Chapter_2_Z-Notes
Chapter_2_Z-Notes
multiple packets. Packets are then sent Better for longer Better for short
independently from start to end and distances (Telephone distances (Internal
reassembled at the receiver’s computer. Lines) circuits)
Expensive (More
Advantages Disadvantages Cheaper Option
hardware required)
No need to create a
Used when the size of
single line of Packets may be lost Used when speed is
data transmitted is
communication necessary
small
Possible to
More prone to errors Slower Option Faster than Serial
overcome failed or
in real-time streaming
busy nodes
Easy to expand
package usage
0 1 0 1 1 0 1 0
Universal Serial Bus
The MSB (Most Signi cant Bit) is the parity bit.
(USB) As the number of 1s is even, the parity bit
would be set to even.
USB is an asynchronous serial data
Limitations with Parity Checks
transmission method
Two bits may change during transmission;
USB consists of:
therefore, an error is not found
Four-wire shielded cable
Two wires used for power and earth Even though the parity checks would reveal
Two wires used in data transmission the errors, the bit(s) changed wouldn’t be
identi ed
connections metres
Di erent data
transmission rates
Detection before.
The receiver would then compare the value
Parity Checks received and the newly calculated value. If
Uses the number of 1-bits in a byte they aren’t matched, A request is made to re-
Type Types - send the data.
Even - Even number of 1-bits
Echo Check
Odd - Odd numbers of 1-bits
Once the data has been sent, The receiver will
Example (Even Parity) -
send the data back to the sender for
veri cation. Ciphertext is the text produced after
The sender would compare the received and encryption
original data for errors. Symmetric and Asymmetric Encryption
The only downside is that we wouldn’t know if Symmetric Encryption:
the error occurred when sending the data or It uses an encryption key for the
sending the data back for veri cation. encryption process, The same key is used
Check Digits for both encrypting and decrypting the
Check digits are calculated from all the other data.
8432 typed as 842 The receiver would have the private key
Automatic Repeat Requests (ARQs) and they would send the public key to the
Uses acknowledgments and timeouts to make sender. The sender can encrypt the
sure the user received the data message with the public key and the data
The receiver would check the data for errors; can be on decrypted using the private
Encryption
Encryption is a process of turning the data
into an unreadable form so it doesn’t make
sense to hackers and other attackers.