Chapter 2 Data Transmission
Chapter 2 Data Transmission
• Data sent over long distances is usually broken up into data packets (or datagrams),
typically around 64 KiB in size. This makes the data easier to control than a long
continuous stream.
• Each packet can be sent along a different route to its destination, which is beneficial if a
particular transmission route is busy or out of action.
• The drawback of this method is the need to reassemble the data when it reaches its
destination.
• Header: Contains the IP address of the sending device, the IP address of the receiving
device, the sequence number of the packet (to ensure correct reassembly), and the
packet size (to check if all packets have arrived intact). It may also contain a value
indicating the total number of packets for the transmission.
• Payload: Contains the actual data being sent in the packet, usually about 64 KiB.
• Trailer: Contains an identifier for the end of the packet and an error checking method.
Cyclic Redundancy Checks (CRCs) are used to check data packets. This involves the
sending computer adding up all the 1-bits in the payload and storing this as a hex value
in the trailer. The receiving computer then recalculates the number of 1-bits in the
payload and checks this value against the one sent in the trailer. If the two values match,
no transmission errors have occurred; otherwise, the packet needs to be re-sent.
This structure allows for efficient and reliable data transmission over long distances.
1
Page
changes.
To overcome the issue of packets getting lost or endlessly bouncing around the
network, a method called hopping is used. Each packet is assigned a maximum hop
count when it is created. The hop count is reduced by one every time the packet passes
through a router. If the hop count reaches zero before the packet reaches its
destination, the packet is discarded. This prevents the network from being
overwhelmed by lost packets and helps maintain network performance. However, it
also means that some data may need to be re-transmitted, which can impact network
performance. It’s a balance between ensuring data integrity and maintaining network
performance.
Activity 2.1
1. i. Potential problems with sound and video quality in a video conference using
packet switching could include:
o Latency: There might be a delay in the transmission of data packets,
which could cause the video and audio to be out of sync.
o Packet loss: Some packets might get lost during transmission, leading to
missing video frames or gaps in the audio.
o Jitter: Packets might arrive at their destination out of order, causing the
video to freeze or the audio to stutter.
b. To verify that the received payload was error-free, the receiving computer
would perform the same CRC calculation on the received data and compare the
result with the CRC value included in the packet trailer. If the two CRC values
match, then the payload is assumed to be error-free. If they don’t match, then an
error has occurred during transmission, and the packet may need to be re-sent.
4. a. Packets can be lost during their transmission across a network due to various
reasons such as network congestion, faulty hardware, poor signal quality, or
errors in network routing.
b. To deal with lost packets and prevent them from slowing down the
transmission process, protocols like TCP use acknowledgments and timeouts. If
an acknowledgment for a packet is not received within a certain time frame, the
packet is assumed to be lost and is re-sent.
c. Packet switching might improve data security because each packet can be
encrypted individually. Additionally, since packets can take different routes to
reach the destination, it makes it harder for potential eavesdroppers to intercept
all packets and reconstruct the original data. Also, if a secure protocol like
HTTPS is used, even if someone intercepts the packets, they won’t be able to
understand the data without the encryption key.
• Data transmission can occur over short distances (like from a computer to a
printer) or over longer distances (like from one computer to another in a global
network). The direction of data transmission, the method of transmission, and
data synchronization are key factors to consider.
• Simplex data transmission occurs when data can be sent in one direction only,
such as from a sender to a receiver. An example is sending data from a computer
to a printer.
• Half-duplex data transmission occurs when data can be sent in both directions
4
but not at the same time. An example is a walkie-talkie, where a message can be
Page
Serial data transmission occurs when data is sent one bit at a time over a single wire
or channel. Bits are sent one after the other as a single stream. This works well over
long distances and ensures data arrives at its destination fully synchronized.
However, the data is transmitted at a slower rate than parallel data transmission. An
example is when connecting a computer to a printer via a USB connection.
Indeed, parallel data transmission is a method where several bits of data (usually one
byte) are sent simultaneously down several channels or wires. Each channel or wire
transmits one bit. This method can be simplex, half-duplex, or full-duplex.
• It works well over short distances. For example, the internal circuits in a
computer use parallel data transmission since the distance travelled between
components is very short and high-speed transmission is essential.
• Over longer distances (for example, over 20 metres), data can become skewed,
meaning the data can arrive unsynchronised and bits can arrive out of order. The
longer the wire, the worse this can become.
• Despite the potential for data skewing over long distances, parallel data
transmission is a faster method of data transmission than serial because
multiple bits are transmitted at the same time.
5
Page
1. i. Serial, half-duplex data transmission: In this mode, data is sent one bit at a
time over a single channel or wire. Data can be sent in both directions, but not at
the same time. An example is a walkie-talkie, where a message can be sent in
one direction only at a time, but messages can be both received and sent.
ii. Parallel, full-duplex data transmission: In this mode, data is sent several
bits at a time over several channels or wires simultaneously. Data can be sent in
both directions at the same time. An example is a broadband internet
connection.
iii. Serial, simplex data transmission: In this mode, data is sent one bit at a
time over a single channel or wire. Data can be sent in one direction only, such
as from a sender to a receiver. An example is sending data from a computer to a
printer.
i. Serial, simplex data transmission: Data is sent one bit at a time in one
direction only.
ii. Parallel, simplex data transmission: Data is being sent 8 bits at a time in one
direction only.
iii. Parallel, full-duplex data transmission: Data is being sent 16 bits at a time
in both directions simultaneously.
iv. Serial, full-duplex data transmission: Data is sent one bit at a time in both
directions simultaneously.
