Data Transmission
Data Transmission
DATA TRANSMISSION
Data packets
- Data is broken down into packets to be transmitted.
- After transmission, data packets are reassembled to form the original message/data.
NOTE: Corruption is when packet data is changed/ lost in some way // data is gained that
originally was not in the packet
1
Annotate diagram to demonstrate how packet switching is used to transmit data across a
network, including the use of routers, from Device A to Device B.
- Packets sent through several routers
- ... taking different routes from device A to device B
- Packets arrive out of order
- Packets being reordered when all arrived at device B
Simplex Data can be - Mic to comp cheap: only one - Slow: data
transmitted in - Sensor to comp wire is used travels one bit
one direction - Comp to printer at a time in one
only; - Comp to speaker direction
unidirectional - Comp to monitor - Expensive:
- Webcam to comp Requires 2 sets
of wires for
bidirectional
transmission
Half- - Data can be - Phone conversation cheaper than Slow: data travels
duplex transmitted - Walkie-talkie simplex for in one direction at
in both bidirectional time
directions transmission:
- not simult- requires fewer
aneously; wires
bidirectional
- Multiplayer games
2
Simplex
Half-duplex
Full-duplex
Why data transmission between computer & printer needs to be half-duplex rather than
simplex
- Simplex only sends data in one direction
- … so, printer may not be able to tell computer an error has occurred, and computer may
not be able to send printer the document to be printed
- Transmission speed
is adequate
3
- multiple the channel. distance
wires used - More prone to
interference
- Bits may arrive
skewed
Serial
Parallel
Why serial may be used when computer is connected to router in different room
- Data arrives in order sent // does not need reordering
- Less likely to experience interference
- Less likely to have errors
- Can transmit over a longer distance (i.e. another room)
- Still fast transmission..
- ..sufficient for this purpose
4
Why parallel may be used when computer is connected to router in different room
- Faster transmission speed than serial
- …faster response to requests
- Very long connection not needed
- …next room is (likely) within distance for parallel
- ... unlikely to error/arrive out of sequence/skew
Company uses parallel half-duplex data transmission to transmit data for new videos to the
web server, for users to stream. Explain why parallel half-duplex data transmission is the
most appropriate method.
- Parallel would allow fastest transmission
- ... of the large amount of data
- Data can be uploaded and downloaded …
- ... but this does not have to be at the same time
- Data is not required to travel a long distance
- … therefore skewing is not a problem
5
Parallel half-duplex data transmission
- Data is sent multiple bits at a time
- Uses multiple wires
- Data is sent in both directions …
- … but only one direction at a time
How it works
- Device is plugged into computer using USB ports.
- Computer automatically detects the presence of device.
- Device is automatically recognised.
- Computer will look for device driver that matches the device.
- Device driver software is installed/downloaded so computer and device can communicate
6
Drawbacks of using USB connection
- Has a maximum cable length: cannot be used over long distances
- Data transfer is not as fast as other wired systems; Older versions have limited
transmission rate
- Very old USB standards aren’t always compatible with the latest computers.
USB-C
- Can fit into the port either way round.
- Smaller and thinner.
- Faster data transmission rate.
- Offers more power.
Error Checking
Why data has to be checked for errors after transmission
- Computers require data in specific formats
- Computers carry out processes & calculations on data, which go wrong if data not in
specific format
- Computers process/ represent information in binary: 1s and 0s
- Computers carry out processes & calculations on data, which go wrong if order bits are
changed
7
Parity Check
Parity bit: A bit (0 or 1) added to a byte of data in the most significant bit position (left-most
bit) to ensure that byte follows the correct parity bit protocol (even / odd).
