Communication systems 2010


Published on

hsc ipt communication systems presentation matched to the NSW BOS syllabus

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Communication systems 2010

  1. 1. Communication System Communication Systems support people who are working together by enabling them the electronic exchange of data and information. This presentation will enable the users to access a wide range of information regarding Communication Systems.
  2. 2. The topics in Communication Sytem <ul><li>Characteristics of Communication Systems </li></ul><ul><li>Examples of Communication Systems </li></ul><ul><li>Transmitting and Receiving </li></ul><ul><li>Other Information Processes </li></ul><ul><li>Issues Related To Communication Systems </li></ul>Click your chosen topic
  3. 3. Characteristics of Communication Systems <ul><li>Every communication system has 5 basic requirements </li></ul><ul><li>Data Source (where the data originates) </li></ul><ul><li>Transmitter (device used to transmit data) </li></ul><ul><li>Transmission Medium (cables or non cable) </li></ul><ul><li>Receiver (device used to receive data) </li></ul><ul><li>Destination (where the data will be placed) </li></ul>
  4. 5. <ul><li>The necessity of protocols in communication – a protocol is needed when one computer communicates with another where one of its tasks is to ensure that the data send by the sending device is the same as the data received by the receiving device. A protocol is a set of rules that control a communications link. </li></ul><ul><li>A protocol defines the format and meaning of information exchanged by describing parameters such as speed of transmission (bps, baud) transmission mode (answer or originate), handshake, parity, error detection and correction. </li></ul><ul><li>The elements that a protocol controls include: the type of language used (e.g. ASCII), type of error checking method used (e.g. checksum), what to do when error is detected (e.g. resend data), way data are sent (asynchronous or synchronous transmission) and how often receiving computer needs to acknowledge that it has received the data. </li></ul>
  5. 6. <ul><li>Handshaking – is the exchange of signals between two devices to establish a communication link for senders and receivers. The computer handshakes to a printer or a modem in order to establish a connection for communicating. For a link between the computer and modem, handshaking involves the signalling of both to each other that they are switched on and ready for work. The computer sends a DTR (Data Terminal Ready) signal to modem through a particular wire used only for this signal. When the modem is ready it sends a DSR (Data Set Ready) signal to computer through a different wire in the connecting cable. </li></ul>
  6. 7. <ul><ul><li>Measuring speed in a communication link : - </li></ul></ul><ul><ul><ul><li>Baud rate – the number of distinct signal events or timing intervals in a second. If a device like a modem can only send on-off signals then its bps equals its baud rate. </li></ul></ul></ul><ul><ul><ul><li>Bits per second (bps) – the number of bits that are transmitted in a second. This measures the speed of communication. Bps is the number of 0s and 1s which are transmitted through the communication link in one second. This includes special bits described in the protocol, including start and stop bits and various error checking bits. Bps is more useful than baud rate as it shows how much data is sent and how fast it is sent. </li></ul></ul></ul>
  7. 8. <ul><ul><li>Methods to check for errors in communications links including: - </li></ul></ul><ul><ul><ul><li>Parity bit check – this is a character error detection method. It adds an extra bit to every character or byte transmitted. </li></ul></ul></ul><ul><ul><ul><li>Check sum – adds together the values of all the bytes transmitted in a message block and sends the total as the last data byte of the block. </li></ul></ul></ul><ul><ul><ul><li>Cyclic redundancy check (CRC) – performs a division calculation on the entire block of data to produce a 16- or 32- bit result. Like check sum, CRC is a block error detection method and cannot reveal which byte or bytes in a block are faulty. </li></ul></ul></ul>
  8. 9. Examples of Communication Systems
  9. 10. <ul><li>- E-mail </li></ul><ul><li>- V oice M ail - Fax </li></ul><ul><li>- S mart P hone - I nstant M essaging </li></ul><ul><li>- Teleconferencing - Video - con ferencing </li></ul><ul><li>- Groupware - Telephony </li></ul><ul><li>- E-Commerce - The Internet </li></ul><ul><li>B ulletin board system - The Web </li></ul><ul><li>- G lobal positioning system </li></ul>
  10. 11. <ul><ul><li>Teleconferencing (as an alternative to a face to face meeting) – or videoconferencing, allows people in different locations to participate in meetings without the problems and expense of travel using microphone and a camera, monitor and speakers. </li></ul></ul><ul><ul><ul><li>How audio data is transmitted and received – Sound and images must be converted into binary by digitising before it is transmitted. </li></ul></ul></ul><ul><ul><ul><li>How video data is transmitted and received – images and sounds can be represented as a series of numbers and therefore 1s and 0s. The process of converting images into binary numbers is called digitisation . </li></ul></ul></ul><ul><ul><ul><li>Advantages – reduction of costs due to decreased travel and accommodation bills, stimulates face-to-face meetings without travel. </li></ul></ul></ul><ul><ul><ul><li>Disadvantages – teleconferencing results in the lack of personal contact which limits the potential to develop interpersonal relationships. </li></ul></ul></ul>
