When using serial transmission, there are three possible techniques for organizing the bits being transferred. Name and describe them.

What will be an ideal response?


Answers will vary. When data is sent using serial transmission, one of the following three techniques is usually used to organize and time the bits being transferred so the data can be reconstructed after it is received.?Synchronous transmission-Data is organized into groups or blocks of data, which are transferred at regular, specified intervals. Because the transmissions are synchronized, both devices know when data can be sent and when it should arrive. Most data transmissions within a computer and over a network are synchronous transmissions.?Asynchronous transmission-Data is sent when it is ready to be sent, without being synchronized. To identify the bits that belong in each byte, a start bit and stop bit are used at the beginning and end of the byte, respectively. This overhead makes asynchronous transmission less efficient than synchronous transmission, and so it is not as widely used as synchronous transmission.?Isochronous transmission-Data is sent when it is ready but all data must be delivered at the time it is needed. For example, when transmitting a video file, the audio data must be received at the proper time in order for it to be played with its corresponding video data. To accomplish this with isochronous transmission, the sending and receiving devices first communicate to determine the bandwidth and other factors needed for the transmission, and then the necessary bandwidth is reserved just for that transmission.?Although all three of these techniques send data one bit at a time, they vary with respect to how the bits are organized for transfer. Please see the section "Data Transmission" for more information.

Computer Science & Information Technology

You might also like to view...

Thread safety in JavaFX applications is achieved not by synchronizing thread actions, but by ensuring that programs manipulate the scene graph from only the JavaFX application thread. This technique is called ________.

a. thread restriction. b. scene graph confinement. c. thread confinement. d. None of the above.

Computer Science & Information Technology

Critical Thinking QuestionsCase 1-1Your friend Frank has just received an email message that a colleague sent to all of the members of Frank's department. Frank is new to Outlook, so he asks for help in processing the message.Frank also wants to forward the message to his son. However, he has tried forwarding messages to him in the past, and his son has not received them. You suggest that the messages may be getting blocked by an antivirus program. Is there anything that Frank can do to prevent this? a. Yes, he can change the message format to Plain Text.b. Yes, he can change the message format to Rich Text.c. Yes, he can change the message format to HTML.d. No, Frank's son must make changes on his computer to allow the message to be received.

What will be an ideal response?

Computer Science & Information Technology

Design units are used to specify the __________ of a Font.

a) Size b) Name c) FontFamily d) Style

Computer Science & Information Technology

When Ruby on Rails is installed on your computer, so is a small web server called WEBrick, which you use as your Ruby on Rails development environment.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology