2 Data transmission

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

What is data broken down into to be transmitted?

packets

2
New cards

What is the structure of a packet?

packet header, payload, trailer

3
New cards

What does the packet header have?

destination address, packet number, originator’s address

4
New cards

What does the payload have?

the actual data

5
New cards

What does the trailer have?

a method of identifying end of the packet, error checking method

6
New cards

Describe the process of packet switching

1) Data is broken down into packets

2) Each packet could take a different route

3) A router controls the route a packet takes

4) Packets may arrive out of order

5) Once the last packet has arrived, packets are reordered

6) If the packet is missing/corrupted, it is requested again

7
New cards

Draw the process of packet switching

knowt flashcard image
8
New cards

Advantages of packet switching

-there is no need to tie up a single communication line

-can overcome failed or busy nodes

-high data transmission speed

-easy to expand package usage

9
New cards

Disadvantages of packet switching

-packets may be lost and need resending

-method is more prone to errors

-delay at destination as packets need to be reordered

10
New cards

What is the time to live value?

the maximum amount of time a packet can stay on a network before it is delivered, and this is measured in hops ( a hop is the number of routers a packet moves across before getting to its destination computer)

11
New cards

What is the method to stop lost packets from clogging up a network and how does it work?

Hopping is used.

-a hop number is added to the packet number

-this number is reduced by 1 every time the packet leaves a router

-once a hop number reaches 0 and the packet isn’t at destination, the packet is deleted

-the missing packet will be flagged by receiving computer and a request to re-send packet will be made

12
New cards

What are the 2 methods of data transmission?

serial transmission and parallel transmission

13
New cards

What is serial data transmission?

Data is sent one bit at a time over a single wire

14
New cards

Advantages of serial data transmission

-reliable over long distances

-data arrives in order

-less likely to experience interface

-less likely to have errors

-cheaper as only one wire is required

15
New cards

Disadvantages of serial data transmission

-slow transmission

-not suitable for large amounts of data

16
New cards

What is parallel data transmission?

Data is sent several bits at a time simultaneously over several and separate wires

17
New cards

Advantages of parallel data transmission

-fast transmission

-good for short distances

18
New cards

Disadvantages of parallel data transmission

-unreliable over long distances (data can become skewed)

-bits arrives out of order

-more expensive as there are multiple wires

19
New cards

What are the 3 transmission modes?

simplex data transmission, half-duplex data transmission, full-duplex data transmission

20
New cards

What is simplex data transmission?

Data can be sent in one direction only

21
New cards

Advantages and disadvantages of simplex data transmission

Advantages:

-no traffic issues

Disadvantages:

-slow

-2 devices can’t communicate

22
New cards

What is half-duplex data transmission?

Data can be sent in both directions but not at the same time

23
New cards

Advantages and disadvantages of half-duplex data transmission

Advantages:

-2 devices can communicate

-troubleshooting is easy

Disadvantages:

-slow

-delay in data transmission

24
New cards

What is full-duplex data transmission?

Data can be sent in both directions simultaneously

25
New cards

Advantages and disadvantages of full-duplex data transmission

Advantages:

-fast

-best performance

-no delay

Disadvantages:

-requires more bandwidth

26
New cards

What is the Universal Serial Bus (USB)?

a form of serial data transmission, its an interface connecting devices to a computer over a reasonably short distance via USB cable

27
New cards

What does the USB cable consist of?

-Two wires for power (red and black)

-Two wires for data transmission (white and green)

28
New cards

What happens when a device is plugged into a computer using a USB port/

1) the computer automatically detects that a device is present

2) the device is automatically recognised and the appropriate device driver software is loaded up

3)the computer and device can communicate

29
New cards

Benefits of USB

-industry-standard/universal

-automatically detected

-only fit one way (prevents incorrect connections)

-supports different data transmission rates

-can transfer power and data

-backwards compatible(older versions are still supported)

30
New cards

Drawbacks of USB

-maximum cable length is 5m

-early USB standards may nit be supported by latest computers

-multiple connectors so device needs the right cable

31
New cards

How can errors occur during data transmission?

interference, problems during packet switching, skewing of data

32
New cards

What can errors lead to?

data loss, data gain, data change

33
New cards

Name error detection methods

parity checks, parity blocks, checksum, echo check, check digits, automatic repeat query

34
New cards

What is a parity check?

A method of checking whether a byte has been sent correctly by checking whether the total number of 1s in the byte is odd or even

35
New cards

What does even parity check and how does it work?

Checks if there is an even number of 1-bits in the byte

1) the number of 1s are counted

2) a parity bit (0 or 1) is added to each byte before transmission to make the sum of the bits even

3) after transmission, if the number is even, no error has occurred

4)after transmission, if the number is odd, an error is detected

36
New cards

What does odd parity check and how does it work?

