0% found this document useful (0 votes)
7 views12 pages

Chapter 2 - 021030

The document provides comprehensive notes on data transmission for the Cambridge IGCSE 0478 Computer Science syllabus, covering topics such as packet structure, transmission modes, error detection methods, and encryption techniques. It explains the processes of packet switching, types of data transmission (serial and parallel), and various error detection methods like parity checks, checksums, and Automatic Repeat Request (ARQ). Additionally, it discusses the benefits and drawbacks of USB systems in data transmission.

Uploaded by

Faith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views12 pages

Chapter 2 - 021030

The document provides comprehensive notes on data transmission for the Cambridge IGCSE 0478 Computer Science syllabus, covering topics such as packet structure, transmission modes, error detection methods, and encryption techniques. It explains the processes of packet switching, types of data transmission (serial and parallel), and various error detection methods like parity checks, checksums, and Automatic Repeat Request (ARQ). Additionally, it discusses the benefits and drawbacks of USB systems in data transmission.

Uploaded by

Faith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Chapter 2: Data Transmission

DATA PACKETS
Packet Structure

PACKET TRAILOR
# An error checking method, Cyclic Redundancy Check is used to check data packets (CRC)
# This involves the sending computer adding up all the 1-bits in a pay load and storing this as
hexadecimal values, in the trailer before it is sent.
# Once the packet arrives, the receiving computer recalculates the number of 1-bits in the
payloads.
# The computer then checks this value against the one sent in the tailor.
# If the two values match then no transmission error has occurred otherwise has to be resent.

Describe the process of packet switching


• Data is broken down into packets
• Each packet could take a different route
• A router controls the route a packet takes
• Packets may arrive out of order
• Once the last packet has arrived, packets are reordered

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 1|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Hopping

• Sometimes it is possible for packets to get lost because they keep bouncing around from
router to router and never actually reach their destination. This will congest the network and
almost freezing the network. Lost packets will clog and congest the system.
• To overcome this this, a method called hopping is used.
• A hop number is added to the header of each packet and this number is reduced by 1 every
time it leaves a router.

• Each packet has a maximum hop number to start with. Once a hop number reaches zero,
and the packet has not reached its destination, then the packet is deleted when it reaches
the next router.
• The missing (destroyed) packets will be resend.

DATA TRANSMISSION

Data transmission can be either over a short distance eg from a printer to a computer or it can
be over long distances eg from 1 computer to another computer in a global network.
There are 3 factors which need to be considered when transmitting data are:

• Direction of data transmission e.g direction only or both directions


• The method of transmission e.g many bits can be sent at the same time
• How do you synchronise your data-make sure the received data is in correct order

TRANSMISSION MODE

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 2|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Simplex data transmission


-Occurs when data can be sent in one direction only e.g from a computer to a printer
Half duplex mode
-Occurs when data is sent in both directions but not at the same time e.g walkie-talkie
Full duplex mode
-Occurs when data can be sent in both directions at the same time e.g from A-B and from B-A
along the same transmission line simultaneously
Types of data transmission
Serial data transmission

-Occurs when data is sent one bit at a time over a single wire or channel
-Bits are sent 1 after another as a single stream
-Serial data transmission works well over long distances however the data is transmitted at a
slower rate than parallel data transmission
-Because only 1 channel or wire is used data will arrive at its destination fully synchronized that
is in the correct order e.g when connecting a computer to a printer via a USB connection
-Parallel data transmission
-Occurs when several bits of data (1byte) are sent down several channels or wires all at the
same time each wire transmits 1 bit.
NB: Parallel data transmission can be simplex, half duplex and full duplex
-Parallel data transmission works well over short distances, over long distances (over 20m) data
can be skewed (that is synchronized or out of order)
-It is however a fast method of data transmission that serial

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 3|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

NB: The internal circuits in a computer use parallel data transmission since the distance
travelled between components is very short and high-speed transmission is required

Serial Parallel
Less risk of external interference than Faster rate of data transmission or than serial
parallel.
Works well over long distance. Works well over short distances
Transmitted bits will not have the risk of being Preferred method when speed is important
skewed
Less expensive than parallel. More expensive than serial

METHODS OF ERROR DETECTION


Errors can occur during data transmission due to
1. Electrical interference
2. Problems during packet switching
3. Skewing of data
There are numerous ways used to check if data has an error or not

