[go: up one dir, main page]

0% found this document useful (0 votes)
21 views225 pages

Chapter 2 Data Transmission

This document discusses data transmission in computer science, covering types and methods including packet switching, simplex, half-duplex, and full-duplex transmissions. It highlights the structure of data packets, advantages and disadvantages of packet switching, and the differences between serial and parallel data transmission. Additionally, it introduces Universal Serial Bus (USB) as a standard method for data transfer between devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views225 pages

Chapter 2 Data Transmission

This document discusses data transmission in computer science, covering types and methods including packet switching, simplex, half-duplex, and full-duplex transmissions. It highlights the structure of data packets, advantages and disadvantages of packet switching, and the differences between serial and parallel data transmission. Additionally, it introduces Universal Serial Bus (USB) as a standard method for data transfer between devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 225

Computer Science

CHAPTER 2: Data transmission


2.1 Types and methods of data transmission
2.2 Methods of error detection
2.3 Encryption

By: Noureddine Tadjerout


14/09/2023 Noureddine Tadjerout 1
Learning Objectives

14/09/2023 Noureddine Tadjerout 2


Learning Objectives

14/09/2023 Noureddine Tadjerout 3


Learning Objectives

14/09/2023 Noureddine Tadjerout 4


Learning Objectives

14/09/2023 Noureddine Tadjerout 5


Learning Objectives

14/09/2023 Noureddine Tadjerout 6


2.1 Types and methods of data transmission
2.1.1 Data packets
https://www.youtube.com/watch?v=rpOfxVgNsa0

14/09/2023 By: 7
2.1 Types and methods of data transmission
2.1.1 Data packets

14/09/2023 By; 8
2.1 Types and methods of data transmission
2.1.1 Data packets

14/09/2023 By 9
2.1 Types and methods of data transmission
2.1.1 Data packets
Packet structure
A typical packet is split up into:
» a packet header
» the payload
» a trailer.

14/09/2023 Noureddine Tadjerout 10


2.1 Types and methods of data transmission
2.1.1 Data packets

14/09/2023 By 11
2.1 Types and methods of data transmission
2.1.1 Data packets

14/09/2023 By: 12
2.1 Types and methods of data transmission
2.1.2 Packet switching
https://www.youtube.com/watch?v=PVbuTBS4Sqc

14/09/2023 By: 13
2.1 Types and methods of data transmission
2.1.2 Packet switching

14/09/2023 By: 14
2.1 Types and methods of data transmission
2.1.2 Packet switching

14/09/2023 By: 15
2.1 Types and methods of data transmission
2.1.2 Packet switching

14/09/2023 By: 16
2.1 Types and methods of data transmission
2.1.2 Packet switching

14/09/2023 By: 17
2.1 Types and methods of data transmission
2.1.2 Packet switching
Packet switching is a connectionless network switching technique. Here, the message is divided and grouped
into a number of units called packets that are individually routed from the source to the destination. There is
no need to establish a dedicated circuit for communication.
Process
Each packet in a packet switching technique has two parts: a header and a payload.

The header: contains the addressing information of the packet and is used by the intermediate routers to
direct it towards its destination.

The payload: carries the actual data.

A packet is transmitted as soon as it is available in a node, based upon its header information. The packets
of a message are not routed via the same path. So, the packets in the message arrives in the destination out
of order. It is the responsibility of the destination to reorder the packets to retrieve the original message.

The process is diagrammatically represented in the following figure. Here the message comprises of four
packets, A, B, C and D, which may follow different routes from the sender to the receiver.

9/14/2023 Mr. Noureddine Tadjerout 18


2.1 Types and methods of data transmission
2.1.2 Packet switching

9/14/2023 Mr. Noureddine Tadjerout 19


2.1 Types and methods of data transmission
2.1.2 Packet switching

Advantages and Disadvantages of Packet Switching


Advantages
Delay in delivery of packets is less, since packets are sent as soon as they are available.
Switching devices don’t require massive storage, since they don’t have to store the entire messages before
forwarding them to the next node.
Data delivery can continue even if some parts of the network faces link failure. Packets can be routed via
other paths.
It allows simultaneous usage of the same channel by multiple users.
It ensures better bandwidth usage as a number of packets from multiple sources can be transferred via the
same link.

