[go: up one dir, main page]

0% found this document useful (0 votes)
25 views7 pages

Unit-2 Data Transmission

The document covers various aspects of data transmission, including types, methods, and error detection. It explains packet structure, packet switching, serial and parallel transmission methods, and the role of routers. Additionally, it discusses encryption techniques, highlighting the differences between symmetric and asymmetric encryption.

Uploaded by

deminotfound2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views7 pages

Unit-2 Data Transmission

The document covers various aspects of data transmission, including types, methods, and error detection. It explains packet structure, packet switching, serial and parallel transmission methods, and the role of routers. Additionally, it discusses encryption techniques, highlighting the differences between symmetric and asymmetric encryption.

Uploaded by

deminotfound2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Unit-2

Data Transmission

2.1 Types and methods of data


transmission
State items contained in a data packet.
 Destination address/IP.
 Sender address/IP.
 Packet number.

Describe the structure of a packet.


 The data packet has three sections.
 It has a packet header.
 The header contains data such as the destination address.
 It has a payload.
 The payload contains the main data for the email.
 It has a trailer.
 The trailer contains data such as the error detection system used.

Describe the process of packet switching.


 Data is split into fixed size packets.
 The data is the payload.
 Each packet is given a header.
 The header has data with the Destination IP address.
 Each packet has a trailer.
 Router directs each packet towards its destination.
 The router selects the most efficient route.
 Each packet can take a different route to the destination.
 Packets can arrive out of order.
 After the last packet has arrived they are reordered.

Describe the purpose of the router during packet


switching.
 Control the route the packet takes.
 Send each packet towards its destination.
 Choose more efficient route.

Describe the process of serial data transmission.


 Data is sent one bit at a time.
 A single wire is used.

Explain why parallel half-duplex data


transmission is the most appropriate method.
 Parallel would allow fastest transmission.
 It transmits large amount of data.
 Data can be uploaded and downloaded.
 It does not have to be at the same time.
 Data is not required to travel a long distance.
 Therefore, skewing is not a problem.

Describe parallel full-duplex data transmission.


 It uses multiple wires.
 Therefore, the transmission speed of the data will be fast.
 Data may not need to travel a long distance.
 It sends data in both directions at the same time.
 Therefore, users on the network can send data to each other with no
delay.

State the disadvantages of parallel full-duplex


data transmission.
 More interference.
 Data may be skewed.
 More chance of data collisions.
 More chance of error in the data.

Describe serial simplex data transmission.


 Bits are sent one at a time.
 Bits are sent down a single wire.
 Data is sent in one direction only.

State the advantages of serial half-duplex data


transmission.
 Bits will not be skewed.
 Less chance of error.
 Less interference.
 Data can be sent over a long distance.
 It is possible to download and upload data to the web server.
 Higher bandwidth than full duplex.

State the disadvantages of serial half-duplex data


transmission.
 The transmission of data may be relatively slow.
 Data cannot be sent and received at the same time.
 May be more data collisions.
2.2 Methods of error detection
Describe the errors data might have after
transmission.
 Data could be lost.
 Data could be added.
 Data could be changed.
 Bits could be reassembled in the wrong order.
 Interference could occur.
 Crosstalk could occur.
 Data collisions could occur.
 Data packets could time reach their hop count.
 Network could be infected with malware.

Describe the process of echo check.


 A copy of the data is sent back to the employee’s device/sender.
 The employee’s device/sender compares the data sent to the data
received back.
 If the original and the copy do not match, an error has occurred.

Describe how odd parity checks for errors.


 The number of 1s are counted.
 A parity bit is added to each byte before transmission.
 It is added to make the sum of the bits in each byte odd.
 After transmission, if the number is odd no error is detected.
 After transmission, if the number is even an error is detected.

Describe how odd parity check and positive ARQ


is used to check for errors.
 The 1s are counted.
 Each byte has a parity bit.
 If the number of 1s are odd, the parity bit is 0.
 Then the first packet of data is sent, a timer is started.
 The receiving device counts the number of 1s.
 If the number of 1s are odd an acknowledgement is sent to say the data
is error free.
 The sender then sends the next packet of data.
 Then the timer is restarted.
 If the number of 1s is even an acknowledgement is not sent.
 If no acknowledgement is received before timeout.
 The data packet is resent.

Explain how check digits are used in barcodes to


check for errors.
 A check digit is calculated from using the barcode data.
 It uses an algorithm such as Modulo-11.
 Then it is added to the barcode.
 After the barcode is scanned the check digit is recalculated.
 It uses the same algorithm.
 If the check digits do not match an error has occurred when scanning the
barcode.
 If the check digits match no error has occurred when scanning the
barcode.

Describe how an ARQ can be used check whether


data is received without error.
 Timer is started when sending device transmits a data packet to receiver.
 Receiving device checks the data packet for errors.
 Once the receiving device knows the packet is error free it sends an
acknowledgement back to the sending device.
 Then the next packet is sent.
 If the sending device does not receive an acknowledgement before the
timer ends.
 Then a timeout occurs.
 The data packet is resent.
 It is resent until an acknowledgement is received.
2.3 Encryption
Why is data encrypted?
 To keep it secure.
 The data is sensitive/confidential.
 To make it meaningless.

What is the purpose of encryption?


 If the data is intercepted, it cannot be understood.

Describe how data is encrypted using symmetric


encryption.
 Plain text is encrypted into cipher text.
 Data is encrypted using an algorithm.
 It uses a key.
 The key can be generated using an algorithm.
 The key is transmitted to the receiver.

State the similarities between symmetric and


asymmetric encryption.
 They both use a key.
 They both make the data meaningless.
 They both turn plain text into cypher text.

State the differences between symmetric and


asymmetric encryption.
 Symmetric uses one/public key whereas asymmetric uses two/public and
private keys.
 Symmetric can send the key with the data whereas asymmetric does not.
 Symmetric decrypts the data using the same key whereas asymmetric
decrypts the data using a different key.
 Symmetric is less secured than asymmetric.
 Symmetric has a shared key.
 The key is used to encrypt and decrypt.
 Both the sender and receiver know the key.
 Asymmetric has a public key and a private key.
 The public key to encrypt the data and private to decrypt.
 Anyone can know the public key but only those intended know the
private key.

You might also like