2. data transmission (copy)

studied byStudied by 3 people
4.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 27

28 Terms

1

Packets

data is broken down into packets to be transmitted

New cards
2

Header

  • IP address of sender

  • IP address of receiver

  • sequence number of packets

  • size of packet

New cards
3

Payload

contains the actual data

New cards
4

Trailer

  • method of identifying end of the packet

  • error-checking method

New cards
5

Packet switching

  • data is broken down into packets

  • each packet could take a different route

  • router controls route packet takes

  • packets may arrive out of order

  • packets are reordered at the end

New cards
6

Advantages of packet switching

  • high transmission speed

  • easy to expand package usage

  • possible to overcome busy or failed nodes

  • no need to create a single line of communication

New cards
7

Disadvantages of packet switching

  • packets may be lost

  • prone to errors in real-time streaming

  • delay the the receiver while packets are being reordered

New cards
8

Simplex

one direction only

New cards
9

Half-duplex

both directions, one at a time

New cards
10

Full-duplex

both directions, at the same time

New cards
11

Serial data transmission

  • data is sent one bit at a time over a single wire

  • e.g. telephone lines

New cards
12

Parallel data transmission

data is sent several bits at the same time over several wires

  • e.g. computer to printer

New cards
13

Serial vs. parallel

Serial:

  • better for long distances

  • cheaper

  • used when a small size of data is transmitted

  • slower

Parallel:

  • better for short distances

  • expensive

  • faster

New cards
14

Universal Serial Bus (USB)

asynchronous serial data transmission method

New cards
15

Advantages of USB

  • automatically detected

  • only fits one way, prevents incorrect connections

  • backwards compatible

  • industry-standard

New cards
16

Disadvantages of USB

  • transmission rate less than 120MB/sec

  • maximum cable length is about 5m

New cards
17

Parity checks

  • uses number of 1-bits in a byte

  • LSB is the parity bit

  • two bits may change during transmission so error is not found

  • cannot locate the changed bits (use parity blocks to overcome this)

New cards
18

Checksum

  • sender calculates checksum value using a specific algorithm

  • receiver calculates checksum value using the same algorithm

  • compares checksum value for errors

New cards
19

Echo check

  • receiver sends data back to sender for verification

  • sender compares received and original data for errors

  • cannot tell if error occurred during which transmission

New cards
20

Types of errors during data transmission

New cards
21

Check digits

  • occurs during data entry

  • calculated from all other digits in the data

  • e.g. ISBN 13, Modulo-11

New cards
22

Types of errors during data entry

  • incorrect digit entered

  • transposition errors

  • omitted/extra digits

  • phonetic errors

New cards
23

Automatic Repeat Request (ARQ)

  • uses acknowledgements timeouts to make sure user received the data

  • receiver checks data for any errors, if none is found, a positive acknowledgement is sent

  • if a negative acknowledgement is sent/timeout, data will be re-sent

New cards
24

Encryption

process of converting readable data into unreadable characters to prevent unauthorised access

New cards
25

Plaintext

original text being sent

New cards
26

Ciphertext

text produced after encryption

New cards
27

Symmetric encryption

  • uses an encryption key

  • key used to encrypt and decrypt the encoded message

New cards
28

Asymmetric encryption

  • developed to overcome security problem

  • two keys, public (everyone) and private (sender) key

  • receiver uses public key to encrypt message

  • sender uses private key to decrypt message

New cards
robot