandwidth allocation for primary and secondary nodes • Primary network range-…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Finally, the potential issues or risks while using the mobile wireless will be discussed. 1. the technical details of FDMA, TDMA and CDMA (1) FDMA Frequency Division Multiple Access (FDMA) bandwidth is divided into narrow frequency slots and is use to allocate a unique frequency band or channel that a user is free to transmit or receive all the time over the shared…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 5

    • 541 Words
    • 3 Pages

    The improvements only deal with B.W. while the latency is the…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The application layer contains programs or processers that use transport layer protocols so that it delivers the data to the destination of the computers. The application layer has many protocols that programs use to communicate with the second layer which is called Transport layer. Some of the application layer protocols are: Simple mail transfer protocol (SMTP), File transfer protocol (FTP), Hypertext transfer protocol (HTTP) and Simple network management protocol (SNMP). Transport layer The second layer of TCP/IP protocol suite is the transport layer.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 961 Words
    • 4 Pages

    The problem is to ensure that elderly medical patients take their medication and recommended dose at the proper time to ensure that they receive the necessary treatment, and prevent the condition from worsening in the process. To solve this problem, a device will need to be implemented that allows the user to be reminded when to take the medicine, and also be sure that the patient is taking the correct amount of medication. Our first idea was to develop a portable watch device with built in audio and visual cues to remind the patient of their need to take the medication. The device could be programmed ahead of time by a technician, and instruct the user to take the recommended dosage at the correct time.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Data Flow Diagrams The existing system data flow identifies users interact with the new system. It also highlights the relationship of the legacy data to the new patient record database. Appendix F contains the source file for the diagrams below. The legacy conversion data flow identifies how legacy records will be converted and accessible to the new system.…

    • 1284 Words
    • 6 Pages
    Improved Essays
  • Brilliant Essays

    (D. Tse and P. Viswanath, 2005) In 151, the proposed scheme is known as "the diversity of user cooperation," the author of this particular plan to achieve the rate in the region and the probability of failure. Sendonaris, who proposed a simple method of user cooperation, based on a signal of DF with the CDMA scheme. According to Liu (2009), different users with different orthogonal spreading codes can distinguish between different forms of cooperation from users to send information to the recipient. (Liu, 2009)…

    • 3958 Words
    • 16 Pages
    Brilliant Essays