Disadvantages
They are unsuitable for applications that cannot afford delays in communication like high quality voice calls.
Packet switching high installation costs.
They require complex protocols for delivery.
Network problems may introduce errors in packets, delay in delivery of packets or loss of packets. If not
properly handled, this may lead to loss of critical information.
9/14/2023 Mr. Noureddine Tadjerout 20
2.1 Types and methods of data transmission
2.1.2 Packet switching
https://www.youtube.com/watch?v=80XDMwDthuE
Extension video Level for Packets and packet switching

14/09/2023 By: 21
2.1 Types and methods of data transmission
2.1.2 Packet switching
Example 1:

14/09/2023 By: Noureddine Tadjerout 22


2.1 Types and methods of data transmission
2.1.2 Packet switching
Example 2:

14/09/2023 By: Noureddine Tadjerout 23


2.1 Types and methods of data transmission
IGCSE Past Exam Paper Question 1:

14/09/2023 By: Noureddine Tadjerout 24


2.1 Types and methods of data transmission
IGCSE Past Exam Paper Answer 1:

14/09/2023 By: Noureddine Tadjerout 25


2.1 Types and methods of data transmission
IGCSE Past Exam Paper Question 2:

14/09/2023 By: Noureddine Tadjerout 26


2.1 Types and methods of data transmission
IGCSE Past Exam Paper Question 2:

14/09/2023 By: Noureddine Tadjerout 27


2.1 Types and methods of data transmission
IGCSE Past Exam Paper Answer 2:

14/09/2023 By: Noureddine Tadjerout 28


Learning Objectives

14/09/2023 Noureddine Tadjerout 29


2.1 Types and methods of data transmission
https://www.youtube.com/watch?v=0cIWq4MZmxw
2.1.2 Data transmission

14/09/2023 By: 30
2.1 Types and methods of data transmission
2.1.2 Data transmission
• When data is sent from one device to another and Data transmission can be
either over a short distance (for example, from computer to printer) or over
longer distances (for example, over a telephone network). Essentially, three
factors need to be considered when transmitting data (each factor has to be
agreed by both sender and receiver for this to work without error):
• the direction of the data transmission (i.e. in one direction only or in both
directions)
• the method of transmission (how many bits are sent at the same time)
• the method of synchronization (activity) between the two devices.

14/09/2023 Noureddine Tadjerout 31


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 32
2.1 Types and methods of data transmission
2.1.2 Data transmission
• SIMPLEX DATA TRANSMISSION is in one direction only (i.e. from
sender to receiver). Example: data being sent from a computer to a
printer.
• HALF-DUPLEX DATA TRANSMISSION is in both directions but not at
the same time (i.e. data can be sent from ‘A’ to ‘B’ or from ‘B’ to ‘A’
along the same line, but not at the same time). Example: a phone
conversation between two people where only one person speaks at
a time.
• FULL-DUPLEX DATA TRANSMISSION is in both directions
simultaneously (i.e. data can be sent from ‘A’ to ‘B’ and from ‘B’ to
‘A’ along the same line, both at the same time). Example:
broadband connection on a phone line.

14/09/2023 Noureddine Tadjerout 33


Watch video for Simplex, half duplex, and full duplex
https://www.youtube.com/watch?v=KDo_789WlrY

14/09/2023 Noureddine Tadjerout 34


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 35
2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 36
2.1.2 Data transmission
SIMPLEX DATA TRANSMISSION
Simplex: Data can only be sent in one direction at a time.
For examples:
• Transfer data from a computer to a printer.
• Microphone to computer.
• Sensor to computer.
• Computer to printer/speaker/monitor.

14/09/2023 Noureddine Tadjerout 37


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 38
2.1.2 Data transmission
HALF-DUPLEX DATA TRANSMISSION
• Half duplex: Data is sent in both directions but only one direction at a
time.

• Example: A two-way radio (walkie-talkie) that can receive and transmit


messages, but not at the same time.

14/09/2023 Noureddine Tadjerout 39


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 40
2.1.2 Data transmission
FULL-DUPLEX DATA TRANSMISSION
Full Duplex Data Transmission: Data can be sent in both directions at the
same time.
• Can be either serial or parallel.
Example:
• A telephone that can receive and transmit audio signals simultaneously.
• Instant messaging
• broadband connection
• video conferencing.

14/09/2023 Noureddine Tadjerout 41


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 42
2.1.2 Data transmission
• SERIAL DATA TRANSMISSION: is when data is sent, one bit at a time, over a single wire or channel
(bits are sent one after the other in a single stream).

