Notes For Chapter 2 Usama Virk Cs
Notes For Chapter 2 Usama Virk Cs
Key objectives
The objectives of this chapter are to revise: l error detection to include parity checks,
l methods of data transmission: checksum, echo checks and Automatic Repeat
– data packets Requests (ARQ)
– structure of data packets l encryption to include symmetric and
– packet switching asymmetric encryption
– serial, parallel, simplex, half-duplex and
full-duplex
– universal serial bus (USB)
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 15
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 16 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
16 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 17 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
2 Data transmission
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 17
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 18 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
USB-C is the latest type of USB connector, which uses a totally symmetrical
24-pin USB connection, so it will fit into a USB port either way round since
there is no up or down orientation. USB-C is actually USB 3.1 but has been
named USB-C to distinguish it from the old format which was known as
USB-A.
The main advantages (compared to existing USB-A) of the USB-C connector
are:
l it is much smaller and thinner which suits the current trend in making
devices much thinner
l it offers 100 watt (20 volt) power connectivity which means full-sized
devices can now be charged
l it can carry data at 10 Gigabits per second (10 Gbps); this means it can
now support 4K video delivery
l the USB-C connection is backward compatible (to USB 2.0 and 3.0)
provided a suitable adaptor is used.
Teacher’s comments
The first answer contains four distinct points citing the similarities and
differences between USB-A and USB-C. This gives the answer a good balance.
It is illegal to photocopy this page
The second answer is much briefer even though four points were made.
l The first point, although true, is not worth a mark.
l The second point is true, but it is not a comparison as asked for in the
question.
l The answer confused a symmetrical connection that allows the USB-C to
fit into a device any way round with having the same connector on both
ends of the cable – which is incorrect.
l Data access isn’t faster, but data transfer is faster.
Overall, no marks were gained even though four points were made.
18 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 19 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
2 Data transmission
Exam-style questions
3 Explain what is meant by the following 4 Four statements about data transmission
four terms: are shown in the following table.
a) Data skewing Tick (✓) the appropriate columns to
b) USB-C connection indicate the method and direction of data
c) Parallel data transmission transmission being described by each
d) Half-duplex data transmission [8] statement. [4]
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 19
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 20 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
Worked example
In this example, nine bytes of data have been transmitted. Another byte,
known as the parity byte, has also been sent (this byte consists entirely
of the parity bits produced by the vertical parity check and also indicates
the end of the block of data).
Even parity is being used. The table shows how the data arrived at the
receiving end. And each row and column needs to be checked to see if
they still show even parity.
First, the table shows that an error has occurred following data
transmission (there has been a change in parity in one of the bytes).
Second, at the intersection of row 8 and column 5, the position of the
incorrect bit value (which caused the error) can be found. The 1-bit at
this intersection should be a 0-bit; this means that byte 8 should have
been:
0 0 0 1 0 0 1 0
which would also correct column five, giving an even vertical parity (now
has four 1-bits).
Checksum
A checksum is another method used to check if data has been changed/
corrupted following data transmission. The checksum is calculated by the
sending computer, from the block of data using an agreed algorithm. The
data is then sent as a block along with the checksum. The checksum is
It is illegal to photocopy this page
20 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 21 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
2 Data transmission
a positive acknowledgement is sent back to the sending device. If an error is support the claims in the
question. In part a), you
detected, the receiving device now sends a negative acknowledgement to
have to give supporting
the sending device and requests re-transmission of the data. A timeout is
information which
used by the sending device by waiting a pre-determined amount of time. If no explains how ARQ can be
acknowledgement of any type has been received by the sending device within this used to detect errors. In
time limit, it automatically re-sends the data until a positive acknowledgement is part b), you need to give
received, or until a pre-determined number of re-transmissions have taken place. facts which show that
b) The problem with echo check is it is unclear where the error occurred. Did it echo checking is not very
occur during the original transmission from sender to receiver, or did it occur reliable.
when the receiver sent the data back to the sender? Because of this, it is not a
very reliable method of detecting where an error might have occurred.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 21
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 22 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
following transmission.
i) Locate which bit was changed and which byte was affected.
ii) Write down the corrected byte.
iii) Explain, under what circumstances, this method wouldn’t
identify which byte had become corrupted or changed? [4]
22 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 23 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
2 Data transmission
Symmetric encryption uses a single encryption key. The same key is used
to encrypt data and to decrypt data. Modern encryption keys use 256-bit
encryption (giving about 1077 possible combinations) which makes it hard
to crack.
Asymmetric encryption uses two keys: a public key (known to everyone)
and a private key (known to one user only). Matching pairs (private and
public keys) are generated by an encryption algorithm.
Both types of key are needed to encrypt and decrypt messages. When
using asymmetric encryption, matching pairs of keys are used (these two
keys are mathematically linked but cannot be derived from each other).
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 23
318489_02_IGCSE_CO_SE_OL_015-024.indd Page 24 12/07/22 1:09 PM F-0250 /145/HO02580/work/indd
For example, if ‘A’ wants to send a confidential document to ‘B’, ‘B’ sends
‘A’ their public key who uses this to encrypt the document before sending
it to ‘B’. ‘B’ now uses their private key to decrypt the document.
b) Plaintext
c) Encryption private keys and why this
d) Private key makes it a more secure
e) Encryption algorithm [5] system.
24 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition