1.Explain what is synchronous and asynchronous tranmission and give examples of each synchronous and asynchronous tranmission.
2. Explain what is ASCII and UniCode encoding system.
3. Explain the business model of B2B, B2C, C2B and C2C.
1.There are two mechanisms that can be used for the transmission of data signals in computing technology viz. synchronous and asynchronous modes of transmission.
Synchronous transmission is defined as the mechanism of data transfer that involves a regular and continuous data stream along with regular timing signals. The transmission is given shape by external clocking system to make sure that the data sender and the receiver of the data are in complete sync. In this method of transmission, the data is transmitted in the form of data packets or frames in regular and fixed intervals. The number of input and output rows is the same in this form of transmission. There are multiple bytes of data that are transmitted simultaneously in this case and there are no start or stop bits involved (Moallem, 2015). There is no gap present in between the data bits and the speed of data transmission is fast.
The figure shown above illustrated the flow of data frames using synchronous mode of transmission between the sender and the receiver.
One of the prominent examples of synchronous transmission is the address bus in a computer. It is used to transmit and share the information of the addresses within a computer for storage and retrieval of the address spaces.
The second mode of transmission of the data signals is asynchronous transmission. It is also referred as start-stop mode of transmission as there is a start and a stop bit involved in the transmission of the data between a sender and a receiver. The data in this case is generated at random and non-fixed intervals. In asynchronous mode of transmission, the data signal remains idle for enhanced periods of time between the characters. The receiver in this case shall have the ability to resynchronize at the beginning of every new character that is received. Encapsulation of the data byte or character takes place for the purpose of resynchronization and it takes place between an extra start bit and one or more than one stop bits (Sqa, 2018).
The number of input and output rows is not the same in this form of transmission. There is a single byte of data that is transmitted at a particular instance in this case and there are start and stop bits involved for transmission. There is also a gap present in between the data bits and the speed of data transmission is slow as compared to the synchronous transmission. It is however cheaper than synchronous mode of transmission and is preferred in low speed connections and transmissions.
The figure above illustrates the mechanism that is involved in asynchronous mode of transmission. There is a start and a stop bit involved before and after every character that is transmitted (Giesbers et al., 2013).
One of the prominent example of asynchronous transmission is Asynchronous Transfer Mode (ATM) switching. It allows the transmission of audio/video, and data in cells of fixed length that are kept at 53 bytes.
There are specific numeric codes that are used to represent characters in a computer system. There are various standards that have been developed for the same and one of the widely used codes is termed as American Standard Code for Information Interchange, popularly referred as ASCII. There is an integer value defined for every symbol in these codes, for example, special characters, alphabets, numbers, and likewise. There are 128 characters that are included in the ASCII tables and these are numbered from 0 to 127. 7 bits are usually enough for the character representation in ASCII; however an additional bit is reserved in most of the computer systems.
The code values for the upper case characters starts with 65 and ends at 90. For example, A has an equivalent code as 65, B as 66 and so on. The code values for lower case alphabets start at 97 and ends at 122. It is also in the increasing order with the code value for a as 97. The code value for the digits starts with 48 for 0, 49 for 1 and so on (Asu, 2018).
The code table for ASCII codes is as illustrated below.
ASCII Codes
These codes provide every character with the capability to be denoted by a unique number which can be easily transformed in a binary form. In this manner, the text files can be easily standardised so that they may be compatible with a large number of computer systems and applications. It includes 128 binary patterns for character representation of 128 different characters.
Unicode Encoding System
Characters are stored in numerical forms in the computer system so that they can be processed easily. These numerical forms are nothing but different sequences of bits. Unicode is an encoding standard that brings together all the varied representation schemes and formats on one platform and stands for Universal text-encoding standard.
The encoding system provides codes for 96,447 characters and is platform and language-independent. Universal Character Set (UCS) is the encoding system as defined under Unicode encoding system and the two most popular schemes used are UCS-2 and UCS-4 that involve the sequences of 2 and 4 bytes respectively. There is also an encoding scheme included for the older systems in the form of Unicode Transformation Format (UTF). These include UTF-8, UTF-16, and so on that involve 8 bits and 16 bits respectively (Gulzar, 2018).
There are multiple advantages that are offered by Unicode encoding system, such as worldwide exchange of text in any language, convenient conversion of legacy text, lesser time for processing and reduced development and support costs.
Whenever an application component involves Unicode as the encoding system, the effort required for application development also reduced. This is because of the reason that a single code page is involved for the reading and writing of all the character data that is used in the application.