(Note: bits can be transmitted as simplex, half-duplex or full-duplex)

This method of data transmission works well over long distances. However, data is transmitted at a slower rate
than parallel data transmission. Since only one wire or channel is used, there is no problem of data arriving at
its destination out of synchronisation.

An example of its use is sending data from a computer to a modem for transmission over a telephone line.

14/09/2023 Noureddine Tadjerout 43


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 44
2.1.2 Data transmission
Serial transmission
• When bits is transmitted 1 bit at a time.
• Data is transmitted using a single wire.
• Bits arrive in order.
• Transmit data over long distance with high chance of accuracy.
• Application: USB / WIFI

14/09/2023 Noureddine Tadjerout 45


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 46
2.1.2 Data transmission
• PARALLEL DATA TRANSMISSION: is when several bits of data (usually 1 byte) are sent down several
wires or channels at the same time; one wire or channel is used to transmit each bit.

(Note: bits can be transmitted as simplex, half-duplex or full-duplex)

This method of data transmission works very well over short distances (over longer distances, the bits can
become ‘skewed’ (suddenly change direction or position) – this means they will no longer be synchronized
(operate at the same time) ). It is, however, a faster method of data transmission than serial.

An example of its use is when sending data to a printer from a computer using a ribbon connector.

14/09/2023 Noureddine Tadjerout 47


2.1 Types and methods of data transmission
2.1.2 Data transmission

skewed(Suddenly
change
direction/position)
due to being sent
at the same time.

14/09/2023 By: 48
2.1.2 Data transmission
Parallel transmission
• Transmit multiple bits of data all at once.
• Used when a user has a large amount of data to transmit and this
need to be done as quickly as possible.

14/09/2023 Noureddine Tadjerout 49


2.1.2 Data transmission
Parallel transmission
• Short range transfer
• Can be used in integrated circuits, ram and connection in peripheral devices such
as printers.
• Data is transmitted using multiple wires.
• Bits may arrive out of sequence.

14/09/2023 Noureddine Tadjerout 50


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 51
2.1.2 Data transmission
Parallel over serial
Benefits of parallel over serial:

• Faster data transfer.

Drawback (disadvantage) of parallel over serial:

• More chance of data being skewed(Suddenly change direction/position)


due to being sent at the same time.
• More expensive as requires multiple wires.
• More chance of interference as more wires are used.

14/09/2023 Noureddine Tadjerout 52


2.1.2 Data transmission

Advantages of Serial transmission


• It uses a single wire therefore it is cheaper to buy and less likely to have
interference which mean it can be used over a longer distances.
• Data is sent a bit at a time, so data is received in order.
• Transmission can be synchronized.
• It can reduce rate of errors.

14/09/2023 Noureddine Tadjerout 53


2.1 Types and methods of data transmission
2.1.2 Data transmission

14/09/2023 By: 54
2.1 Types and methods of data transmission
https://www.youtube.com/watch?v=Pe4dllmwDhY
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 55
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 56
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 57
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 58
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 59
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)
• The UNIVERSAL SERIAL BUS (USB) is an asynchronous serial data
transmission method. It has quickly become the standard method for
transferring data between a computer and a number of devices. Essentially,
the USB cable consists of:
• a four-wire shielded cable
• two of the wires are used for power and the earth
• two of the wires are used in the data transmission.

14/09/2023 Noureddine Tadjerout 60


2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)
Benefits Disadvantage

14/09/2023 Noureddine Tadjerout 61


2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 62
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 63
2.1 Types and methods of data transmission
2.1.3 Universal Serial Bus (USB)

14/09/2023 By: 64
IGCSE Past Exam Paper Question 1:

14/09/2023 Noureddine Tadjerout 65


IGCSE Past Exam Paper Answer 1:

14/09/2023 Noureddine Tadjerout 66


IGCSE Past Exam Paper Question 2:

14/09/2023 Noureddine Tadjerout 67


IGCSE Past Exam Paper Answer 2:

14/09/2023 Noureddine Tadjerout 68


IGCSE Past Exam Paper Question 3:

14/09/2023 Noureddine Tadjerout 69


IGCSE Past Exam Paper Answer 3:

14/09/2023 Noureddine Tadjerout 70


IGCSE Past Exam Paper Question 4:

14/09/2023 Noureddine Tadjerout 71


IGCSE Past Exam Paper Answer 4:

14/09/2023 Noureddine Tadjerout 72


IGCSE Past Exam Paper Question 5:

14/09/2023 Noureddine Tadjerout 73


IGCSE Past Exam Paper Answer 5:

14/09/2023 Noureddine Tadjerout 74


IGCSE Past Exam Paper Question 6:

14/09/2023 Noureddine Tadjerout 75


IGCSE Past Exam Paper Answer 6:

14/09/2023 Noureddine Tadjerout 76


IGCSE Past Exam Paper Question 7:

14/09/2023 Noureddine Tadjerout 77


IGCSE Past Exam Paper Answer 7:

14/09/2023 Noureddine Tadjerout 78


IGCSE Past Exam Paper Question 8:

14/09/2023 Noureddine Tadjerout 79


IGCSE Past Exam Paper Answer 8:

14/09/2023 Noureddine Tadjerout 80


IGCSE Past Exam Paper Question 9:

14/09/2023 Noureddine Tadjerout 81


IGCSE Past Exam Paper Answer 9:

14/09/2023 Noureddine Tadjerout 82


IGCSE Past Exam Paper Question 10:

14/09/2023 Noureddine Tadjerout 83


IGCSE Past Exam Paper Question 10:

14/09/2023 Noureddine Tadjerout 84


IGCSE Past Exam Paper Answer 10:

14/09/2023 Noureddine Tadjerout 85


IGCSE Past Exam Paper Answer 10:

14/09/2023 Noureddine Tadjerout 86


IGCSE Past Exam Paper Question 11:

14/09/2023 Noureddine Tadjerout 87


IGCSE Past Exam Paper Answer 11:

14/09/2023 Noureddine Tadjerout 88


IGCSE Past Exam Paper Question 12:

14/09/2023 Noureddine Tadjerout 89


IGCSE Past Exam Paper Question 12:

14/09/2023 Noureddine Tadjerout 90


IGCSE Past Exam Paper Answer 12:

14/09/2023 Noureddine Tadjerout 91


IGCSE Past Exam Paper Answer 12:

14/09/2023 Noureddine Tadjerout 92


Learning Objectives

14/09/2023 Noureddine Tadjerout 93


2.2 Methods of error detection
https://www.youtube.com/watch?v=ckvEN_JyiKE

14/09/2023 By: 94
2.2 Methods of error detection
The need to check for errors

14/09/2023 By: 95
2.2 Methods of error detection
The need to check for errors

14/09/2023 By: 96
2.2 Methods of error detection
The need to check for errors

14/09/2023 By: 97
2.2 Methods of error detection
The need to check for errors

14/09/2023 By: 98
2.2 Methods of error detection
https://www.youtube.com/watch?v=TEICs3IaKF4

14/09/2023 By: 99
2.2 Methods of error detection
• Watch the video for Check Digits, Checksums, ARQs and Echo Checks
https://www.youtube.com/watch?v=AdNcGXejJM4

14/09/2023 Noureddine Tadjerout 100


2.2 Methods of error detection
• Following data transmission, there is always the risk that the data has been corrupted or
changed in some way. This can occur whether data is being transmitted over short
distances or over long distances.
• Checking for errors is important since computers aren’t able to check that text is correct;
they can only recognize whether a word is in their built-in dictionary or not.
• Look at the following text: ‘I cnduo’t bvleiee taht I culod aulaclty uesdtannrd waht rm
onurrddeine was asynig’.
• A number of methods exist which can detect errors and, in some cases, actually correct
the error. The methods covered in this section are:
• parity checking
• automatic repeat request (ARQ)
• checksum
• echo checking.

14/09/2023 Noureddine Tadjerout 101


2.2 Methods of error detection
2.2.1. Parity checking
• PARITY CHECKING is one method used to check whether data has been changed or corrupted following
transmission from one device or medium to another device or medium.
• A byte of data, for example, is allocated a PARITY BIT. This is allocated before transmission takes place.
Systems that use EVEN PARITY have an even number of 1- bits; systems that use ODD PARITY have an odd
number of 1-bits.
• Consider the following byte:

Therefore, the byte just before transmission would be : either (even parity)

or (odd parity)

14/09/2023 Noureddine Tadjerout 102


2.2 Methods of error detection

14/09/2023 By: 103


2.2 Methods of error detection

14/09/2023 By: 104


2.2 Methods of error detection

14/09/2023 By: 105


2.2 Methods of error detection

14/09/2023 By: 106


2.2 Methods of error detection

14/09/2023 By: 107


2.2 Methods of error detection
2.2.1 Parity checking
• Before data is transferred, an agreement is made between sender and
receiver regarding which of the two types of parity are used. This is an
example of a PROTOCOL.
• Activity 1

14/09/2023 Noureddine Tadjerout 108


2.2 Methods of error detection
2.2.1 Parity checking
• If a byte has been transmitted from ‘A’ to ‘B’, and even parity is used, an
error would be flagged if the byte now had an odd number of 1-bits at the
receiver’s end.
• Example 1 :

In this case, the receiver’s byte has three 1-bits, which means it now has odd
parity whilst the byte from the sender had even parity (four 1-bits). This
clearly means an error has occurred during the transmission of the data.

