0% found this document useful (0 votes)
20 views14 pages

f1 4 Data Transmission

helps all form 1 to get something

Uploaded by

chanielsithole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views14 pages

f1 4 Data Transmission

helps all form 1 to get something

Uploaded by

chanielsithole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

DATA TRANSMISSION

Types and methods of data transmission


Data packets
Data sent over long distances is usually broken up into data
packets
The packets of data are usually quite small, typically 64KiB,
which are much easier to control than a long continuous
stream of data.
Packet structure
A typical packet is split up into:
» a packet header
» the payload
» a trailer
Packet switching is a method of data transmission in which
a message is broken up into a number of packets.
Data transmission
Data transmission can be either over a short distance (for
example, computer to printer) or over longer distances (for
example, from one computer to another in a global network).
Essentially, three factors need to be considered when
transmitting data:
» the direction of data transmission (for example, can data
transmit in one direction only, or in both directions)
» the method of transmission (for example, how many bits can
be sent at the same time)
» how will data be synchronised (that is, how to make sure the
received data is in the correct order).
Serial and parallel data transmission
Universal serial bus (USB)
As the name suggests, the universal serial bus (USB) is a form
of serial data transmission. USB is now the most common type
of input/output port found on computers and has led to a
standardisation method for the transfer of data between
devices and a computer.
It is important to note that USB allows both half-duplex and full-
duplex data transmission.
Methods of error detection
The need to check for errors
When data is transmitted, there is always a risk that it may be
corrupted, lost or even gained.
Errors can occur during data transmission due to:
» interference (all types of cable can suffer from electrical
interference, which can cause data to be corrupted or even lost)
» problems during packet switching (this can lead to data loss –
or it is even possible to gain data!)
» skewing of data (this occurs during parallel data transmission
and can cause data corruption if the bits arrive out of
synchronisation)
Checking for errors is important since computers are unable to
understand text, for example, if the words are not recognised by
its built-in dictionary. Look at the following example of some
corrupted text:
There are a number of ways data can be checked for errors
following transmission:
» parity checks
» checksum
» echo check.
Symmetric and asymmetric encryption
The purpose of encryption
When data is transmitted over any public network (wired or
wireless), there is always a risk of it being intercepted by, for
example, a hacker.
Under these circumstances, a hacker is often referred to as an
eavesdropper. Using encryption helps to minimise this risk.
Encryption alters data into a form that is unreadable by
anybody for whom the data is not intended. It cannot prevent
the data being intercepted, but it stops it from making any
This is particularly important if the data is sensitive or
confidential (for example, credit card/bank details, medical
history or legal documents).
Plaintext and ciphertext
The original data being sent is known as plaintext. Once it has
gone through an encryption algorithm, it produces ciphertext:

Symmetric encryption
Symmetric encryption uses an encryption key; the same key is
used to encrypt and decrypt the encoded message.

Asymmetric encryption
Asymmetric encryption was developed to overcome the security
problems associated with symmetric encryption. It makes use of
two keys called the public key and the private key

You might also like