Working
- Parity can be set to odd or even
- Sender and receiver agree on parity to use
- Data/email/image is split into bytes // blocks of 7 bytes
- Sender counts the number of 1s/0s in each group/byte
- Each group/byte is assigned a parity bit to match the parity/odd/even
- Receiving device/server recounts the number of 1s/0s in each group/byte
- ... and compares to parity used/odd/even and if it does not match the parity, an error is
reported/identified
- In block check, the location of the error(s) can be identified/estimated at the intersection
ODD Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
Byte 1 0 1 1 0 1 0 1 1
Byte 2 0 0 0 0 1 0 0 0
8
Byte 3 1 0 1 0 1 1 1 1
Byte 4 1 0 1 1 1 0 0 1
Byte 5 1 1 0 1 0 1 0 1
Byte 6 1 1 0 0 1 1 1 0
Byte 7 0 0 1 1 1 1 1 0
Byte 8 0 1 0 1 1 0 0 0
Parity byte 0 1 1 1 1 1 1 1
Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.
- In parity check, interchange of bits will not be detected // Parity check cannot detect even
number of changes // Parity check cannot detect error if parity stays correct …
- ...the (possible) position of all changes will be highlighted // will identify the horizontal and
vertical position of all differences/changes
Checksum
- Checksum value is calculated from the data ...
- ...using an algorithm
- Value is transmitted with the bits/ block of data
- Value is recalculated by the receiver using the same algorithm
- The recalculated value is compared to the transmitted value
- If checksum values are same, then data was transmitted without any error
- If checksum values are different, there is an error and a request is sent for the data to be
re-transmitted
Echo check
- Copy of received data transmitted back to the sender.
- Sender compares returned to data to sent data to check for errors.
9
- If it does not match, error detected.
- If error does occur, sender will retransmit the data
Drawback: If 2 sets of data are different, it isn't known whether error occurred when sending
data in the first place, or when sending data back for checking.
Check Digit
- Validation method
- Data entry check, not data transmission check: mis-typing, mis-scanning error, etc.
- Ensures data entered is correct
How it works
- Check digit is calculated from inputted data, using some mathematical calculation
- Check digit is appended to data & input
- Digit is recalculated after data has been input
- Calculated digit is compared to stored value
- If it matches, data entered is correct
- If it does not match, the data entered is incorrect
How Checksum and ARQ operate together to detect & correct errors
- Checksum used to detect errors (during transmission)
- ... using a calculated value
- ARQ checks if data is received
- ... uses acknowledgement and timeout
- ... requests data be sent again if (checksum) detects error / not received
10
How parity checks and ARQ operate together to detect and correct errors.
- Odd or even parity is set/agreed for the data
- A parity bit is added to each byte of data
- ... to make the number of 1s match parity
- Data is checked after transmission to see if parity is correct
- ARQ uses acknowledgement and timeout
- If no error is found, a positive acknowledgement is sent to the sender / no
acknowledgement is sent to the sender
- If an error is found, a negative acknowledgement is sent to the sender …
- ... that triggers the data to be resent
- When the data is sent, a timer is started
- If an acknowledgement is not received within the time set, the data is resent …
- ... until an acknowledgement is received / resend limit is reached
Encryption
- Scrambles/ encodes data
- Making it meaningless/unintelligible
- Uses an encryption algorithm / key
- Data / plain text is changed to cipher text
- Data can be decrypted: turns the encrypted data into data that can be understood again
Symmetric Encryption
Uses the same key to encrypt and decrypt message
11
Working
- Data is encrypted using encryption key/algorithm
- Data before encryption is known as plain text
- Data after encryption is known as cypher text
- Same key/algorithm is sent to receiver to allow data to be decrypted
Asymmetric Encryption
Uses public keys and private keys to ensure data is secure.
➢ Public key: Encryption key that is known to all users; used to encrypt data
➢ Private key: Encryption key that is known only to receiver; used to decrypt data.
Working
- Person A uses public key to encrypt data
- Person A sends data over the network/ internet
- Person B decrypts data using secret private key
Advantage: Only one private key can be used to decrypt the message and it is not sent over
the internet.
12