14/09/2023 Noureddine Tadjerout 109


2.2 Methods of error detection
2.2.1 Parity checking
• Before data is transferred, an agreement is made between sender and
receiver regarding which of the two types of parity are used. This is an
example of a PROTOCOL.
• Activity 2

14/09/2023 Noureddine Tadjerout 110


2.2 Methods of error detection
2.2.1 Parity checking : Example 1
• In this example, nine bytes of data have been transmitted. Agreement has been made that even parity
will be used. Another byte, known as the PARITY BYTE, has also been sent. This byte consists entirely of
the parity bits produced by the vertical parity check. The parity byte also indicates the end of the block of
data. The following table shows how the data arrived at the receiving end:

14/09/2023 Noureddine Tadjerout 111


2.2 Methods of error detection
2.2.1 Parity checking
• A careful study of Table 1 shows the following:
• byte 8 (row 8) has incorrect parity (there are three 1-bits)
• bit 5 (column 5) also has incorrect parity (there are five 1-bits).
• First of all, the table shows that an error has occurred following data
transmission.
• Secondly, at the intersection of row 8 and column 5, the position of the
incorrect bit value (which caused the error) can be found.
• This means that byte 8 should have the value:

14/09/2023 Noureddine Tadjerout 112


2.2 Methods of error detection
2.2.1 Parity checking
Which would also correct column 5 giving an even vertical parity (now has
four 1-bits).
• This byte could therefore be corrected automatically as shown above, or an
error message could be relayed back to the sender asking them to
retransmit the block of data.
• If two of the bits change value following data transmission.it may be
impossible to locate the error using the above method.
• Parity checking: An even or odd number of bits set to 1 in a byte, used to
check if the byte has been transmitted correctly
• For example :

14/09/2023 Noureddine Tadjerout 113


2.2 Methods of error detection
2.2.1 Parity checking
Activity 3

14/09/2023 Noureddine Tadjerout 114


2.2 Methods of error detection
2.2.1 Parity checking
Activity 4

14/09/2023 Noureddine Tadjerout 115


2.2 Methods of error detection
2.2.2 Automatic Repeat Request (ARQ)
https://www.youtube.com/watch?v=SqTS3ZIbwIA

14/09/2023 By: 116


2.2 Methods of error detection
2.2.2 Automatic Repeat Request (ARQ)
• AUTOMATIC REPEAT REQUEST (ARQ) also known as Automatic Repeat Query is
another method used to check whether data has been correctly transmitted.
• It uses an ACKNOWLEDGEMENT (a message sent by the receiver indicating that
data has been received correctly) and TIMEOUT (this is the time allowed to elapse
before an acknowledgement is received).
• If an acknowledgement isn’t sent back to the sender before timeout occurs, then
the message is automatically resent.
• ARQ (Automatic Repeat Request) is an error control and packet recovery method
for data transmission in which the receiver sends an alert to the sender if a packet
is missing, so that the sender can resend the missing packet.

AUTOMATIC REPEAT REQUEST (ARQ): An error detection method that uses


response and time out when transmitting data; if a response is not sent back to
the sender in an agreed amount of time, then the data is re-sent.

