Computer Science Chapter 2 - Data Transmission

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Data packets

Header

Payload

Trailer

2
New cards

Header

contains IP address of sender and receiver

contains sequence number of packet

contains size of packet

3
New cards

payload

contains actual data

4
New cards

trailer

contains method of identifying the end of the packet

contains error-checking methods

5
New cards

packet switching

  • Data is broken down into packets

  • Each packet could take a different route

  • Router controls route a packet takes

  • Packets may arrive out of order

  • Packets are reordered once last packet arrives

6
New cards

serial data transmission

  • data sent one bit at a time over a single wire

  • better for longer distances

  • Slower but cheaper

  • Used when transmitting small sized datas

  • data does not become skewed

7
New cards

Parallel data transmission

  • data of several bits are sent down several wires at the same time

  • better for short distances

  • expensive but faster than serial

  • data could be skewed

8
New cards

universal serial bus(USB) advantages and disadvantages

-only fits one way, prevents incorrect connections

-Industry standard

-limited cable length

9
New cards

reasons errors occur after data transmission

can occur due to interference (data loss, data gain or data change)

10
New cards

odd or even parity check

uses number of 1-bits in a byte, left most bit is parity bit, amount of ones in a byte is equal to if it’s odd or even parity check.

if two bits change during transmission, no error is detected

doesn’t identify changed bits

11
New cards

checksum

value calculated using specific algorithm by sender, receiver would calculate checksum value with same set of data and same algorithm. If values don’t match, request is sent to re-send data

12
New cards

echo check

data send back from receiver to sender for verification, sender compare received and original data for errors

doesn’t know if error occured during or after transmission

13
New cards

automatic repeat query

  • uses acknowledgements and timeouts to make sure user received data

  • receiver checks data for errors, positive acknowledgement is sent if no error

  • negative acknowledgement will be sent if errors were found and data will be sent again

  • sender uses timeouts to wait a pre-determined amount, if no acknowledgement after timeout data will be sent again

14
New cards

purpose of encryption

making data non-sensical and incomprehensible to hackers and other attackers

15
New cards

symmetric encryption

uses same key for encrypting and drcypting data

16
New cards

asymmetric encryption

uses public key(accessible to everyone) and private key(available to user)

receiver has private key, they send public key to sender. Sender encrypts message with public key and data can be decrypted using private key