Preview

Nt1310 Unit 7 Data And Communication Methods

Good Essays
Open Document
Open Document
538 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Data And Communication Methods
1. Message Encoding involves converting the information the host wishes to send into the appropriate medium for transmission. Messages sent across networks are converted down into bits by the sending host and then encoded into a pattern of sounds, light waves, or electrical impulses, depending on the network medium over which the bits are being transmitted.
2. Sending a message is much like a letter in that it is put inside another message that contains the source and destination addresses. If these are not correct the message cannot be sent. This process of putting one message format within another message format is called encapsulation. On the destination end, De-encapsulation will occur when the recipient will reverse the process by
…show more content…
Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.
4. Open standards are designed to create a fair market over which no one can take advantage over or monopolize. These standards are applied across all companies so that all devices are compatible with each other by a minimum standard. This allows a situation such as an OS X computer to access a website run by Linux-based web server. Open standards at the heart encourage interoperability, competition, and innovation, rather than restricted nature of proprietary standards.
5. Default gateways, also known as routers, serve the purpose of allowing message transmission across networks. When an Ethernet frame from a source host is wishing to be sent to a host off network, the source will instead send it to the default gateway, using the router’s MAC address. The default gateway will then forward the message to the intended destination host or the next closest default gateway if still not directly

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 294 Words
    • 2 Pages

    A) Thingamajigs and Things has total assets of $45,000 and $9,000 in liabilities. This gives a current ratio of 5.00:1. Wannabees has total assets of $150,000 and $85,000 in liabilities. This gives a current ratio of 1.76:1. Thingamajigs and Things is more likely to be approved for a loan, because it has a higher current ration. This means that their assets are higher than their liabilities (what they owe), and they are more likely to be able to make payments.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Case Study

    • 359 Words
    • 2 Pages

    Let’s take an average page fault service time of 25 ms and a memory access time of 100 ns, then the effective access time in ns is effective access time = (1-p)*(100) +p(25 ms)…

    • 359 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Case Study

    • 257 Words
    • 2 Pages

    1. The first standard was created in 1997 by the Institutue of Electrical and Electronics Engineers (IEEE). They called it 802.11 which only supported a maximum network bandwidth of 2 Mbps- too slow for most applications.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The project contains two parts, photogrammetric survey, and GIS analysis. The photogrammetric survey part was done by Agisoft photoscan software. This kind of survey is desired in many fields, such as Archeology field. This is because of the tendency of collapsing in Archeology’s targets. On the other hand, ArcMap and ArcScene are responsible for the data analysis part. With GIS, the complexity of the 3D data can be simplified, the data can be interpreted, and new data can be generated. Plus, we can comfortably work on improving our model by digitizing, coloring, outlining, and updating data even after we finish the project.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    3.0 Test and Evaluation includes the knowledge of efficient and cost effective methods for planning, monitoring, conducting and evaluating tests of prototype, new or modified systems equipment or material, including the need to develop a thorough strategy to validate system performance through measurable methods that relate directly to requirements and to develop metrics that demonstrate system success or failure. In this section, please include a discussion pertaining to activities you have participated in that involve, but are not limited to, preparing project analysis documents and tailoring acquisition documents to ensure that quality, effective, efficient systems or products are delivered.…

    • 1095 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Data collection would be accomplished by the assigned individual who would screen the emails in the support distribution email box, then move all the misdirected emails to a separate email folder labeled “Misdirected” each day, then and there forwarding a copy to the correct department. The moving of the emails allows a total to be collected each day, so at the end of the week they would be totaled and recorded to measure the effectiveness of the new process. There was a study conducted using research from comparable organizations, using a similar process that concluded that we should have a benchmark of 1 misdirected email a week. Furthermore, we would need someone to monitor the total number of non-technical support request that come in to…

    • 736 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Audit and organize the data. Understanding your data before cleaning improves the efficiency of your project and reduces the time and cost of data cleaning. Understand the purpose, location, flow, and workflows of your data before you start.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Message decoded – the other person has to interpret what has been communicated, this is known as decoding.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Message coded: once we have thought of an idea we compose this within our thoughts, how we are going to say our idea to the recipient in a way the recipient will understand. For example, is the message going to be spoken to them, do they speak English. Is the message going to written down for them or are we going to use sign language, if so, what signs are we going to use to portray our message.…

    • 1094 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    1. The first step begins with the Sender wanting to initiate a communication. A message is formulated to convey the sender’s wishes. It is the sender 's duty to ensure that the message is clear and easy to understand. Complicated messages act as a barrier in communication chain.…

    • 1467 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    1) The sender. Must provide clear, understandable instruction or information on the subject so the receiver has no doubt of what is required of them.…

    • 1331 Words
    • 6 Pages
    Good Essays