Chapter 2 exercises
Activity 2.1
Q1(i). Ans: Signals will be weak which will cause bad sound quality laggy and
glitchy video
Q1(ii). Ans: Poor signals or poor network performance can cause bad quality audio
aur video.
Q2. Ans: Packet Switching transmits data across digital networks by breaking it
down into blocks or packets for more efficient transfer using various network
devices. Each time one device sends a file to another, it breaks the file down into
packets so that it can determine the most efficient route for sending the data
across the network at that time. The network devices can then route the packets to
the destination where the receiving device reassembles them for use.
Q3(i). Ans: A cyclic redundancy check (CRC) is an error-detecting code commonly
used in digital networks and storage devices to detect accidental changes to
digital data. Blocks of data entering these systems get a short check value
attached, based on the remainder of a polynomial division of their contents.
Q3(ii). Ans: It will use cyclic redundancy check which will add all the 1 bits in
the payload and store this value as the hex number before it is sent. when the data
arrives the computer recalculates the 1 bits. the computer checks this value
against the one sent in the payload. if the values match then no error occurred
otherwise the data is resent.
Q4(i).Ans: The causes of packet loss include inadequate signal strength at the
destination, natural or human-made interference, excessive system noise, software
corruption or overburdened network nodes. Often more than one of these factors is
involved. Additional causes include the following: Network congestion.
Q4(ii).Ans: If a packet is lost, TCP (Transmission Control Protocol.) can
retransmit it. The second transmission picks up lost packets and reconstructs the
data stream. However, this does not mean there is no slowdown involved. The network
may feel slower, as it still takes time to retransmit data.
Q4(iii).Ans: Data packets are able to find the destination without the use of a
dedicated channel. Reduces lost data packets because packet switching allows for
resending of packets. More cost-effective since there is no need for a dedicated
channel for voice or data traffic.
Activity 2.2
Q1(i).Ans: Serial Half-duplex mode occurs when data is sent in BOTH DIRECTIONS but
NOT AT
THE SAME TIME using ONE BIT AT A TIME over a
SINGLE WIRE/CHANNEL.
Q1(ii).Ans: Parallel,full duplex data transmission – bidirectional transmission for
short distances. Parallel data transmission required many wires (1 wire per bit)
and is expensive. Data can become skewed over long distances. Could be used within
a LAN,server would talk to the computer, computer would talk to the server.
Q1(iii).Ans: In this transmission, data bits are transmitted simultaneously through
multiple links, which are placed parallel to each other. Contrary to serial
transmission where only one bit is transmitted at a time, eight bits of data can be
transmitted simultaneously in parallel transmission.
Q2(i).Ans: Simplex Data Transmission
Q2(ii).Ans: Serial Data Transmission
Q2(iii).Ans: Full-duplex Data Transmission
Q2(iv).Ans: Full-Duplex Data Transmission
Q2(v).Ans: Serial, simplex Data Transmission
Activity 2.3
1. True
2. False
3. True
4.False
5.True
6.False
7.False
8.True
9.False
10.True
Activity 2.4
1. 0
2. 0
3. 0
4. 1
5. 1
6. 0
7. 1
8. 1
9. 0
10. 1
Activity 2.5
1. First set of bytes indicate an error.
2. First set of bytes indicate an error as the last bit from right was changed and
according to the statement it must be 0 rather than 1.
Activity 2.6
1. Byte 9 is wrong instead of 01111010 it should be 10000001
2. Looking at the data, it appears that there is an error in Byte 4. The parity bit
for Byte 4 is 1, but the number of 1s in that row (including the parity bit) is
odd. To correct this error and make the number of 1s in Byte 4 even, we can change
one of the 1s to a 0. For example, we could change Bit 6 of Byte 4 from 1 to 0.
This would make the corrected value for Byte 4:
Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8 Byte 4: 1 0 1 0 1 0 1 1
Activity 2.7
1. The ISBN-13 check digit is calculated using a weighted sum algorithm. To
calculate the check digit for the given ISBN-13 number “978151045759”, you can
follow these steps:
Starting from the left, multiply each digit by its weight. The weights alternate
between 1 and 3. So, the first digit 9 is multiplied by 1, the second digit 7 is
multiplied by 3, the third digit 8 is multiplied by 1, and so on.
Add up the products: 9×1 + 7×3 + 8×1 + 1×3 + 5×1 + 1×3 + 0×1 + 4×3 + 5×1 + 7×3 +
5×1 + 9×3 = 9 + 21 + 8 + 3 + 5 + 3 + 0 +12 +5+21+5+27 =114
Find the remainder when this sum is divided by 10: 114 mod 10 =4
Subtract this remainder from 10 to find the check digit:10-4=6
So, the check digit for the given ISBN-13 number “978151045759” is 6 and the
complete ISBN-13 number is “9781510457596”.
