Data Transmission
Data Transmission
Figure 2: Packets take different routes across a network from the source address to
reach the destination address as shown by the green, blue and red routes taken
Worked Example
A local market shop wishes to arrange a delivery of goods from a supplier. Anna, the
shop owner, decides to send an email to request the delivery of the goods at a certain
date and time.
Describe how packet switching is used to send this email and how it can be protected
from corruption. [8]
Answer:
The business email is first broken down into packets which are given a source
address (where its come from) and a destination address (where its going to) [1
mark]
Each packet receives a packet number so that the email can be reassembled
when it reaches its destination [1 mark]
Each packet also receives an error check such as a parity bit. A parity bit checks
whether any bits have been flipped due to corruption [1 mark]
Each packet is sent over the internet via routers. Routers contain routing tables
that determine the next closest router to the destination [1 mark]
Packets may take different routes depending on internet traffic and arrive at their
destination in any order [1 mark]
Packets are checked for errors using the error checks and missing packets can be
requested to be resent [1 mark]
Once all packets have been received then they can be put together in order using
the packet numbers [1 mark]
Once assembled the original email can be read by the other business [1 mark]
Exam Tip
For high marks make sure your answer is coherent, that is it follows logically from one
point to the next. Some marks depend on previous points you have made. Explaining
parity bits without mentioning error checking first may not gain you additional marks
Data Transmission
Wired connections
o Parallel
Multiple bits are sent at a time across several wires.
Transmission is asynchronous as some bits may
arrive quicker than others. This is known
as skewing or skewed data.
Asynchronous transmission means data does not always
arrive at the same time
Figure 2: A sender sends a stream of bits in sequence, one after the other across
multiple wires at the same time
o Simplex
Simplex transmissions are unidirectional and travel in only one
direction
o Half-duplex
Half-duplex transmissions are bidirectional i.e. can travel in both
directions, but not simultaneously!
o Full-duplex
Full-duplex transmissions are bidirectional but can transmit signals
in both directions at the same time
Wires can be combinations of serial, parallel, simplex, half-duplex and full-duplex
o Serial-Simplex
Data is transmitted one bit at a time in a single direction on one wire
o Serial-Half-duplex
Data can be transmitted in both directions on a single wire but
only one bit at a time can be transmitted in one direction at a time
o Serial-Full-duplex
Data can be transmitted in both directions at the same time on
a single wire one bit at a time
o Parallel-Simplex
Multiple wires transmit one bit at a time in one direction
o Parallel-Half-duplex
Multiple wires send multiple bits of data in both directions but only
one direction at a time
o Parallel-Full-duplex
Multiple wires send multiple bits of data in both directions at
the same time
Advantages Disadvantages
Simplex Simplex wires are cheap as only Data transmission is slow as data still
one wire is used travels one bit at a time in only one
direction at a time
Serial
o Connecting an external hard drive to a computer
o Transmitting data over a telephone line
Parallel
o Transmitting data from a computer to a printer using a multi-wire
connector
Simplex
o Transmitting data from a computer to a printer. The printer doesn’t need
to send data back to the computer
Modern versions of devices such as printers may send
acknowledgement signals to confirm they have received the data.
This may require half-duplex rather than simplex connections
Half-duplex
o Phone conversations where only one person needs to speak at a time
o A walkie-talkie is a two way radio with a push to speak button. The
receiver is turned off while the transmitter is turned on. This prevents you
from hearing the other person while you speak
Full-duplex
o Broadband connections to the internet. Data must be sent and received at
the same time. Accessing information on the internet is known as
downloading information. Putting information onto the internet for others
to access is known as uploading
o Phone conversations where both people can talk and be heard at the same
time allowing them to interrupt each other
Worked Example
A company has a website that is stored on a web server
The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.