  11. 12. <ul><ul><ul><li>Examples of teleconferencing such as : </li></ul></ul></ul><ul><ul><ul><ul><li>Business use –Business use of teleconferencing is becoming common as meetings and conferences can be held in any city nationally or internationally without the need for all participants to b in the same location. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Distance education – . Unlike a video lecture, teleconferencing is interactive as it allows the participants to ask and answer questions. Student living in these remote areas can participate in teleconferences, lecture broadcasts and live tutorial sessions. </li></ul></ul></ul></ul>
  12. 13. <ul><ul><li>Electronic commerce </li></ul></ul><ul><ul><ul><li>EFTPOS as the transfer of funds electronically at the point of sale – Electronic Funds Transfer – Point of Sale – is an increasingly popular method of purchasing goods and services using a credit card or savings account. The customer swipes the card through EFTPOS terminal, choosing and account and entering their PIN as a password. The funds are transferred from customer’s account to retail store’s account without any cash being handled which is an advantage. </li></ul></ul></ul><ul><ul><ul><li>Electronic banking on the Internet – E-commerce (electronic commerce) involves conducting a business and making sales over a network such the Internet making ii convenient for customers to purchase goods as they ‘browse’ as many stores at they want 24.7 without leaving their home. </li></ul></ul></ul>
  13. 14. Transmitting and receiving in communication systems:
  14. 15. <ul><ul><li>Communication concepts including: - </li></ul></ul><ul><ul><ul><li>Protocols – a protocol of information exchanged by describing parameters such as speed of transmission (bps, baud), transmission mode (answer or originate), handshake, parity, error, detection and correction. </li></ul></ul></ul><ul><ul><ul><li>Examples include: Exports-modem, Z-modem, smtp, http and NETBIOS. </li></ul></ul></ul><ul><ul><ul><li>Handshaking – is the process by which two devices initiate communications. It enables a communications protocol to be agreed upon. Bandwidth (bps) is a measure of how much information can flow along a data pipe. </li></ul></ul></ul><ul><ul><ul><li>Error detection / correction – Error correction methods – these protocols attempt to correct any detected transmission errors. Retransmission is where the receiving computer requests that part of the message to be sent again and it may involve only the corrupted blocks of the message being transmitted or the whole message being transmitted. Retransmission is the most common error correction method. </li></ul></ul></ul>
  15. 16. Serial Transmission Data is transmitted, on a single channel, one bit at a time one after another - Much faster than parallel because of way bits processed (e.g. USB and SATA drives) Sender Transmitted Receiver received 1 0 1 0 0 1 1 0
  16. 17. Parallel Transmission <ul><li>each bit has it’s own piece of wire along which it travels </li></ul><ul><li>- often used to send data to a printer </li></ul>Receiver received Sender transmitted 1 0 0 1 1 0 0 1 All bits are sent simultaneously
  17. 18. Simplex: One direction only Transmission Direction Half duplex: Both directions but only one direction at a time
  18. 19. Full duplex: send and receive both directions at once
  19. 20. 3 Types of LANs RING – consists of nodes in a closed loop or circle. Each node is part of a loop linking all the nodes together and nodes are attached to the cable at various points around the ring. Traffic can be one-way around the loop or can travel in both directions if a double loop is used. Its advantages include: a single cable is used to connect all the nodes making it extremely cheap, takes up less space and easy to fault-find in terms of broken cable. Its disadvantages include: if the ring is broken or cable is faulty the network ceases to operate, the ring must be broken to add or remove nodes, and it’s slow as it goes around the entire circle. STAR – is a network topology that consists of computers attached to a central point or node (a device such as a computer connected to a network) which can be a computer like a mainframe, hub with links going out to computers that are workstations and servers. Star networks are popular and most common in LANs. Its advantages include: each node has its own cable and doesn’t need to share the line with other nodes, if a cable to a node is broken then only that node is affected while the rest of the network can operate normally, new links to the central node can be easily added or existing links easily removed without affecting the rest of the network. Its disadvantages include if the central node fails then the entire network will cease to operate, more cabling is needed than for other network topologies which is uneconomical.
  20. 21. BUS – this uses a cable in single line with two end points. At each end point there is terminator that prevents signals at the end of the cable from being reflected back into the network. In a BUS network each node is connected to a single cable and it is mostly used for small LANs. Its advantages include: it’s easy and cheap to set up as it requires less cables, nodes can be easily added and removed and if a node goes down the network is unaffected. Its disadvantages include: because the one cable carries all the data, collisions (data traffic jams) become more common as more nodes are added or when multiple terminals transmit at the same time. Nowadays, bus networks are often replaced with a star network
  21. 22. <ul><li>Network Hardware – a PC needs specialised hardware to become part of a network which includes a network card and cables. </li></ul><ul><li>Servers – a computer that supplies a service to other nodes on the network, taking a responsibility for certain tasks such as file sharing, printing, and database and Internet access to network to users. </li></ul><ul><ul><ul><li>File Server – computer dedicated to the task of sharing disk space, files and sometimes a printer. It uses the NOS to allowing many registered users to access files and programs at the same time. </li></ul></ul></ul><ul><ul><ul><li>Print server – computer that manages printing tasks whereby printers are attached to them and can be accessed by all network users in the network environment. </li></ul></ul></ul><ul><ul><ul><li>Mail server – this computer stores, receives and distributes electronic male for users. </li></ul></ul></ul><ul><ul><ul><li>Web server – computer that stores and ‘serves’ webpages to users on either intranet or the internet. </li></ul></ul></ul><ul><ul><ul><li>Proxy server – this computer acts as a temporary store for data moving between LAN and other network like the Internet. </li></ul></ul></ul>
  22. 23. NETWORK TOPOLOGIES (categorizing by shape)
  23. 24. Other information processes in communication systems
  24. 25. <ul><ul><li>Collecting </li></ul></ul><ul><ul><li>refers to the process of obtaining data from a source external to the system. Data can be collected in either digital or analog form. A computer can directly process digital data but needs to digitise analog data before attempting to process. </li></ul></ul><ul><ul><ul><li>The phone as a collection device with voice mail – </li></ul></ul></ul><ul><ul><ul><li>the callers are: given a series of options then requested to press a key on the phone’s keypad corresponding to their chosen option used in bill payment and product ordering systems and caller has to enter their credit card number allowing entered data to be immediately digitised and processed by computer. </li></ul></ul></ul><ul><ul><ul><li>EFTPOS terminal as a collection device for electronic banking – </li></ul></ul></ul><ul><ul><ul><li>(Electronic Funds Transfer- Point of Sale) is a collection device for electronic banking and can be used for: to pay for a purchase customer selects the account type (credit, savings or cheque) enters their PIN and amount is directly withdrawn from customer’s bank account or added to their credit card statement </li></ul></ul></ul>
  25. 26. <ul><ul><li>Processing </li></ul></ul><ul><ul><li>this is an information system process that converts digital data into information within the information system. </li></ul></ul><ul><ul><ul><li>Sending of attachments with email – an email (Electronic Mail) is the transmission of memos and messages over a network. Users can email to a single recipient or broadcast it to multiple users. Attachments are computer files such as text, video, sound pictures or programs sent with an email message. </li></ul></ul></ul><ul><ul><ul><li>Encoding and decoding methods – communication systems frequently convert data signals between analog and digital. The parts of a communication link that use analog signals (e.g. from telephone to local exchange) must convert all data to analog before transmission. </li></ul></ul></ul><ul><ul><ul><li>Client-server architecture – shares the processing between client and server computers on a network. </li></ul></ul></ul><ul><ul><ul><li>Client controls the user interface and application logic – the processing in client server networks is shared or distributed between server and client. </li></ul></ul></ul><ul><ul><ul><li>Server controls access to the database – sometimes more than one user wants to access the same data record at the same time. The database software at the server can lock those records in use. </li></ul></ul></ul>