2(i).To find the check digit for the given number “213111000428” using the modulo-
11 method, you can follow these steps:
Starting from the rightmost digit (excluding the check digit), multiply each digit
by its weight. The weights are consecutive integers starting from 2. So, the
rightmost digit 8 is multiplied by 2, the next digit 2 is multiplied by 3, the next
digit 4 is multiplied by 4, and so on.
Add up the products: 8×2 + 2×3 + 4×4 + 0×5 + 0×6 + 0×7 + 1×8 + 1×9 + 1×10 + 3×11 +
1×12 + 2×13 =16+6+16+0+0+0+8+9+10+33+12+26=136
Find the remainder when this sum is divided by 11:136 mod 11 =4
Subtract this remainder from 11 to find the check digit:11-4=7
So, the check digit for the given number “213111000428” using the modulo-11 method
is 7 and the complete number is “2131110004287”.
To find the check digit for the given number “213111000428” using the ISBN-13
method, you can follow these steps:
Starting from the left, multiply each digit by its weight. The weights alternate
between 1 and 3. So, the first digit 2 is multiplied by 1, the second digit 1 is
multiplied by 3, the third digit 3 is multiplied by 1, and so on.
Add up the products:2×1 +1×3 +3×1 +1×3 +1×1 +1×3 +0×1 +0×3 +0×1 +4×3 +2×1 +8×3
=2+3+3+3+1+3+0+0+0+12+2+24=53
Find the remainder when this sum is divided by 10:53 mod10 =3
Subtract this remainder from 10 to find the check digit:10-3=7
So, the check digit for the given number “213111000428” using the ISBN-13 method is
7 and the complete ISBN-13 number is “2131110004287”.
2(ii) To find the check digit for the given number “909812123544” using the modulo-
11 method, you can follow these steps:
Starting from the rightmost digit (excluding the check digit), multiply each digit
by its weight. The weights are consecutive integers starting from 2. So, the
rightmost digit 4 is multiplied by 2, the next digit 4 is multiplied by 3, the next
digit 5 is multiplied by 4, and so on.
Add up the products: 4×2 + 4×3 + 5×4 + 3×5 + 2×6 + 1×7 + 2×8 + 1×9 + 8×10 + 9×11 +
0×12 + 9×13 =8+12+20+15+12+7+16+9+80+99+0+117=395
Find the remainder when this sum is divided by 11:395 mod11 =0
Subtract this remainder from 11 to find the check digit:11-0=11
However, since the check digit must be a single digit number between 0 and 10
(inclusive), we use “X” to represent a check digit of “10”. In this case, since the
result of our calculation is “11”, which is not a valid check digit, it indicates
that there is an error in the given number.
To find the check digit for the given number “909812123544” using the ISBN-13
method, you can follow these steps:
Starting from the left, multiply each digit by its weight. The weights alternate
between 1 and 3. So, the first digit 9 is multiplied by 1, the second digit 0 is
multiplied by 3, the third digit 9 is multiplied by 1, and so on.
Add up the products:9×1 +0×3 +9×1 +8×3 +1×1 +2×3 +1×1 +2×3 +3×1 +5×3 +4×1 +4×3
=9+0+9+24+1+6+1+6+3+15+4+12=90
Find the remainder when this sum is divided by 10:90 mod10 =0
Subtract this remainder from 10 to find the check digit:10-0=10
So, the check digit for the given number “909812123544” using the ISBN-13 method is
0 and the complete ISBN-13 number is “9098121235440”.
Activity 2.8
1. In order for Jane to be able to send encrypted documents back to Tom, they would
need to agree on a method of encryption and establish a secure way to exchange the
necessary encryption keys or credentials.
If they are using symmetric encryption, where the same key is used for both
encryption and decryption, Jane would need to securely obtain a copy of the key
that Tom is using to encrypt the documents he sends her. This could be done through
a secure key exchange protocol or by physically delivering the key on a secure
storage device.
If they are using asymmetric encryption, where different keys are used for
encryption and decryption, Jane would need to generate her own public-private key
pair. She would then need to securely send her public key to Tom, while keeping her
private key secret. Tom could then use Jane’s public key to encrypt documents that
only Jane can decrypt using her private key.
Once the necessary keys or credentials have been exchanged and both parties have
the necessary software or tools to perform the encryption and decryption, Jane
would be able to encrypt documents and send them securely back to Tom.
