Data Elements
Introduction:
In this blog post, I will be explaining the different types
of data elements and why it is important. In addition to the explanations, I
will also give its uses and why it is used. The data elements are:
- Cyclic Redundancy Check
- Encapsulation – Frames, Packets
- Datagrams
- Address
- Sequencing
Moreover, I will provide and show diagrams where appropriate
for my points to be easier explained. In general, data elements are essentially
data being broken up into manageable chunks. Additionally, although data is
broken up into smaller sizes, additional information are set along with it
which decreases the speed slightly but improves accuracy.
Cyclic
Redundancy Check:
CRC (Cyclic Redundancy Check) is a checksum algorithm that is
used whilst data packets are being transmitted across a device; this is to
identify error detection and hopefully error correction. To do this, CRC will
use a technique known as polynomial where it will divide the data (usually with
a fixed divisor) and obtain a result. Furthermore, as the calculation is very
specific, there will be a remainder. This remainder will be sent along with the
data and will be re-calculated by the recipient device from the data it
receives. This leads to error detection as if the comparison is incorrect, the
data must have been corrupted during transmission. As a result, error
correction will take place. Despite the importance of it improving the accuracy
more than parity checks (counts the number of binary 1’s with an odd or even
protocol), this increases the size slightly and thus slows the speed by a small
percentage.
Encapsulation
– Frames, Packets:
When large files are sent across the network to another
device for download e.g. a video, the file will not only be split into smaller
individual parts for convenience but also to assist in reliability. This is
where encapsulation takes place as the frames will contain (encapsulate) each
packet with a segment which holds user data and IP address. A common example is
the Ethernet frame. Encapsulation is compulsory and is an important requirement
because it gives the packet its destination, (see figure 1). Without this
additional information the data would not be able to find its destination or know
who to request a resend from.
Figure 1: Encapsulation |
Datagrams:
When a file is sent, it is split into smaller manageable
chunks – this can be in packets or in datagrams (consider datagram as a cousin
to packets). However, datagrams are not reliable because it does not send an received
acknowledgement (confirmation) to the sender of the data file, apart from this its
function is identical to as of a packet – however this difference makes
datagrams less reliable.
The difference between packets and datagrams is that packets
are sent via TCP (transmission control protocol) and IP, this makes it reliable
as it is only sent if the if it is connection-orientated (if it sends
acknowledgement) whereas datagrams are sent through a UDP (user datagram
protocol) and IP. This works by sending the data through different routes
throughout the network and not having reliability as a priority.
Address:
Each device’s storage and components has its own unique
identifier to the network; this is known as its address. Addresses are needed
and are used by the devices because it is where the data will be transmitted
to/sent from, like a destination for the data to go to or leave. This is also
useful and is used by people who would like to access a specific array of a
computer.
The main types of addresses are physical addresses and
logical address. Physical addresses are an address that is given when the
device is manufactured or hard coded; therefore it has its own identity and
destination to where data goes to. This is useful for networks with computers
that will be there in the long term. An example would be a MAC address.
On the other hand, a logical address is an address that is
given (assigned) to the device every time by a server on a network. This
address is more likely to be changed for security purposes; an example of a
logical address is an IP address - a unique number that identifies a computer
on the internet.
Sequencing:
When a file is split into packets and they sent from the
device to the recipient, each packet will need to be reassembled at the end in
chronological order for it to function accordingly. This is because without
sequencing, the packets are not organised at the end and the data will be out
of order – this is heavily dependent on the speed of the connection as well as
the route it takes when it is sent through the network, (see figure 2). To
avoid putting the data in the wrong order when the recipient device receives the
data, they will beforehand add an identifier/sequence data element to let it
know which order it goes.
Harvard
Referencing: (In order of reference)
- Anderson, K. Atkinson-Beaumont, D.Kaye, A. Lawson, J. McGill, R. Phillips, J and Richardson, D. 2011. Information Technology Level 3 Book 1 BTEC National. Harlow: Pearson Education Limited.
- Figure 1: core0.staticworld, 2009. Encapsulation Frames Packets Segments. [Online] Available at: <http://core0.staticworld.net/images/idge/imported/article/nww/2009/07/01fig05-100277629-orig.jpg> [Accessed 22 January 2015].
- Anderson, K. Atkinson-Beaumont, D.Kaye, A. Lawson, J. McGill, R. Phillips, J and Richardson, D. 2011. Information Technology Level 3 Book 1 BTEC National. Harlow: Pearson Education Limited.
- Figure 1: core0.staticworld, 2009. Encapsulation Frames Packets Segments. [Online] Available at: <http://core0.staticworld.net/images/idge/imported/article/nww/2009/07/01fig05-100277629-orig.jpg> [Accessed 22 January 2015].
Bibliography:
(In alphabetical order)
- webopedia, 2015. CRC. [Online] Available at: <http://www.webopedia.com/TERM/C/CRC.html> [Accessed January 21 2015].
- webopedia, 2015. CRC. [Online] Available at: <http://www.webopedia.com/TERM/C/CRC.html> [Accessed January 21 2015].
No comments:
Post a Comment