0% found this document useful (0 votes)
71 views14 pages

Revision Notes - 23 Data Transmission Technologies PDF

This document discusses data transmission technologies. It describes three factors that affect data transmission: direction, method of transmission, and method of synchronization. Transmissions are classified as simplex, half-duplex, or full-duplex depending on direction, and serial or parallel depending on the method of transmission. The methods of synchronization are asynchronous and synchronous. Error-checking methods like parity checking, automatic repeat request, and checksum are also summarized.

Uploaded by

demira lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views14 pages

Revision Notes - 23 Data Transmission Technologies PDF

This document discusses data transmission technologies. It describes three factors that affect data transmission: direction, method of transmission, and method of synchronization. Transmissions are classified as simplex, half-duplex, or full-duplex depending on direction, and serial or parallel depending on the method of transmission. The methods of synchronization are asynchronous and synchronous. Error-checking methods like parity checking, automatic repeat request, and checksum are also summarized.

Uploaded by

demira lal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Science

Waqar Ghori
Data transmission
technologies

1.
Waqar Ghori
Revision notes
Introduction
Data transmission technologies allow users to transmit data from one
point to other. Data transmission can be over short distances, for
example, from a CPU to a monitor for displaying information. Data is
also transmitted over long distances, for example, from a satellite
back to Earth. For error-free transmission of data between the sender
and receiver, three factors are to be considered: Direction of
transmission, method of transmission and method of
synchronization.

Waqar Ghori
Figure 1: Factors affecting data transmission

Classification of
transmission Transmissions are classified as
shown in the following table:

Factor Classification of transmission


Direction Simplex, half-duplex and
full duplex transmission

Method of Serial and parallel transmission


transmission

Method of synchronous transmission


synchronization
Asynchronous and

• Simplex, half-duplex and full-duplex transmission


In simplex transmission, data is transferred in one direction only. For
example, data is sent from a CPU to a monitor, broadcasting radio
programmes, etc.

In half-duplex transmissions, data can be transferred in both


directions but one at a time. For example, a walkie-talkie.

In full-duplex transmissions, data can be transferred in both


directions simultaneously. For example, mobile phone

communication in which both parties can send and hear at the same
time.
Waqar Ghori
Figure 2: Types of transmission

• Serial and parallel data transmission


In serial data transmission, one bit is sent at a time over a single
channel. Data is transmitted as a stream of bits. This transmission is
well-suited for long-distance communication but the speed of the
transmission is lower, as only one channel is used. There is no need
for data synchronization as the bits are sent in a single stream. USB
(Universal Serial Bus) is a common example of serial data
transmission. Data to and from the computer is transferred to flash
drives using USB technology.

Figure 3: Serial data transmission


In parallel data transmission, several bits are sent at a time over
multiple channels. For each bit, one channel is used. Parallel
Waqar Ghori
transmission is faster than serial transmission, as multiple channels
are used. This type of transmission is used in the transfer of data
between the internal components of a computer because of high
data-transfer speed. 8-bit, 16-bit, 32-bit and 64-bit data buses are
used. An internal timer synchronizes the data in different channels. A
printer connection to a computer using a ribbon connector is an
example of parallel data transmission.

Figure 4: Parallel data transmission

• Asynchronous and Synchronous data transmission


In asynchronous data transmissions, the data is sent in groups in an
agreed bit pattern. The grouped data starts with a control bit called a
start bit. The grouped data ends with a control bit called a stop bit.
USB data transmission is an example of this data transmission.
Start 1 0 1 1 1 0 1 0 1 1 1 1 0 1 0 0 Stop
bit bit

A receiver is notified about the control bits prior to the transmission.


Once the grouped bits are received, using the control bits, it can
separate the data.

synchronous data transmission sends data as a stream of bits. The


data also contains timing signals that are generated by an internal
clock. The sender and receiver are synchronized with each other
using timing signals. Timing signals play an important role as there
are no control bits.

The receiver counts the number of bits received and converts them

Waqar Ghori

into bytes. This method is faster when compared to asynchronous


transmission. This type of transmission is widely used in network
communications.

Universal Serial Bus


Universal Serial Bus (USB) implements the asynchronous data
transmission method. This establishes the industrial standards for
cables, connectors and transmission protocol between computers
and their peripherals.

A USB device has four pins. Two pins are responsible for connecting
wires, which carry the power and ground connection. The two other
pins connect the wires that transmit data. Hence, the cable used to
connect two USB ports is a four-wire shielded cable.

Figure 4: Universal Serial Bus (USB)


When a USB device is connected to the computer:
Step 1: The device is detected by the computer due to the small
change in voltage in the data lines.
Step 2: The speed of the device is determined by the computer. The
type of device and its configuration are also determined.

Step 3: Once the device is identified by the computer, the computer


loads the appropriate driver to communicate with the device
effectively.

Step 4: In cases where the device driver is not available, the computer
prompts the user to install the required driver.

Waqar Ghori
The benefits of USB data transmission are:

• Once the device is plugged in, the device drivers are installed
automatically. A USB interface is self-configuring.

• The connectors can be connected in a particular manner only. This


property makes sure that the user does not connect it in an
incorrect manner.

• Several data transmission rates are supported.


• Newer USB connectors are compatible with the older USB
standards.

• USB connectors are widely used for charging the batteries of


portable devices.