2. Asymmetric encryption, also known as public-key encryption, is considered more
secure than symmetric encryption because it uses two different keys for encryption
and decryption: a public key and a private key. The public key can be freely shared
with anyone, while the private key must be kept secret.
In a typical scenario, a user generates a public-private key pair and shares the
public key with anyone who wants to send them encrypted messages. The sender uses
the recipient’s public key to encrypt the message, which can only be decrypted by
the recipient using their private key.
This method is more secure than symmetric encryption because it eliminates the need
to securely share a secret key between the sender and recipient. In symmetric
encryption, both parties must have access to the same secret key in order to
encrypt and decrypt messages. If this key is intercepted or stolen by an attacker,
they would be able to decrypt all messages encrypted with that key.
In contrast, with asymmetric encryption, even if an attacker obtains the public
key, they would not be able to decrypt messages encrypted with that key because
they do not have access to the corresponding private key. The private key is only
known to its owner and is never transmitted over the network.
Additionally, asymmetric encryption can provide authentication and non-repudiation
through the use of digital signatures. The sender can sign a message using their
private key, and the recipient can verify the signature using the sender’s public
key. This provides assurance that the message was indeed sent by the claimed sender
and has not been tampered with in transit.
Activity 2.9
a. B
b. B
c. B
d. E
e. A
f. E
g. A
h. B
i. D
j. A
Exam style questions!
1a(i). Echo checking is a quality check and error-control technique for data
transferred over a computer network or other communications link. In this
technique, the data received is stored and also transmitted back to its point of
origin, where it is compared with the original data1.
As for whether it is a suitable error checking method for this application, it
depends on the specifics of the company’s needs and requirements.
1a(ii). Automatic Repeat Request (ARQ), also known as Automatic Repeat Query, is an
error-control method for data transmission that uses acknowledgements (messages
sent by the receiver indicating that it has correctly received a message) and
timeouts (specified periods of time allowed to elapse before an acknowledgment is
to be received) to achieve reliable data transmission over an unreliable
communication channel.
If the sender does not receive an acknowledgment before the timeout, it re-
transmits the message until it receives an acknowledgment or exceeds a predefined
number of retransmissions. Variations of ARQ protocols include Stop-and-wait ARQ,
Go-Back-N ARQ, and Selective Repeat ARQ.
1b. A checksum is an error-detection method used to verify the integrity of data
being transmitted or stored. It is calculated by taking the sum of all the data
words and often sent negated so that simply adding the checksum to the accumulator
would result in zero if the data was received correctly.
On the other hand, a check digit is a form of redundancy check used for error
detection on identification numbers. It is a single digit added to the end of a
code of numbers to verify that the information has been entered correctly.
Here are three differences between checksum and check digit:
1. Checksums can be any size, while check digits are usually a single digit.
2. Checksums are used for verifying the integrity of data being transmitted or
stored, while check digits are used for error detection on identification numbers.
3. Checksums can capture a wider range of errors than check digits.
2.i. Packet switching is a method of transmitting data across digital networks by
breaking it down into packets. Each packet is made of a header and a payload. The
header contains information used by networking hardware to direct the packet to its
destination, where the payload is extracted and used by an operating system,
application software, or higher layer protocols1.
ii. Cyclic Redundancy Check (CRC) is an error-detecting code commonly used in
digital networks and storage devices to detect accidental changes to raw data. It
is computed as a function of the data being transmitted or stored and appended to
it before transmission or storage.
iii. Data skewing refers to an uneven distribution of data among processing units
in a parallel computing system. This can result in some processing units being
overloaded while others are underutilized, leading to suboptimal performance.
iv. Universal Serial Bus (USB) is an industry standard that establishes
specifications for cables, connectors, and protocols for connection, communication,
and power supply between computers and electronic devices.
v. A parity bit is a bit added to a group of bits to ensure that the total number
of 1-bits in the group is even or odd. It is used as a simple form of error
detection in data transmission and storage.
3. extra bit sent with each byte of data - parity check
makes use of timeout and acknowledgement - ARQ
if an error is found, a request is made to re-send the data - ARQ
check on whether a data packet has been changed following transmission - Checksum
re-calculation made on any additional data values sent to the recipient - checksum
data is transmitted in blocks or packets - checksum & ARQ
a method that can determine which bit in a data stream has been changed - parity
check
additional value sent at the end of a block of data to be used to check if any data
transmission errors occurred - checksum
4a. The correct sequence of the statements about automatic repeat requests (ARQs)
is: iii. The sending computer transmits a block of data to the receiving computer.
i. The sending computer waits for a period of time to see if the receiving
computer acknowledges receipt of the data.
ii. After a set time period, a timeout occurs which automatically triggers the re-
sending of the data.
iv. This continues until the receiving computer sends an acknowledgement that the
data has been received.