14/09/2023 Noureddine Tadjerout 117


2.2 Methods of error detection
2.2.2 Automatic Repeat Request (ARQ)

14/09/2023 By: 118


2.2 Methods of error detection
2.2.3 Checksum
https://www.youtube.com/watch?v=AtVWnyDDaDI

14/09/2023 Noureddine Tadjerout 119


2.2 Methods of error detection
2.2.3 Checksum

14/09/2023 Noureddine Tadjerout 120


2.2 Methods of error detection
2.2.3 Checksum
CHECKSUM: is another way to check if data has been changed or corrupted
following data transmission. Data is sent in blocks and an additional value,
the checksum, is also sent at the end of the block of data.
• To explain how this works, we will assume the checksum of a block of data
is 1 byte in length. This gives a maximum value of (28 – 1 (i.e. 255)). The
value 0000 0000 is ignored in this calculation.
Example 1 explains how a checksum is generated.
• If the sum of all the bytes in the transmitted block of data is <= 255, then
the checksum is this value.
• However, if the sum of all the bytes in the data block > 255, then the
checksum is found using the simple algorithm in Figure below .
14/09/2023 Noureddine Tadjerout 121
2.2 Methods of error detection
2.2.3 Checksum
• Suppose the value of X is 1185, then tracing through the
algorithm, we get:
X = 1185
1)- 1185/256 = 4.629
2)- Rounding down to nearest whole number gives Y = 4
3)- Multiplying by 256 gives Z = Y * 256 = 1024
4)- The difference (X – Z) gives the checksum: (1185 –1024) =
161
5)- This gives the checksum = 161

14/09/2023 Noureddine Tadjerout 122


2.2 Methods of error detection
2.2.3 Checksum
When a block of data is about to be transmitted, the checksum for the bytes is first of all calculated. This value
is then transmitted with the block of data. At the receiving end, the checksum is recalculated from the block
of data received. This calculated value is then compared to the checksum transmitted. If they are the same
value, then the data was transmitted without any errors; if the values are different, then a request is sent for
the data to be retransmitted.
Checksum : A value transmitted at the end of a block of data; it is calculated using the
other elements in the data stream and is used to check for transmission errors)
Activity 2.5

14/09/2023 Noureddine Tadjerout 123


2.2 Methods of error detection
2.2.4 Echo check
ECHO CHECK: when data is sent to another device, this data is sent back again
to the sender. The sender compares the two sets of data to check if any errors
occurred during the transmission process.
As you will have no doubt worked out, this isn’t very reliable. If the two sets
of data are different, it isn’t known whether the error occurred when sending
the data in the first place, or if the error occurred when sending the data back
for checking!
However, if no errors occurred then it is another way to check that the data
was transmitted correctly.

14/09/2023 Noureddine Tadjerout 124


2.2 Methods of error detection

14/09/2023 By: 125


2.2 Methods of error detection
2.2.5 Check digits
https://www.youtube.com/watch?v=p60du0zr_H0

14/09/2023 By; 126


2.2 Methods of error detection
2.2.5 Check digits

14/09/2023 By; 127


2.2 Methods of error detection
2.2.5 Check digits

14/09/2023 By; 128


2.2 Methods of error detection
2.2.5 Check digits
Method 1

14/09/2023 By; 129


2.2 Methods of error detection
2.2.5 Check digits
Method 1

14/09/2023 By; 130


2.2 Methods of error detection
2.2.5 Check digits
Method 2

14/09/2023 By; 131


2.2 Methods of error detection
2.2.5 Check digits

14/09/2023 By; 132


14/09/2023 Noureddine Tadjerout 133
IGCSE Past Paper Exam: Question 1:
Parity checking: IGCSE Exam: Question 2