Explain why parallel half-duplex data transmission is the most appropriate method.[6]
Answer:
Exam Tip
1. Any four of these points qualifies as a full answer however make sure your answer
is cohesive. Saying “Parallel would allow for the fastest transmission but this does
not have to be at the same time” would qualify as one mark as only the first part
makes sense and follows logically
2. When given context in the question, for example a web server that stores a
website, your answer must make reference to this. Mark scheme answers such as
“can be uploaded and downloaded” do not make sense without this context. You
could lose marks by misreading the question and not providing a relevant answer
USB
Advantages Disadvantages
Devices are automatically
The maximum cable length is roughly 5
detected and drivers are automatically
metres meaning it cannot be used over long
loaded for communication. This simplifies the
distances, limiting its use
data transmission process for the user
Cable connectors fit in only one way. This Older versions of USB have limited
prevents incorrect connections and ensures transmission rates for example USB
compatible data transmission 2.0 has 480Mbps
As USB usage is standardised, there is a lot of Very old USB standards may not be
support available online and from retailers supported in the near future (USB 1.1, USB
2.0, etc)
Several different data transmission rates are
supported. The newest transmission rate as of
2022 is USB4 2.0 with 80 Gbps (81,920 Mbps,
170x faster than USB 2.0)
Newer USB standards are backwards
compatible with older USB standards
Worked Example
Julia uses a USB connection to transfer data onto her USB flash memory drive.
(i) One benefit of using a USB connection is that it is a universal connection. State two
other benefits of using a USB connection.
Benefit 1:
Benefit 2: [2]
Answer:
Error Checking
All data is represented in binary as 1’s (high voltage) and 0’s (low voltage)
o For example, the number 67 is represented as 01000011
o An error could cause one of the bits to flip from 1 to 0 or vice versa
o If the sixth most significant bit is flipped, 01000011 -> 01000111, 67
becomes 71
o The number 67 in ASCII represents the uppercase letter ‘C’ whereas the
number 71 represents ‘G’
o By flipping a single bit, the meaning of the binary string has changed
o If a book was transmitted over a network, assuming many bits were
flipped, it would likely be difficult to read the original text
How can errors cause problems?
Some errors are small and trivial such as a single swapped letter in a large text
Other errors, in data such as postage addresses, aerospace coordinates or bank
transfers, can be difficult to rectify or be disastrous
Any job or task that relies on a computer to perform highly sensitive or secure
processes must have methods of error checking and correction
Worked Example
Alex receives an email over a wireless connection from a work colleague containing an
important document.
Answer:
Weather conditions or physical barriers such as building can affect signals, for
example bits could be flipped in the document making it hard to understand the
original meaning [1 mark]
Alex should be aware that interference can cause wirelessly received data to
contain errors or corruption [1 mark]
Data could be lost, additional data could be gained or data could be changed [1
mark]
As Alex received an important work document they need to check for errors so
that their work is unaffected and they do not receive incorrect information [1
mark]
Even parity
EVEN
Byte
Parity bit
0 1 0 1 1 0 1 0
If an even parity bit is used then all bits in the byte, including the parity bit,
must add up to an even number
o There are four 1’s in the byte. This means the parity bit must be 0
otherwise the whole byte, including the parity bit, would add up to five
which is an odd number
Odd parity
ODD
Byte
Parity bit
1 101101 0
If an odd parity bit is used then all bits in the byte, including the parity bit, must
add up to an odd number
o There are four 1’s in the byte. This means the parity bit must be a 1
otherwise the whole byte, including the parity bit, would add up to four
which is an even number
The table below shows a number of examples of the agreed parity between a
sender and receiver and the parity bit used for each byte
#1 ODD 0 1 1 0 1 0 1 1 5
#2 EVEN 1 0 0 0 1 0 0 0 2
#3 EVEN 1 0 1 0 1 1 1 1 6
#4 ODD 1 0 1 1 1 0 0 1 5
#5 ODD 1 1 0 1 0 1 0 1 5
#6 EVEN 0 1 0 0 1 1 1 0 4
Example #1: The agreed parity is odd. All of the 1’s in the main bit string are
added (5). As this number is odd already the parity bit is set to 0 so the whole
byte stays odd
Example #2: The agreed parity is even. All of the 1’s in the main bit string are
added (1). As this number is odd the parity bit is set to 1 to make the total
number of 1’s even (2)
Example #6: The agreed parity is even. All of the 1’s in the main bit string are
added (4). As this number is even already the parity bit is set to 0 so the whole
byte stays even
When using parity bits, an error occurs when the number of total bits does not
match the agreed parity
Bits can be flipped or changed due to interference on a wire or wirelessly due
to weather or other signals
#1 ODD 1 1 1 0 1 0 1 1 6 Error
#2 EVEN 1 0 0 0 1 0 0 0 2 No error
#3 EVEN 1 0 1 1 1 1 1 1 7 Error
#4 ODD 1 0 1 1 1 0 0 1 5 No error
#5 ODD 1 1 0 1 0 1 1 1 6 Error
#6 EVEN 0 1 0 0 0 1 1 0 3 Error
Example #1: The agreed parity is odd but the total number of 1’s is even (6). An
error has occurred somewhere
Example #2: The agreed parity is even and the total number of 1’s is even (2). No
error has occurred here
Example #3: The agreed parity is even but the total number of 1’s is odd (7). An
error has occurred somewhere
Parity checks are quick and easy to implement but fail to detect bit swaps
that cause the parity to remain the same
Below is an arbitrary binary string. The agreed parity is odd and the total number
of 1’s is five (odd)
Parity checks do not pinpoint errors in data, only that an error has occurred
Parity blocks and parity bytes can be used to check an error has occurred and
where the error is located
o A parity block consists of a block of data with the number of 1’s
totalled horizontally and vertically
o A parity byte is also sent with the data which contains the parity bits
from the vertical parity calculation
Below is a parity block with a parity byte at the bottom and a parity bit column in
the second column
ODD Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
Byte 1 0 1 1 0 1 0 1 1
Byte 2 0 0 0 0 1 0 0 0
Byte 3 1 0 1 0 1 1 1 1
Byte 4 1 0 1 1 1 0 0 1
Byte 5 1 1 0 1 0 1 0 1
Byte 6 1 1 0 0 1 1 1 0
Byte 7 0 0 1 1 1 1 1 0
Byte 8 0 1 0 1 1 0 0 0
Parity byte 0 1 1 1 1 1 1 1
Exam Tip
Remember, parity bits only track if an error occurred, not where it is located. The parity
bit itself might be the error. Parity bytes are calculated before transmission so act as a
check on the parity bits themselves
Checksums
o If X = 1496
Y = 1496 / 256 = 5.84
Rounded down Y = 5
Z = 5 * 256 = 1280
Checksum = 1496 - 1280 = 216
o The checksum value in this example would be 216
When a block of data is to be transmitted, the checksum is first
calculated and then transmitted with the rest of the data
When the data is received the checksum value is calculated based on the
received data and compared to the checksum value received. If they are
the same then the data does not contain any errors
If an error does occur then a resend request is sent and the data
is retransmitted
Exam Tip
It is worth noting that the checksum value itself may become corrupted or contain
errors! Checksums may be sent multiple times and tallied. The most common checksum
is then assumed to be the correct one
Echo check
Worked Example
Four 7-bit binary values are transmitted from one computer to another. A parity bit is
added to each binary value creating 8-bit binary values. All the binary values are
transmitted and received correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by
writing odd or even in the type of parity column.
01100100
10010001
00000011
10110010
[4]
(b) An error may not be detected when using a parity check. Identify why an error may
not be detected. [1]
Answer:
8a
o Odd [1 mark]
o Odd [1 mark]
o Even [1 mark]
o Even [1 mark]
8b
o Any one from: [1 mark]
there is a transposition of bits
it does not check the order of the bits (just the sum of 1s/0s)
even number of bits change
incorrect bits still add up to correct parity
Exam Tip
Do not add your own parity bit of 1 or 0. This has already been done for you
Check Digits
The check digit (the final digit) should be the difference between
the sum and the closest multiple of 10 that is larger or equal to the
sum
96 rounded to the nearest 10 = 100
100-96 = 4
The check digit is therefore 4 which matches our original
barcode number
Worked Example
Check digit algorithms are used to determine whether an error has occurred in
transmitted data.
a) State the names of two examples of a checksum algorithm. [2]
b) Describe the process a check digit algorithm uses to determine if an error has occurred [5]
Answer:
(a)
ISBN [1 mark]
Barcode [1 mark]
(b)
Encryption
What is encryption?