PARITY CHECKS
-Parity Checking is a method used to check whether data has been changed or corrupted
following data transmission.
NB: THIS METHOD IS BASED ON THE NUMBER OF 1-BITS IN A BYTE
-The Parity can be either even (an even number of 1-bits in a byte) or odd (an odd number of 1-
bits in the byte)
-One of the bits in the byte (left-most bit) is reserved for a parity bit
01000101
-the underlined 0 is the parity bit

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 4|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 5|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

CHECKSUM
-It is a method used to check if data has been changed or corrupted following data transmission
-Data is sent in blocks and additional value called a checksum is sent at the end of the block of
data
-Checksum process is as follows
1. When a block of data is about to be transmitted.
2. The calculation is done using an agreed algorithm (between sender and receiver)
3. The checksum is then transmitted with the block of data
4. At the receiving end, the checksum is recalculated by the computer using the block of data
5. The recalculated checksum is the compared to the checksum sent with the data block

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 6|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

6. If the two checksums are the same, then no transmission area and if there is an error, the
data block is resent

Echo Check
Qns: What is echoes?
When data is sent to another device this data is sent back to the sender. The senders
compares the two sets of data to check if an error occurred during the transmission process.
NB: Qns : Is this method reliable?
Ans : not reliable .
Why: It is not known whether the error occurred when sending data in the first place or if the
error occurred whilst the receiver was sending back the echo.
Check digits
-A check digit is the final digit included in a code, it is calculated from all the other digits in the
code.
- Check digits are used on bar codes for products and on ISBN.
Check digits are used to detect the following errors:
1. An incorrect digit entered e.g. 5327 entered instead of 5307.
2. Transposition errors where two numbers have changed order e.g. 5037 instead of 5307.
3. A phonetic error e.g . 13 instead of 30.
4. Omitted or extra digits e,g 537 instead of 5307 or 53107 instead of 5307.
The number of different methods used to generate a digit. Two common methods are
1. ISBN 13
2. Modulo-11.
ISBN 13

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 7|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 8|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Modulo-11

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 9|Page


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Automatic Repeat Request [ARQ]-Error checking method

• ARQ use positive and negative acknowledgement [message send to receiver indicating that
data has or has not been received correctly] and time out [ the time interval allowed to lapse
before an acknowledgement is received.
• The receiving device receives an error detecting code as part of data transmission, the
[Cyclic Redundancy Check ] used to check if the received data and transmission error.
• If an error detected, a positive acknowledgement is send back to the sending data. However
if an error detected, the receiving device now sends a negative acknowledgement to the
sending device and request retransmission of data.
• If no acknowledgement has been received by the sender with this time limit it automatically
is resend.
• ARQ is often used by mobile phone networks.
Encryption
When data is being transmitted over any public network there is always a risk e.g. hacker
(eavesdropper). Encryption is the scrambling the data in a form that is unreadable to whom the
data is indented to. Encryption will not defend the data from being interrupted. We use on
sensitive data e.g. bank details, legal documents, credit cards , medical history .

Symmetric Encryption

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 10 | P a g e


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

• Symmetric Encryption uses an encryption key. The same key is used to encrypt and decrypt
the message.
• The sender after encryption the data will need to share the key with the receiver.
• NB : The problem is how do we share the key?
Suppose the encryption key is : 4291362856

Asymmetric Encryption
This was developed to overcome the security problems associated with symmetric encryption. It
makes use of two keys which are public key and private key.

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 11 | P a g e


Cambridge IGCSE 0478 Computer Science Notes 2026 – 2028 Examination

Benefits of the USB system


➢ Devices plugged into computer are automatically detected and device
drives are automatically loaded up.
➢ Connections only fit one way preventing incorrect connections being
made
➢ It has become an industry standard, which means considerable
support is available
➢ Can support different data transmission rates from 1,5 MBPS to 5
GBPS
➢ USB protocol notifies the transmitter to re-transmit data if it is relatively,
this leads to error- free data transmission
➢ It is relatively easy it add more USB ports if necessary, by using USB
ports benefits
Drawbacks benefits
➢ Standard USB only supports a maximum cable length of 5m, beyond that USB
hubs are needed to extend the cable length
➢ Even though USB is backward compatible very early USB standard may not
always be supported by the latest computers
➢ Even the latest
version 3 [V3] and version 4[V4] USB -C systems have data transfer rate which is slow
compared to example ethernet connections [note’ V2 has a maximum data transfer rate
of 48Mbps]

Prepared by Elder Mangena T 0774698410 0713430547 @ Edrrovale College 12 | P a g e

You might also like