Data Communication and Web 2.0 - Coursework Example

Comments (0) Cite this document
For instance, businesses can use Voice over Internet Protocol (VOIP) technology to save on their international calling costs…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Data Communication and Web 2.0
Read TextPreview

Extract of sample "Data Communication and Web 2.0"

Data Communication and Web 2.0 Key components of data communication Data communication basically refers to data transmission from source to destination. It has five major components, which have been summarized in figure 1 below;
Figure 1: key components of a basic data communication system (Forouzan & Fegan, 2007, p. 4)
This refers to the information to be communicated from the source to the destination, and can be a picture, text, a video or an audio file.
This is the source of information and refers to an electronic device used to send the message. In most cases, devices with computing capabilities are used to accomplish this task.
It refers to the device that receives the sender’s message1.
Transmission medium
It is a channel that facilitates message transmission from the source to destination. It can be a wired channel (Ethernet cables), or wireless (radio frequencies like Bluetooth and Wi-Fi).
It comprises of rules that authoritatively control the communication between the sender and the receiver.
The overall manner that data communication is used to reduce operating costs
Companies use data communication systems to efficiently and effectively communicate with relevant parties, including customers, vendors and partners. For instance, businesses can use Voice over Internet Protocol (VOIP) technology to save on their international calling costs because all calls via the internet are treated as local calls, regardless of their distances (Jacobs, 2013). Besides, VOIP support video conferencing, hence firms hold meetings from their respective locations without travelling and incurring the associated costs.
The use of web 2.0 to improve business operations
To start with, web 2.0 technologies refer to the second generation World Wide Web whose focus is to enable people to share information, collaborate, and interact online. A good example of this platform is twitter.
Firms can use web 2.0 platforms to easily distribute and market their products and services, and at the same time, invite and encourage customers’ feedback and participation in their product development (McKinsey & Company, 2009). This can help them enhance the quality of their products to customers’ expectations and attain a competitive advantage over their competitors.
Firms can also use web 2.0 applications to gain access to external expertise that suit their immediate needs. Take an example of LinkedIn, whereby, a firm’s manager can access a particular person’s professional profile and evaluate his/her qualifications to see whether he/she can be of any value to his/her firm.
Forouzan, B. A., & Fegan, S. C. (2007). Data Communications and Networking. Miami: Huga Media.
Jacobs, G. (2013, February 15). Ways VoIP phones can help businesses reduce communication costs. Retrieved from Shoretel:
McKinsey & Company. (2009). How companies are benefiting from Web 2.0: McKinsey Global Survey results. Mexico City: McKinsey & Company. Read More
Cite this document
  • APA
  • MLA
(“Data Communication and Web 2.0 Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Data Communication and Web 2.0 Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from
(Data Communication and Web 2.0 Coursework Example | Topics and Well Written Essays - 250 Words)
Data Communication and Web 2.0 Coursework Example | Topics and Well Written Essays - 250 Words.
“Data Communication and Web 2.0 Coursework Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Data Communication and Web 2.0

Communication Styles Web Field Trip

...? Communication Styles Web Field Trip Communication Styles Web Field Trip How did you score? Are you surprised by the results? Do you agree with the interpretation of your score? I scored 68 in the Assertiveness Test. I was not really surprised by the results because I know that there are instances where I can be very assertive like making phone calls to government institutions and large corporations, but there are also instances where I lack assertiveness like when I am with a group whose opinions disagree with mine. I agree with the interpretation of the score because it showed that I am not overly aggressive which I think is very true. I also agree that I have some...
1 Pages(250 words)Essay

Data Communication assignment - 4G

...of entertaining multiple users at the same time and brings about more stability and reliability in the network. The use of Fast Fourier Transform (F.F.T) by the incumbent allows increased number of bits being transformed from one source to another (spectral efficiency) .802.16d made use of OFDM while the later version (802.16e) uses OFDMA which enables multiple accesses. The distribution of subcarriers enables all the users to send and receive data simultaneously. MIMO (Multiple Input Multiple Output): The MIMO features allows usage of relatively more number of antennas hence support for increased number of customers on the link as well as increased signal strength, capacity and efficiency .In past many...
4 Pages(1000 words)Essay

Web Portal. Environmental Research Data Management

...from. To effectively achieve the goal of the proposal, it is expected that a number of research questions will be answered. Through the use of research data collection in answering these questions, it is expected that the aim of the proposal will be achieved in the long while. The research questions are given as follows: 1. What are the specific human behaviours that impact on the environment negatively? 2. How can the use of a centralized web portal be used to solve these problems? 3. How can the use of web portals be promoted to reach a wider audience to play the role for which it is implemented? 4. What challenges are likely to be faced in the use of ecological...
4 Pages(1000 words)Essay