14/09/2023 Noureddine Tadjerout 135


IGCSE Exam: Question 2

14/09/2023 Noureddine Tadjerout 136


IGCSE Exam: Answer 2

14/09/2023 Noureddine Tadjerout 137


IGCSE Exam: Answer 2

14/09/2023 Noureddine Tadjerout 138


IGCSE Exam: Question 3

14/09/2023 Noureddine Tadjerout 139


IGCSE Exam: Question 4

14/09/2023 Noureddine Tadjerout 140


IGCSE Exam: Question 4

14/09/2023 Noureddine Tadjerout 141


IGCSE Exam: Answer 4

14/09/2023 Noureddine Tadjerout 142


IGCSE Exam: Question 5

14/09/2023 Noureddine Tadjerout 143


IGCSE Exam: Question 5

14/09/2023 Noureddine Tadjerout 144


IGCSE Exam: Answer 5

14/09/2023 Noureddine Tadjerout 145


IGCSE Exam: Question 6

14/09/2023 Noureddine Tadjerout 146


IGCSE Exam: Answer 6

14/09/2023 Noureddine Tadjerout 147


IGCSE Exam: Question 7

14/09/2023 Noureddine Tadjerout 148


IGCSE Exam: Answer 7

14/09/2023 Noureddine Tadjerout 149


IGCSE Exam: Question 8

14/09/2023 Noureddine Tadjerout 150


IGCSE Exam: Question 8

14/09/2023 Noureddine Tadjerout 151


IGCSE Exam: Answer 8

14/09/2023 Noureddine Tadjerout 152


Automatic Repeat Request (ARQ): IGCSE Exam: Question 9

14/09/2023 Noureddine Tadjerout 153


Automatic Repeat Request (ARQ): IGCSE Exam: Question 10

14/09/2023 Noureddine Tadjerout 154


Automatic Repeat Request (ARQ): IGCSE Exam: Answer 10

14/09/2023 Noureddine Tadjerout 155


2.2 Methods of error detection
2.2.3 Checksum
IGCSE Past Paper Exam Question 11

14/09/2023 Noureddine Tadjerout 156


2.2 Methods of error detection
2.2.3 Checksum
IGCSE Past Paper Exam Question 11

14/09/2023 Noureddine Tadjerout 157


2.2 Methods of error detection
2.2.3 Checksum
IGCSE Past Paper Exam Answer 11

14/09/2023 Noureddine Tadjerout 158


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 12

14/09/2023 Noureddine Tadjerout 159


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 12

14/09/2023 Noureddine Tadjerout 160


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 12

14/09/2023 Noureddine Tadjerout 161


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Answer 12

14/09/2023 Noureddine Tadjerout 162


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Answer 12

14/09/2023 Noureddine Tadjerout 163


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 13

To know more about check digit please click on Link : https://www.bbc.co.uk/bitesize/guides/zfspfcw/revision/6


14/09/2023 Noureddine Tadjerout 164
Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 14