Checks if there is an odd number of 1-bits in the byte

1) the number of 1s are counted

2) a parity bit (0 or 1) is added to each byte before transmission to make the sum of the bits odd

3) after transmission, if the number is odd, no error has occurred

4)after transmission, if the number is even, an error is detected

37
New cards

What are limitations of parity checks?

-transposition errors is when bits position switches but still results in even/odd amounts passing the check (two bits change)

-can’t identify location/which bit was corrupted

38
New cards

How to overcome limitations of parity checks?

parity blocks

39
New cards

What is a parity block?

horizontal and vertical parity check on a block of data being transmitted

40
New cards

Why can parity blocks detect errors the parity bits can’t?

it identifies the horizontal and vertical position of all changes

41
New cards

What is a checksum?

A method of error detection using compared calculations performed on data when sending and when receiving

42
New cards

How does a checksum work?

1) data is sent in blocks together with a calculated value known as the checksum

2) the receiving computer will perform the same calculation on the data to regenerate the checksum

3) the two checksum values are compared

4) if there is a mismatch, then an error has occurred, and the receiving computer will request the sending computer to resend the data. This process is repeated until the correct data is received.

43
New cards

How to calculate the checksum?

1) If the sums of the bytes is less than or equal to 255 then this value is the checksum

1) If the sums of the bytes is more than 255 then:

-Divide sum of bytes by 256

-Round down to integer

-Multiply by 256

-Subtract number from sum of bytes

44
New cards

What is an echo check?

A method of error detection where the receiving computer sends the full data back to the sending computer, and the sending computer compares against what it originally sent

45
New cards

How does an echo check work?

1) sending computer sends data

2) receiving computer receives data sends back an exact copy to the sending computer

3) sending computer compares the returned data with the original

4) If they match, the data was sent with no errors

If they don’t match, an error has occurred

46
New cards

Disadvantages of echo checks

-can’t tell if data was corrupted during transit to destination or the way back

-slow since dats has to be sent twice

47
New cards

What is a check digit?

A check digit is an extra digit added to a number that can be calculated from the other digits in the number. it is the last digit of the code.

48
New cards

What are check digits used for?

Barcodes such as the ISBN and VIN

49
New cards

How to calculate check digit?

1) Put all digits except the last one into a table

2) Give it a multiplier, repeating 1 and 3

3) Multiply multiplier with original digit

4) Add all digits after multiply together

5) Round down to integer

6) Find difference between 4) and 5)

<p>1) Put all digits except the last one into a table</p><p>2) Give it a multiplier, repeating 1 and 3</p><p>3) Multiply multiplier with original digit</p><p>4) Add all digits after multiply together</p><p>5) Round down to integer</p><p>6) Find difference between 4) and 5)</p>
50
New cards

What is an automatic repeat request (ARQ)?

A set of rules used for error control during transmission.

51
New cards

How does an ARQ work?

1) receiving device receives an error detection code as part of the data transmission

2) it sends a message back to the sending device known as acknowledgements (ACK) to indicate whether transmission was successful

3) Positive ACK is sent if no errors were detected

Negative ACK is sent if an error was detected and requests re-transmission of dat

4) This process is repeated until receives the complete packet or until time out

52
New cards

What is time-out?

53
New cards

What is encryption?

the process of making data meaningless using encryption keys without correct decryption key the data can not be decoded.

54
New cards

What is the need of encryption?

prevents data from being understood not stolen

55
New cards

What is used to encrypt data?

an encryption algorithm that only people with the same algorithm can decrypt

56
New cards

What is plain text?

text that is not encrypted.

57
New cards

What is cipher text?

text that has been encrypted.

58
New cards

What is symmetric encryption?

uses the same key to encrypt and decrypt data

59
New cards

How does symmetric encryption work?

1) sending computer sends encrypted message and the key separately

2) receiving computer uses key to decrypt message

60
New cards

Disadvantages of symmetric encryption

Difficult to keep encryption key a secret: if a malicious user intercepts the key, they can read the message

61
New cards

What is asymmetric encryption?

two separate keys are used. one key is used for encryption and the other key is used for decryption.

62
New cards

What are the two keys in asymmetric encryption?

Public key- available to all computers that want to exchange an encrypted message, used to encrypt

Private key- only known to the computer user, used to decrypt

63
New cards

How does asymmetric encryption work? (with Alex & Michael)

1) Alex uses an algorithm to generate a matching pairs of keys (private and public) that is stored in his computer

2) Alex sends his public key to Michael

3) Michael uses Alex’s private key to encrypt the document he wants to send to Alex

4) Michael sends his encrypted document back to Alex

5) Alex uses his private key to decrypt it