Data Communication & the Cloud

... Lecturer: Topic: Data communication is a term used to refer to the exchange of data between two devices that happens via some form of transmission medium, could be a wire cable or internet medium, which are part of a system of the communicating devices made up of a combination of hardware – physical equipment – and software – programs installed on these devices that enable the effectiveness of data communication systems which depend on the characteristics such as delivery, accuracy, timeliness and jitter,1. Delivery system must deliver data to the correct destination and data must be received by the intended device or user and only by that device or user and the accuracy aspect determines the delivery of the data in such a way... that it...
6 Pages(1500 words)Research Paper

Semantic Web + Parallel Distributed data

...where data alteration is done sporadically. Another related research associated to semantic web language includes is the active use of programmes algorithms which focus on the principle of the algorithms comprising of iterating codes over and over each in the design forming a triple pattern in the initial SPARQL query. Subsequently, The World Wide Web Consortium (W3C) has commended and normalized an amount of codes or values, web languages, and programmable web frameworks and the best performances which permit and allow the communication between the numerous metadata into a more understandable format for the next-generation...
4 Pages(1000 words)Research Paper

Data Mining and Web Personalization

... personalization based on web usage mining. Communications of the ACM, 43(8), 142-151. Ouellette, T. (1999). Web personalization. Computerworld. [Electronic Version]. Available: Srivastava, J., Cooley, R., Deshpande, M., & Tan, P.N. (2000). Web usage mining: Discovery and applications of usage patterns from web data. SIGKDD Explorations, 1(2), 12-23. Sullivan, H. (2004). Google loses search tabs, gains web alerts. Search Engine Watch [Electronic Version]. Available: ... Data Mining and Web Personalization College Introduction to Web Personalization Web personalization is a business solution that is becoming more involved as technology advances and consumers...
8 Pages(2000 words)Essay

Web activity 2

...1. What is the Voting-Age Population (VAP) of the United s and Texas? 230,872,030 US 17,756,112 Texas 1. 2. What percent of these individuals would be ineligible to vote due to not being citizens? 8.4% US 13.5% Texas 1. 3. How many individuals currently are serving prison sentences and cannot vote? 1,605,448 US 172,506 Texas 1. 4. How many individuals are currently on probation and not eligible to vote? 427,080 US 2,451,985 Texas 1. 5. How many individuals are on parole and not eligible to vote? 627,680 US 102,921 Texas 1. 6. What is the total ineligible felon figure? 437,507 US 3,144,831 Texas After making the adjustments for felons and noncitizens...
1 Pages(250 words)Research Paper

Business Data Communication and Networking

...should own their specific bandwidths within the communication when they are connected. The company will have the ability to transfer data at the required speed in order to avoid unnecessary data wastage. On the other side, the switching will have a fixed amount of data flow among the computers in the XYZ Company. The only limitation of the circuit switching is that it does not allow the user to use the unused bundles. For the message switching, the connection for the company will not have a physical connection within the users. For the company, the connection will have the two switching technologies and the network will rely on the message technology of switching. The...
6 Pages(1500 words)Term Paper

Data Communication and Networking

... Data Communication and networking 1a) VLAN Hopping VLAN hopping is a method of gaining entry to a network by sending packets to a port that cannot be accessed from an end system. The process occurs through utilization of the autotrunking feature in DTP or through frames that are embedded with double 802.1Q tags in switches. 1b) ARP Poisoning This attack takes place by poisoning/feeding the address resolution protocol by the attackers MAC address. When the attack is successful, the victim devices send all their information to the attacker as they communicate to other devices. 1c) MAC spoofing MAC spoofing entails the process of changing the MAC address of a network card on a certain computer through various techniques. Using... is an...
1 Pages(250 words)Assignment

Big Data vs Semantic Web

...BIG DATA VS SEMANTIC WEB Big Data and Semantic Web Big Data Management Big data has become the face of leading companies since it has been noted to be creating new growth opportunities to the companies. Therefore, the main objective of big data management was to create a system of communication in the business that could help in sharing information to all the organizational stakeholders. Moreover, the information was intended to be relayed in a real time manner and with high frequency and efficiency (Summer School on Reasoning WEB & Koubarakis 2014, p.87). Big data management has created the ability of estimating business metrics including customer confidence. It should be noted that such estimation could not be achieved before... on the...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Data Communication and Web 2.0 for FREE!

Contact Us