6
Page
The Universal Serial Bus (USB) is a standard for connecting devices to a computer. It’s
a form of serial data transmission and is now the most common type of input/output
port found on computers. Here are some key points about USB:
The USB-C connector is a significant advancement in USB technology. Here are the key points:
• It’s a 24-pin symmetrical connector, which means it can be inserted into a USB-C port in
either orientation, eliminating the frustration of “getting it right” that comes with
traditional USB connectors.
• It’s smaller and thinner than older USB connectors, making it more suitable for slim
devices like modern laptops, tablets, and smartphones.
• It offers 100-watt (20-volt) power connectivity, which means it can charge full-sized
devices, not just mobile devices. This makes it possible to have a single type of cable for
both data transfer and power supply.
7
Page
Parity checking is a method used to check if data has been altered or corrupted during
data transmission.
Echo Check
• With echo check, when data is sent to another device, this data is sent back
again to the sender.
• The sender’s computer compares the two sets of data to check if any errors
occurred during the transmission process.
• If the two sets of data are different, it isn’t known whether the error occurred
when sending the data in the first place, or if the error occurred when sending
the data back for checking.
• However, if no errors occurred, then it is another way to check that the data was
transmitted correctly.
• If the two sets of data are different, then an error occurred at some stage during
the data transmission.
10
Page
• A check digit is the final digit included in a code; it is calculated from all the
other digits in the code.
• Check digits are used for barcodes on products, such as International Standard
Book Numbers (ISBN) and Vehicle Identification Numbers (VIN).
• Check digits are used to identify errors in data entry caused by mis-typing or mis-
scanning a barcode.
• They can usually detect the following types of error:
o An incorrect digit entered, for example 5327 entered instead of 5307.
o Transposition errors where two numbers have changed order, for
example 5037 instead of 5307.
o Omitted or extra digits, for example 537 instead of 5307 or 53107 instead
of 5307.
o Phonetic errors, for example 13 (thirteen), instead of 30 (thirty).
• There are a number of different methods used to generate a check digit. Two
common methods are:
o ISBN 13
o Modulo-11
Example 1: ISBN 13
1. Using the algorithm for ISBN-13 to calculate the check digit for: 978151045759
Sum of the above: 29 + 81 = 110 Divide by 10 and find the remainder: 110 mod 10 = 0
2. Find the check digits for the following numbers using both modulo-11 and ISBN
13 methods:
• Modulo-11 check digit: This method is not typically used for numbers of this
length, so it’s not applicable here.
• ISBN-13 check digit: Applying the same method as above, we get the check digit
as 5.
• Modulo-11 check digit: Again, this method is not typically used for numbers of
this length, so it’s not applicable here.
• ISBN-13 check digit: Applying the same method as above, we get the check digit
as 7.
Please note that the Modulo-11 method is typically used for shorter numbers (up to 10
digits), and it’s not applicable for the numbers provided in this case. The ISBN-13
method, however, can be used for numbers up to 13 digits long.
15
Page
• When data is transmitted over any public network (wired or wireless), there is
always a risk of it being intercepted by an unauthorized party, often referred to as
an eavesdropper.
• Encryption is a method that helps to minimize this risk. It alters data into a form
that is unreadable by anybody for whom the data is not intended.
• While encryption cannot prevent the data from being intercepted, it makes the
intercepted data nonsensical to the eavesdropper.
• Encryption is particularly important when the data being transmitted is sensitive
or confidential, such as credit card/bank details, medical history, or legal
documents.
• The original data being sent is known as plaintext. Once it has gone through an
encryption algorithm, it produces ciphertext. This transformation from plaintext
to ciphertext is what makes the data unreadable to anyone without the correct
16
decryption key.
Page
• Symmetric encryption uses a single key for both encryption and decryption of
the message.
• In a simple system, a 10-digit denary encryption key is used. Each digit in the key
represents a shift across the alphabet for each corresponding letter in the
message.
• For example, with the key 4 2 9 1 3 6 2 8 5 6, each letter in the word is shifted +4,
+2, +9, +1, and so on, places in the alphabet.
• The original message (plaintext) is transformed into an encoded message
(ciphertext) using this key.
• To decrypt the message, the same key is applied but in reverse, shifting each
letter -4, -2, -9, -1, and so on.
• However, modern computers could crack this encryption key in a matter of
seconds. To combat this, we now use 256-bit binary encryption keys that give
2^{256}
• The main challenge with symmetric encryption is keeping the encryption key a
secret. It needs to be shared between the sender and recipient, and if it’s
intercepted during this process, the security of the data is compromised.
• Therefore, the issue of security is always the main drawback of symmetric
encryption, since a single encryption key is required for both sender and
recipient.
17
Page