  26. 27. <ul><ul><li>Displaying </li></ul></ul><ul><ul><li>is the process by which the information stored within the system is made available for its users. This is a necessary process within a communication system as it produces the output. </li></ul></ul><ul><ul><ul><li>The phone as display device with voice mail – a telephone is a display device for voice mail as the output is audio, not graphical. A caller’s telephone number and name can be recalled on the screen of a mobile phone. </li></ul></ul></ul><ul><ul><ul><li>EFTPOS terminal as display device for electronic banking – the EFTPOS terminal will display the type of account user has selected, amount of cash to be withdrawn / amount to spend on the transaction. It asks for pin number, display processing messages and then whether the transaction has been approved or not. </li></ul></ul></ul>
  27. 28. Issues related to communication systems
  28. 29. <ul><ul><li>Usage of communication systems to share knowledge not just data – main role of communication systems is to share knowledge. Most communication systems are privately controlled an owned thus these powerful organisations and individuals control the information they pass on to receivers who also have control over the knowledge. </li></ul></ul><ul><ul><li>Issues related to messaging systems – increasing business and personal communications occur via email or other Internet messaging solutions like chat rooms or instant messaging clients. </li></ul></ul><ul><ul><ul><li>Ideas delivered by this means appear less forceful and caring than ideas delivered personally </li></ul></ul></ul><ul><ul><ul><li>Danger of being misinterpreted </li></ul></ul></ul><ul><ul><ul><li>Power relationships – communications via electronic means restrict relationships as inter-personal socialisation is limited. </li></ul></ul></ul><ul><ul><ul><li>Privacy and confidentiality </li></ul></ul></ul><ul><ul><ul><li>Electronic junk mail – this is one a user receives countless unrequested emails from unknown people or spammers. </li></ul></ul></ul>
  29. 30. <ul><ul><li>Implications of Internet trading including – purchasing goods and services over the Internet has become common recently with payments transacted via a credit card. In today’s ‘cashless’ society, even people low on cash can purchase goods via a credit card, an EFTPOS terminal or instant credit checks, encouraging spending but resulting in increasing debt levels. </li></ul></ul><ul><ul><li>Trading over the Internet and its commercial implications – many businesses which are based entirely on the Internet may have a great website and product but have neglected to plan their supply chain as thoroughly and thus consumers face lengthy delays when purchasing items. </li></ul></ul><ul><ul><li>Difficulties of censoring content on the Internet – censorship is a major issue concerning control of the Internet where its contents (inappropriate websites, newsgroups, emails, chat rooms) should be censored but because the Internet is worldwide the responsibility of censorship becomes a problem whether the user, content provider or ISP (Internet Service Provider) should be responsible. </li></ul></ul>
  30. 31. <ul><ul><li>Issues arising from Internet banking including: </li></ul></ul><ul><ul><ul><li>Security of banking details – Internet banking customers have a right to the privacy of their transactions and financial details. When account details are entered into a response form on a webpage, the user has no control over the computer systems it passes through before reaching its destination. The encryption (data security coding) systems used on many web browsers and web servers aren’t totally secure as many have been broken by ‘hackers’. </li></ul></ul></ul><ul><ul><ul><li>Changing nature of work – jobs have been eliminated due to increased Internet emphasis. Replacements generally require skills in IT and web support services causing the existing staff to retrain or find alternative jobs. </li></ul></ul></ul><ul><ul><ul><li>Branch closure and job loss – This has had a major impact on customer access to traditional banking services, has increased customer dissatisfaction with the banks and reduced employment in the banking industry. </li></ul></ul></ul>
  31. 32. <ul><li>The emerging trend of accessing media such as radio and video across the Internet – communication technologies are converging into one technology – ‘ convergent technology ’ - as multimedia and the Internet have already converged, radio and TV has started to converge with the Internet through live audio and video Internet broadcasts. The web has started to converge with cable TV with the provision of fully interactive cable broadcast services and web services are now appearing on broadcast digital TV. Telephones and mobile phones can now purchased with high resolution LCD screens and built-in web browser and email software while a PC is no longer needed to access the Internet with set top boxes that turn the TV into a web browser. </li></ul>