Unicode has emerged as the universal coding standard that is being used on the web. The current web standards rely upon the same encoding scheme.
Business-to-Business (B2B) is a model that involves two businesses as the primary entities and the business transactions are carried out between these entities. These may involve a transaction between a supplier and a wholesaler or between a wholesaler and a retailer and so on.
B2B model of e-commerce allows two business entities to carry out business transactions and activities between each other. For instance, the execution of business transactions between a wholesaler of sports goods and the retailer of such goods is an example of B2B model (Uop. 2008).
B2B Model
A B2B Model between a business organization and a wholesaler has been illustrated in the figure shown above. There is a platform that is required to allow the business transactions to take place in such cases, such as a web site or a mobile application.
Business-to-Consumer (B2C) Model
Business-to-Consumer (B2C) is the model in which the transaction takes place between a business organization or an entity and the customers.
B2C Model
The figure illustrated above shows the B2C model in which a customer places an order on the website which is then processed by the business organization. The placement of the order is done on the basis of the products available in the products catalogue on the web platform. The varied modes of payment are also integrated on the web platform that is chosen by the business organization (Wali, Uduma and Wright, 2016). The customer is then provided with the supplies as per the contents included in the order.
E-commerce industries make use of the B2C model to provide the customers with the supplies as per their requirement. This model is also used for marketing and advertising activities over the internet.
Consumer-to-Business (C2B) Model
Consumer-to-Business (C2B) is an e-commerce model that is the opposite of B2C model as described in the section above. It is the model that provides the businesses with the ability to extract value from the consumers. The consumers in this case play the role of the supplier and the businesses make use of the supplies that are provided by the consumers.
C2B Model
The C2B model has been illustrated in the figure above wherein the business organization processes a particular order and the customer places money for the service that is requested.
For instance, fee-based opportunities by the consumers to market the business products on the blog of the consumer are an example of C2B model (Ding, 2016).
Consumer-to-Consumer (C2C) Model
Consumer-to-Consumer (C2C) is a model in which the transactions take place between two consumers. The transactions of the products or the services take place between two consumers.
C2C Model
The figure shown above illustrates the C2C model in which a customer wishes to sell the products on a website and another customer wishes to buy the same. The transactions take place between the two customers on the basis of this model. One of the consumer acts as a supplier in this case and another consumer makes use of the services, products or values that are supplied (Habib, 2017).
The online marketplace, such as e-Bay is an example of a C2C as well as B2C model
References
Asu (2018). The ASCII Character Set. [online] Plato.asu.edu. Available at: https://plato.asu.edu/MAT420/beginning_perl/3145_AppF.pdf [Accessed 30 Jan. 2018].
Ding, Z. (2016). The Present and Future of C2B ECommerce in China. [online] Theseus.fi. Available at: https://www.theseus.fi/bitstream/handle/10024/113895/Ding_Zhuqing.pdf?sequence=1 [Accessed 30 Jan. 2018].
Giesbers, B., Rienties, B., Tempelaar, D. and Gijselaers, W. (2013). A dynamic analysis of the interplay between asynchronous and synchronous communication in online learning: The impact of motivation. Journal of Computer Assisted Learning, 30(1), pp.30-50.
Gulzar, A. (2018). Introduction to Unicode. [online] Panl10n.net. Available at: https://www.panl10n.net/Presentations/Afghanistan/Unicode.pdf [Accessed 30 Jan. 2018].
Habib, S. (2017). C2C (Consumer to Consumer) E-commerce Performance Improvement. IARJSET, 4(2), pp.92-93.
Moallem, M. (2015). The Impact Of Synchronous And Asynchronous Communication Tools On Learner Self-Regulation, Social Presence, Immediacy, Intimacy And Satisfaction In Collaborative Online Learning. [online] Tojdel.net. Available at: https://www.tojdel.net/journals/tojdel/articles/v03i03/v03i03-08.pdf [Accessed 30 Jan. 2018].
Sqa (2018). Asynchronous and Synchronous Transmission. [online] Sqa.org.uk. Available at: https://www.sqa.org.uk/e-learning/NetTechDC01BCD/page_39.htm [Accessed 30 Jan. 2018].
Uop (2008). Business-to-Business E-Commerce Basics. [online] Available at: https://www.uop.edu.jo/download/Research/members/b2b_basics.pdf [Accessed 30 Jan. 2018].
Wali, A., Uduma, I. and Wright, L. (2016). Customer relationship management (CRM) experiences of Business-to-Business (B2B) marketing firms: A qualitative study. Cogent Business & Management, 3(1
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download