Encryption relies on the use of a key. A key is a binary string of a certain length
that when applied to an encryption algorithm can encrypt plaintext information
and decrypt ciphertext
o Plaintext is the name for data before it is encrypted
o Ciphertext is the name for data after it is encrypted
Keys can vary in size and act like passwords, enabling people to protect
information. A single incorrect digit in the key means the data cannot be
decrypted correctly. Strong modern keys can be up to or over 1000 bits long!
Symmetric encryption
In symmetric encryption both parties are given an identical secret key which can
be used to encrypt or decrypt information
Key distribution problem: If a hacker gains access to the key then they can
decrypt intercepted information
Methods exist to send the secret key to the receiver without sending it
electronically:
o Both parties could verbally share the key in person
o Both parties may use standard postage mail to share the key (some
businesses and banks may do this to ensure someone's identity and
authenticity)
o An algorithm may be used to calculate the key by sharing secret non-key
information. An example is shown below.
o Symmetric Encryption Walkthrough
Both parties A and B choose a number, for example A = 3, B = 2
Both parties enter their own respective numbers into the following
equations: 7^A MOD 11 or 7^B MOD 11. ^ is another way of
writing “to the power of”
7^3 MOD 11 = 2, 7^2 MOD 11 = 5
Both parties swap their respective answers. A receives 5 and B
receives 2. These answers replace the initial 7 number and the
calculations are performed again
Both parties enter their new number into the following equations:
5^3 MOD 11 or 2^2 MOD 11
5^3 MOD 11 = 4, 2^2 MOD 11 = 4
The answer should match for both parties and this becomes the
encryption and decryption key value
Once the key is generated, it can be applied to the plaintext in the algorithm
that then produces the ciphertext which is sent to the receiver
The receiver gets a copy of the ciphertext and the key and applies the
encryption algorithm. The algorithm then produces the original plaintext for the
receiver
Asymmetric encryption
In asymmetric encryption also known as public key encryption, two keys are used:
o Public key: a key known to everyone
o Private key: a key known only to the receiver
Both keys are needed to encrypt and decrypt information
Asymmetric encryption works as follows:
o Person A uses a symmetric key to encrypt their message then encrypts
their symmetric key using the public key known to both Person A and
Person B
o Person A sends their message over the network or internet
o Person B decrypts the symmetric key using their secret private
key then uses the symmetric key to decrypt the original message
Asymmetric encryption works such that only one private key can be used to
decrypt the message and it is not sent over the internet like a symmetric key
Keys can be very large, for example over 1000 bits. To get the correct key a
hacker would have to calculate almost every possible combination. To illustrate, a
key with only 100 bits would generate 1,267,650,600,228,229,401,496,703,205,376
different combinations
In symmetric encryption, the key must be sent with the message to the receiver. If
a hacker intercepts the key they can read the message
In asymmetric encryption, the public key is available to everyone and would not
be useful to a hacker. The hacker must guess the private key in order to read
the message
Hashing algorithms are many-to-one. This means that many input values,
messages or keys can produce the same hash key output
A hashed encryption key means the hacker must first unhash the key before it is
useful
As hashing algorithms are non-reversible this is extremely difficult
With SHA-2 for example, a hacker who wants to find the symmetric or
asymmetric private key must calculate over 1.3x10^154 combinations; that is 13
with 153 0’s after it. With the computing power available today, this is virtually if
not actually impossible
Worked Example
Complete the sentences about symmetric encryption. Use the terms from the list. Some
of the terms in the list will not be used. You should only use a term once.
algorith ciph copie delet
key plain
m er d e
privat publi standar stole understo unreadab
e c d n od le
The data before encryption is known as ______ text. To scramble the data, an encryption
______, which is a type of ______, is used. The data after encryption is known as ______ text.
Encryption prevents the data from being ______ by a hacker.
[5]
Answer:
plain [1 mark]
algorithm/key [1 mark]
key/algorithm [1 mark]
cipher [1 mark]
Understood [1 mark]