14/09/2023 Noureddine Tadjerout 165


Parity/Check digit/Check Sum and ARQ:IGCSE Exam: Question 15

14/09/2023 Noureddine Tadjerout 166


IGCSE Exam: Question 16

14/09/2023 Noureddine Tadjerout 167


IGCSE Exam: Question 16

14/09/2023 Noureddine Tadjerout 168


IGCSE Exam: Answer 16

14/09/2023 Noureddine Tadjerout 169


IGCSE Exam: Answer 16

14/09/2023 Noureddine Tadjerout 170


IGCSE Exam: Question 17

14/09/2023 Noureddine Tadjerout 171


IGCSE Exam: Answer 17

14/09/2023 Noureddine Tadjerout 172


IGCSE Exam: Question 18

14/09/2023 Noureddine Tadjerout 173


IGCSE Exam: Question 18

14/09/2023 Noureddine Tadjerout 174


IGCSE Exam: Answer 18

14/09/2023 Noureddine Tadjerout 175


IGCSE Exam: Question 19

14/09/2023 Noureddine Tadjerout 176


IGCSE Exam: Question 19

14/09/2023 Noureddine Tadjerout 177


IGCSE Exam: Answer 19

14/09/2023 Noureddine Tadjerout 178


IGCSE Exam: Question 20

14/09/2023 Noureddine Tadjerout 179


IGCSE Exam: Question 20

14/09/2023 Noureddine Tadjerout 180


IGCSE Exam: Answer 20

14/09/2023 Noureddine Tadjerout 181


IGCSE Exam: Question 21

14/09/2023 Noureddine Tadjerout 182


IGCSE Exam: Question 21

14/09/2023 Noureddine Tadjerout 183


IGCSE Exam: Answer 21

14/09/2023 Noureddine Tadjerout 184


IGCSE Exam: Question 22

14/09/2023 Noureddine Tadjerout 185


IGCSE Exam: Question 22

14/09/2023 Noureddine Tadjerout 186


IGCSE Exam: Answer 22

14/09/2023 Noureddine Tadjerout 187


IGCSE Exam: Question 23

14/09/2023 Noureddine Tadjerout 188


IGCSE Exam: Question 23

14/09/2023 Noureddine Tadjerout 189


IGCSE Exam: Question 23

14/09/2023 Noureddine Tadjerout 190


IGCSE Exam: Answer 23

14/09/2023 Noureddine Tadjerout 191


IGCSE Exam: Answer 23

14/09/2023 Noureddine Tadjerout 192


IGCSE Exam: Question 24

14/09/2023 Noureddine Tadjerout 193


IGCSE Exam: Answer 24

14/09/2023 Noureddine Tadjerout 194


IGCSE Exam: Question 25

14/09/2023 Noureddine Tadjerout 195


IGCSE Exam: Question 25

14/09/2023 Noureddine Tadjerout 196


IGCSE Exam: Question 25

14/09/2023 Noureddine Tadjerout 197


IGCSE Exam: Answer 25

14/09/2023 Noureddine Tadjerout 198


IGCSE Exam: Answer 25

14/09/2023 Noureddine Tadjerout 199


Learning Objectives

14/09/2023 Noureddine Tadjerout 200


2.3 Encryption
https://www.youtube.com/watch?v=Ih7BT2uFKh4

14/09/2023 By: 201


2.3 Encryption
Understanding Encryption!
https://www.youtube.com/watch?v=1y1M2fZqIlQ

14/09/2023 By: Noureddine Tadjerout 202


2.3 Encryption

14/09/2023 By: 203


2.3 Encryption
What is encryption?
Encryption is a process that scrambles readable text so it can only be read by the person who has the secret code, or
decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing
connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an
organization’s networked computer system, which is why it’s important to know how to help keep that data private.
How does encryption work?
Encryption takes plain text, like a text message or email, and scrambles it into an unreadable format — called “cipher
text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a
network like the Internet.

When the intended recipient accesses the message, the information is translated back to its original form. This is called
decryption.
To unlock the message, both the sender and the recipient have to use a “secret” encryption key — a collection of
algorithms that scramble and unscramble data back to a readable format

14/09/2023 By: Noureddine Tadjerout 204


2.3 Encryption

14/09/2023 By: 205


2.3 Encryption
Symmetric Encryption
Symmetric encryption uses a single key to encrypt and decrypt. If you encrypt a zip file, then decrypt with the same key,
you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption because the key must
be kept secret from third parties.

Again Symmetric cryptography, known also as secret key cryptography, is the use of a single shared secret to share
encrypted data between parties. Ciphers in this category are called symmetric because you use the same key to encrypt
and to decrypt the data.

14/09/2023 By: Noureddine Tadjerout 206


2.3 Encryption
Asymmetric Encryption
Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys one public
key and one private key to encrypt and decrypt a message and protect it from unauthorized access or use.
A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted
by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's
initiator.
When someone wants to send an encrypted message, they can pull the intended recipient's public key from a
public directory and use it to encrypt the message before sending it. The recipient of the message can then decrypt the
message using their related private key.
If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public
key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not
need to physically lock and unlock the message.

14/09/2023 By: Noureddine Tadjerout 207


2.3 Encryption

14/09/2023 By: Noureddine Tadjerout 208


Practical Encryption 1: Open Python IDLE and Enter the code below:

By: Noureddine Tadjerout 209


Practical Encryption 2: Open Python IDLE and Enter the code below:
Movies.csv. file to perform all operations to encrypt()

By: Noureddine Tadjerout 210


Practical Encryption 2: Open Python IDLE and Enter the code below:
Movies.csv. file to perform all operations to encrypt()

By: Noureddine Tadjerout 211


Practical Encryption 2: Open Python IDLE and Enter the code below:

By: Noureddine Tadjerout 212


Practical Encryption 2: Open Python IDLE and Enter the code below:
Below the Encrypted Movie.csv

Now your task is write python program to decrypt the above movie.csv to it original form

By: Noureddine Tadjerout 213


Practical Decryption 2: Open Python IDLE and Enter the code below:

By: Noureddine Tadjerout 214


IGCSE Past Paper Exam – Question 1

14/09/2023 By: Noureddine Tadjerout 215


IGCSE Past Paper Exam – Question 1

14/09/2023 By: Noureddine Tadjerout 216


IGCSE Past Paper Exam – Question 1

14/09/2023 By: Noureddine Tadjerout 217


IGCSE Past Paper Exam – Answer 1

14/09/2023 By: Noureddine Tadjerout 218


IGCSE Past Paper Exam – Question 2

14/09/2023 By: Noureddine Tadjerout 219


IGCSE Past Paper Exam – Answer 2

14/09/2023 By: Noureddine Tadjerout 220


IGCSE Past Paper Exam – Question 3

14/09/2023 By: Noureddine Tadjerout 221


IGCSE Past Paper Exam – Question 3

14/09/2023 By: Noureddine Tadjerout 222


IGCSE Past Paper Exam – Answer 3

14/09/2023 By: Noureddine Tadjerout 223


IGCSE Past Paper Exam – Question 4

14/09/2023 By: Noureddine Tadjerout 224


IGCSE Past Paper Exam – Answer 4

14/09/2023 By: Noureddine Tadjerout 225

You might also like