Error-checking methods
When data is transmitted through a channel, it could get corrupted or
changed. Hence, it’s very important to implement error-checking
methods in computer technology. These methods are used to detect
and correct errors. These methods are discussed in detail

below. • Parity checking


Parity checking uses a parity bit in each byte of data. This bit is
allocated before transmission. An even parity has an even number of
bit 1s in a byte. An odd parity has an odd number of bit 1s in a byte.
Systems may use even or odd parity.
The sender and receiver make an agreement prior to the
transmission about the type of parity.

Even parity 1

Odd parity 0 1010111

Parity bit
Data

In the above data, there are 5 bits of 1. Hence, to make the number of
1 bits even, parity bit is assigned bit 1. The number of bits is odd and
hence, the parity bit in odd parity is 0.

Waqar Ghori
Let us consider the following byte of data, which uses even parity,
received by a receiver.

10101110

Parity bit Data

The number of bit 1s is 5 and this indicates transmission error. Some


bits have changed during transmission. A receiver cannot find the
exact location of the error.

To find the exact location of the bit changed, a block of data is sent.
The parity is checked both horizontally and vertically.

• Automatic Repeat Request (ARQ)


Automatic Repeat Request is another method used for error-checking
in which ACKNOWLEDGEMENT and TIMEOUT are used.
ACKNOWLEDGEMENT is a message sent by the receiver to the sender
indicating that the data has been received correctly. TIMEOUT is the
time allowed to elapse before an acknowledgement is received. If the
ACKNOWLEDGEMENT is not received within the TIMEOUT, the
message is automatically resent.
Consider the following block of data with even parity received at the
receiver side.
y bit Bit 2 Bit 4 Bit 6
Parit Bit 1 Bit 3 Bit 5 Bit 7

Byte 1 1 1 0 1 1 0 1 1
Byte 2 1 1 1 1 0 1 1 0
Byte 3 0 0 1 0 0 1 1 1
Byte 4 1 0 1 1 0 0 1 0
Byte 5 1 1 1 1 0 1 1 0
Byte 6 0 1 0 1 1 0 1
1
i
Byte 7 1 0 0 1 0 1 0 1

r
Byte 8 1 1 0 0 1 1 1 1

o
Byte 9 0 1 1 1 1 0 1
1
h
Waqar G
Parity

byte 0 0 1 0 0 0 1 0

The parity is checked at the receiver side in case a particular bit has
changed in transmission. When carefully observed, it can be noted
that row 6 and column 3 has incorrect parity. Byte 6 can be
automatically corrected to be 01001011 or an error message could be
sent to the sender. If two bits changed during transmission, it could
be impossible to locate the error.

• Checksum
A value called a checksum is attached to the end of the block of data.
This value can indicate transmission errors.
The following method describes the checksum of a block of
data: Checksum = the sum of all digits, if the sum of all digits ≤
255.

If the sum of all digits > 255, the checksum is found according to the
following algorithm:

i. Divide the sum X by 256.


ii. Round down to the nearest whole number, Y.

Waqar Ghori
iii. Multiply Y by 256 and denote this number by Z.
iv. The difference (X-Z) is the checksum generated.
For example:
Let us calculate the checksum of a number with a byte sum

905. i. ���� = 905 ������������ 905


256= 3.5351 …
ii. Rounding down, ���� = 3
iii. ���� = 3 × 256 = 768
iv. ���� − ���� = 905 − 768 = 137
v. Checksum=137
The sender transmits the block of data with checksum. When received
at the receiver end, the checksum of the block of data is calculated. If
the calculated checksum is equal to the checksum transmitted by
sender, then there are no transmission errors. If both the checksums
are not equal, the sender is request to resend the data.

• Echo check
In this method, the data is sent from the sender to the receiver and
the data received is sent back to the sender. The sender compares
the two sets of data for transmission errors. This method is not very
reliable because it cannot be decided in which transmission the data
was corrupted. An error-free echo check would prove that no data
has changed or been corrupted.

2.
Waqar Ghori
Activities
Activity-1
Duration: 10 minutes

1. Find out the location of error in the following block of data received
by the user if odd parity was used.
y bit Bit 2 Bit 4 Bit 6
Parit Bit 1 Bit 3 Bit 5 Bit 7

Byte 1 1 1 0 1 1 0 0 1
Byte 2 1 1 1 0 0 0 1 1
Byte 3 0 1 0 1 0 1 1 1
Byte 4 1 0 1 0 1 0 1
0

Byte 5 0 1 1 1 0 0 0 0

r
Byte 6 1 1 0 0 0 1 1

o
Byte 7 0 1 0 0 1 0 1 0

h
Byte 8 0 1 1 1 0 0 0

G
Byte 9 1 1 0 0 0 0 0
1

r
Waqa
Parity

byte 0 1 1 1 1 1 0 0

Activity-2
Duration: 10 minutes

1. Calculate the checksum of a number with a byte sum 201. Show


your working in this box.

Waqar Ghori
2. Calculate the checksum of a number with a byte sum 1183.

3.
Waqar Ghori
End of topic
questions
End of topic questions
1. Based on what factors is data transmission classified?
2. What are the differences between serial and parallel data
transmission?
3. How do the sender and receiver notify each other in asynchronous
data transmission?

4. How do the sender and receiver notify each other in synchronous


data transmission?

Waqar Ghori
5. What are the functions of pins in the USB port?
6. What happens when a USB device is plugged into the computer?
Write down the various steps.

7. How does the echo check method ensure that the data received is
error free?

You might also like