Synchronous and Asynchronous Communication Systems

Author(s):  
António D. Reis ◽  
José F. Rocha ◽  
Atilio S. Gameiro ◽  
José P. Carvalho

This article talks generically about telecommunication systems. A telecommunication system involves a transmitter, a transmission medium, and a receiver. The type of communication between the transmitter and the receiver can be the synchronous transmission mode or the asynchronous transmission mode. Synchronous communication is sending data with synchronization to an external clock. The most significant aspect of synchronous communication is that the transmitter and receiver clocks are dependent and synchronized. The synchronous communication is a transmission technique that is widely used in telecommunications. Asynchronous communication is sending data without synchronization to an external clock. The most significant aspect of asynchronous communication is that the transmitter and receiver clocks are independent and are not synchronized. The synchronous communication is a transmission technique, which is widely used in personal computers, providing connectivity to printers, modems, fax machines, and so forth.

2017 ◽  
Vol 23 ◽  
pp. 32-36
Author(s):  
Sæmundur E. Þorsteinsson

General deployment of optical fibre technology commenced in the eighties. Its introduction revolutionised the telecommunications arena and has become the foundation of most telecommunication systems in use today. Optical fibres connect continents and countries, are used in core and access networks and for backhauling of mobile communication systems. The internet would barely exist without optical fibres and globalisation would hardly have seen the dawn of light. Three submarine optical cables connect Iceland to the outside world; Farice and Danice connect Iceland to Europe and Greenland Connect to America via Greenland. The optical ring around Iceland constitutes the Icelandic core network. The ring passes by nearly all villages and towns and fibre deployment in the access network has reached an advanced state. Fibre deployment in rural areas has already begun and will presumably be finished in a few years. Iceland plays a leading role in fibre deployment. In this paper, fibre utilisation in Iceland will be described, both in core and access networks. Three different architectures for fibre deployment in the access network will be described. Competition on fibre networks will also be discussed.


Author(s):  
D. M. Nenadovich ◽  
I. V. Markin

One of the main goals of modernization of telecommunication networks is to increase its performance. For a quantitative assessment of the success of improving the system, methods were developed for assessing the expert indicators of the performance quality of the designed digital telecommunication system, synthesized on the basis of previously developed decomposition and reduction algorithms. The main expert indicators of the performance quality of the designed system are considered, the dependences for calculating these indicators are presented.


Author(s):  
Richard A. Schwier ◽  
Shelly Balbar

A group of graduate students and an instructor at the University of Saskatchewan experimented with the use of synchronous communication (chat) and asynchronous communication (bulletin board) in a theory course in Educational Communications and Technology for an eight-month period. Synchronous communication contributed dramatically to the continuity and convenience of the class, and promoted a strong sense of community. At the same time, it was viewed as less effective than asynchronous communication for dealing with content and issues deeply, and it introduced a number of pedagogical and intellectual limitations. We concluded that synchronous and asynchronous strategies were suitable for different types of learning, and what we experienced was a balancing act between content and community in our group. A combination of synchronous and asynchronous experiences seems to be necessary to promote the kind of engagement and depth required in a graduate seminar.


Author(s):  
Mario Bravetti ◽  
Gianluigi Zavattaro

The authors discuss the interplay between the notions of contract compliance, contract refinement, and choreography conformance in the context of service oriented computing, by considering both synchronous and asynchronous communication. Service contracts are specified in a language independent way by means of finite labeled transition systems. In this way, the theory is general and foundational as the authors abstract away from the syntax of contracts and simply assume that a contract language has an operational semantics defined in terms of a labeled transition system. The chapter makes a comparative analysis of synchronous and asynchronous communication. Concerning the latter, a realistic scenario is considered in which services are endowed with queues used to store the received messages. In the simpler context of synchronous communication, the authors are able to resort to the theory of fair testing to provide decidability results.


Author(s):  
Karen L. Murphy ◽  
Yakut Gazi ◽  
Lauren Cifuentes

This chapter addresses the question, “How can we overcome potential cultural discontinuities in online collaborative project-based learning environments?” The authors first identify differing worldviews, communication practices, and technological issues that can present barriers that frequently arise in intercultural online courses. They then identify constructivist project-based teaching strategies that reduce these intercultural barriers. Differing worldviews can be reconciled by fostering collaboration, grouping, relevance, and metacognition. Communication barriers can be minimized by attention to language and community building. Technological problems can be reduced by using asynchronous communication, simplifying online communication systems, and providing technical training and ongoing technical support. The chapter concludes with a model for a polycentric culture that minimizes differences among individuals in terms of their worldviews, communication practices, and technological issues.


2020 ◽  
Vol 4 (8) ◽  
pp. 113-123
Author(s):  
Volodymyr Okhrimchuk

Today, there is a significant increase in the number of cyber-attacks in the world. At the same time their technological complexity increases proportionally. In the near future, new potentially dangerous cyber-attacks will appear, which in turn may lead to a deterioration of their detection and neutralization and, as a consequence, adversely affect the level of security of information and information and telecommunication systems of critical information infrastructure. Based on the mentioned in the article is solved the urgent task of identifying and neutralizing potentially dangerous cyber-attacks, which boils down to the development of differential-game model of their pattern. The basis of the created pattern of potentially dangerous cyberattacks is proposed to put the Denning`s model of information protection and the method of differential-game simulation of cyber-attack on information processes. The article shows that the pattern of a potentially dangerous cyberattack is modeled under the a priori uncertainty of the input data, since the potential cyberattacks that will take place may be quite diverse. In view of this, it is proposed that the hybrid model be used as a generic template for a potentially dangerous cyberattack due to the inability to make the correct input requirements for the model. This approach provides the evolving model that is being developed, that is, convergence with real physical phenomena and processes in information and information and telecommunication systems. As a result of the application of the differential-game modeling method in analytical form, a generalized differential-game model of a pattern of potentially dangerous cyber-attacks is generalized. Thus, the article further developed a generalized differential-game model of a potentially dangerous cyber-attack pattern, which is based on a Denning's model of information protection and methods of differential-game modeling of the attack on information, which, unlike the existing ones, takes into account the intensity of the offender and the protected party. It allows to estimate the level of insecurity of the information and telecommunication system in the conditions of a priori uncertainty of the input data. The application of the model in practice allows the creation of effective information security systems that will be able to detect potentially dangerous cyber-attacks in the critical infrastructure information and telecommunication system with minimal errors of the first kind.


Sign in / Sign up

Export Citation Format

Share Document