4b. Here's the correct sequence of statements for checksum error checking:
1. The sending computer uses the block of data to calculate the checksum using an
agreed method.
2. The sending computer sends a block of data together with the checksum value.
3. The receiving computer uses the block of data it receives to re-calculate the
checksum using the same method as the sending computer.
4. The two checksum values are compared by the receiving computer.
5. If the two checksum values don’t match, the receiving computer requests the data
to be re-transmitted.
4c. Here’s the correct sequence of statements for parity checking:
The sending computer adds a parity bit to each byte to make the byte odd or even
parity.
The sending computer sends the binary data including the parity bits.
The sending and receiving computers agree the parity protocol (odd or even).
The receiving computer checks the parity of each byte received and checks it
against the agreed protocol.
If the parity of the byte is incorrect, the receiving computer requests the data to
be re-sent
4d. Here's the correct sequence of statements for check digits:
1. A human operator types in the numerical code into the computer.
2. The check digit is calculated and added to the numerical code.
3. The computer calculates the check digit based on the numerical code entered into
the computer by a human operator.
4. The computer compares the calculated check digit with the check digit typed in
by the human operator.
5. If the two check digits don’t match, the human operator has made an error when
entering the numerical code and will be asked by the computer to re-enter it.
5a. Symmetric encryption is a data encryption method whereby the same key is used
to encode and decode information. In general, any cipher that uses the same secret
key for encryption and decryption is considered symmetric. Symmetric encryption
uses a single key to encrypt and decrypt. If you encrypt a zip file, then decrypt
with the same key, you are using symmetric encryption. Symmetric encryption is also
called “secret key” encryption because the key must be kept secret from third
parties.
5b. Asymmetric encryption is a type of encryption that uses two different keys for
encryption and decryption. One key is used to encrypt the data, while the other key
is used to decrypt it. The key used for encryption is called the public key, while
the key used for decryption is called the private key. The public key can be shared
with anyone, while the private key must be kept secret. This type of encryption is
also known as public-key cryptography.
5c. Encryption is used when transmitting data over a network to protect the data
from being intercepted by unauthorized parties. Encryption is the process of
converting data into a code that can only be read by someone who has the key to
decode it. When data is encrypted before it is transmitted over a network, it
becomes unreadable to anyone who intercepts it.
6. A method of error detection; a value is calculated from a block of data and is
sent with the block of data during data transmission: checksum
Skewed data: data error occurring when data arrives at the destination out of
synchronisation
Half-duplex: a data transmission method where data can be sent in both directions
at the same time (simultaneously)
Check digit: a method of error detection; it is based on counting the number of 1-
bits; uses an additional bit which is the most significant bit in the byte
ARQ: a method of error detection
Parity check: a method of error detection; it is based on counting the number of 1-
bits
Universal serial bus: a form of serial data transmission which allows devices to
communicate with a computer; it has become the industrial standard
Full-duplex: a data transmission method where data can be sent in both directions
at the same time (simultaneously)
A method of error detection; it is based on counting the number of 1-bits; uses an
additional bit which is the most significant bit in the byte: parity check
One bit at a time over a single channel/wire: serial
7i. The most suitable data transmission methods for this application are **Duplex**
and **Parallel**.
7ii.Duplex transmission allows for simultaneous two-way communication between
devices.
- Parallel transmission allows for multiple bits of data to be transmitted as once.
7b.There are several methods of error checking that can be used to make sure that
the data stored after transmission is accurate. Here are two methods:
- Automatic Repeat Request (ARQ): This method uses error-detection codes,
acknowledgment and/or negative acknowledgment messages, and timeouts to achieve
reliable data transmission¹.
- Checksum: This method involves adding up all the bytes in a packet of data and
sending the sum along with the packet.
8a. Duplex data transmission can be either serial or parallel: ✓
Duplex data transmission is when data is transmitted both ways, but only one way at
a time: ✓
Duplex transmission is always used to connect a device to a computer: ✗
Duplex data transmission is when data is transmitted both ways at the same time: ✓
Duplex data transmission automatically detects any errors in data: ✗
8b. Maisey's computer uses an integrated circuit (IC) for data transmission that
sends multiple bits at the same time. Since it sends multiple bits at the same
time, it uses parallel data transmission.
8c. There are several benefits of using a USB connection for printers:
USB printers usually cost less than networked printers and are more compact.
The USB printer cable is very efficient when transferring data using a very high
speed.