Who is writing to whom? What does the audience know, need to know, and want to know? When your audience fails to understand the t
Who is writing to whom? What does the audience know, need to know, and want to know? When your audience fails to understand the text, you have failed to communicate.You are being asked to write two technical descriptions about the same topic, but for different audiences. One description will be directed at novices and the other at experts. As you begin this assignment there are several things you will need to take into consideration. Some of these items include:
- Culture
- Language abilities
- Education
- Income Level
- Interest in product/process/topic
- Knowledge of product/process/topic
Each of the above items will influence the way craft your document. They will influence your tone, word choice, sentence structure, and even sentence length. Remember, one of the most important goals of any technical writing assignment is audience engagement. What engages you?https://www.umuc.edu/writingcenter/writingresources/writing_for_audiences.cfmFor this assignment you will write contrasting technical descriptions. The purpose of this assignment is to give you experience in adapting a piece of technical writing to a specific audience. The assignment consists of two short independent pieces.Choose something that you know a lot about, but which would probably not be familiar to a broad, general audience. It could be anything from an abstract concept, to a technique, a skill, an object, or an activity. (600-900) words
Page 1
Page 1
Page 1
(Name deleted)
IS-365
Art Fifer
2/17/2017
Technical Documents for Varying Audiences
In this paper, I’ll be exploring the differences in presenting technical communications to audiences of varying knowledge. The topic of these two general summaries will be the manner in which computers connect to each other, including summaries of several communication protocols, how information traverses the network, and how it arrives at its destination and is read by the receiving computer. The first summary presented will be addressed to readers who are totally unaware of these concepts, and the second is designed to be a quick review of information for peers in the IT field who already work with computer networks.
COMPUTER NETWORK CONNECTIONS – SIMPLE OVERVIEW
For some, communication between computers may be something of a mystery. You simply connect a computer to your home or work router, put in the Wi-Fi password, and you’ve magically gained access to the World Wide Web and all of its information. What happens during your Internet browsing sessions – how you receive data, how you stream videos via services such as Netflix, and other thoughts- are seemingly too difficult to understand. In this summary, however, I hope to unravel the enigma of Computer Networking’s basic concepts.
Concept 1: Connecting Computers
The first step in understanding communications is to understand how computers are connected. Without delving into too much technical detail, connection is simple – your computer will make contact with (either by Ethernet cables, Fiber Optics, Wireless connection, etc) a router or other device. These allow the two devices to send electrical currents and radio waves, which is vital to communication – without sending currents or radio waves, no communication can be achieved. (Marshall Brian, n.d.) While the specifics of these connections vary (i.e different hardwired connection types such as Ethernet, Fiber Optic, and multiple wireless frequencies), as long as computers link via these methods, networking can be achieved. Computers will send binary bits, either a 1 or 0, by sending an electrical current or pausing, respectively. These 1’s and 0’s translate into information, though its translation is rather complex, so we’ll move onto the next concept.
Concept 2: Packets
Here’s where things start to get more complex than hooking up a cable and sending currents. Although computers send information via bits, there needs to be a pattern to the madness. This takes shape in the form of packets – little packages containing information used to send and receive messages. When you tell your computer to go to www.stevenson.edu , for example, your computer sends many small groups of information out through the router – each packet (much like real life postal mail) has a send and receive address so that routers know where its destination is, allowing it to forward the packet. When the web server receives your packets, it sends you back information containing what you need to construct the website. From here, you can send information back and forth to accomplish tasks like signing up for newsletters, purchasing items off of Amazon.com, etc.
Concept 3: Protocols
Finally, we’ll quickly explain how different packets communicate. There are two major protocols for packets traversing networks:
· TCP
· UDP
The first protocol, “TCP” (Transmission Control Protocol), is described as a “chatty” protocol. This means that every time you send a packet to another machine, the machine acknowledges that it received all packets from you (some may be lost due to various issues). If it did not receive all packets, it informs you, and your machine must resend the missing packet so that your message can be totally complete. This type of protocol is vital when you need communication to be utterly complete, and not miss anything. (i.e emails and other messages – you don’t want part of your email missing when the boss receives it).
The second protocol, UDP (User Datagram Protocol), is far simpler. If you connect to Netflix using TCP, find a show you want to watch, and hit play, you’ll find that your movie is sending its packets to you via UDP, not TCP. UDP is far more efficient than communicating streams than TCP. The reason for this is that UDP, unlike TCP, does not make sure that you receive all packets. Because it’s sending so many packets to you constantly as you watch, it doesn’t have time to resend a missing packet. You’ll notice missing packets when the quality of the picture becomes slightly blocky or it lags momentarily.
Summary
While this still may be hard to grasp, hopefully some of these base concepts will stay with you. Networking is a very complex subject, and thoroughly explaining every detail would be cumbersome and tedious. Thus, this document was designed to present a few base concepts at a (hopefully) understandable level. Remember: information is sent via little packets – much like the mail service – which contain requests of the information you send or receive. The two protocols for sending packets are UDP and TCP – TCP is useful for most connections, as it ensures every bit of data is received by you. As UDP doesn’t ask to make sure you received the information, it’s useful for streaming and other similar uses.
COMPUTER NETWORK CONNECTIONS – PEER OVERVIEW
In this summary, I’ll be reviewing the basic fundamentals of Networking, as a simple refresher for troubleshooting in the workplace.
Bits and Binary
Connecting your machine is possible via one of many cable types or wireless connections. Some common methods of connections are:
· Coaxial Cable
· Twisted Pair
· Fiber Optic
· 802.11 Wireless Connection
Once you’ve connected your machine to a router or another machine via one of these methods, your computer will begin transmitting by an electrical current or radio waves to send bits to the receiving machine, which are then formed into information for the receiving machine. These signals are either “on” or “off,” depending on whether the machine receives a signal or a pause during the message. Of course, these are translated to binary digits – 1’s and 0’s, to create the information. Packets
When sending information across the network, information is formed into packets. These packets include the destination and source IP Addresses within its header, and the information deeper inside. While traversing the network, routers will only check the source and destination addresses, as the information inside is irrelevant to the router itself. Once the packet arrives at the destination, the receiving machine peels off the OSI layers of the packet, and reads the information within. These packets’ headers and processes vary depending on the protocol of the packet itself.
Protocols
The main two protocols should be familiar – TCP and UDP. TCP, or Transmission Control Protocol, is used for most communication across the internet. It’s a connection-oriented protocol, which beings its communications via the “Three-way Handshake” (Syn, Syn-Ack, Ack). Once communication has been established, TCP will ensure that no packet is missing, because if it is, information vital to the message will be missing. UDP, on the other hand, is a connectionless protocol, meaning it’s of little consequence whether the receiving device gets every single packet. UDP will not check with the machine, and will continue sending its own information to the receiver. As such, it’s extremely useful for streaming services and anything of similar nature.
Bibliography
Marshall Brian, T. W. (n.d.). How WiFi Works. Retrieved from HowStuffWorks:
http://computer.howstuffworks.com/wireless-network1.htm
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.