0% found this document useful (0 votes)
11 views3 pages

Chapter_2_Z-Notes

Uploaded by

Shreya Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

Chapter_2_Z-Notes

Uploaded by

Shreya Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Data Transmission Data Transmission

Simplex data transmission is in one direction

Types and Methods of Data only (e.g. computer to printer)


Half-duplex data transmission is in both
Transmission
directions but not at the same time (e.g.
Data Packets
phone conversation where only one person
Packet Structure -
speaks)
Header
Full-duplex data transmission is in both
Contains the IP address of the sender
directions simultaneously (e.g. broadband
and the receiver
connection on phone line)
Sequence number of the packet
Serial data transmission is when data is sent
Size of the packet
one bit at a time over a single wire
Payload
Parallel data transmission is when data several
Contains the actual data
bits (1 byte) are sent down several wires at the
Trailer
same time
Includes a method of identifying the
Comparsion of Serial and Parallel data
end of the packet
Error-Checking methods transmission

Packet Switching - Method of data


Serial Parallel
transmission where the data is broken into

multiple packets. Packets are then sent Better for longer Better for short
independently from start to end and distances (Telephone distances (Internal
reassembled at the receiver’s computer. Lines) circuits)

Expensive (More
Advantages Disadvantages Cheaper Option
hardware required)
No need to create a
Used when the size of
single line of Packets may be lost Used when speed is
data transmitted is
communication necessary
small
Possible to
More prone to errors Slower Option Faster than Serial
overcome failed or
in real-time streaming
busy nodes

High data Delay at the receiver


transmission speed while the packets are
being re-ordered

Easy to expand

package usage
0 1 0 1 1 0 1 0
Universal Serial Bus
The MSB (Most Signi cant Bit) is the parity bit.
(USB) As the number of 1s is even, the parity bit
would be set to even.
USB is an asynchronous serial data
Limitations with Parity Checks
transmission method
Two bits may change during transmission;
USB consists of:
therefore, an error is not found
Four-wire shielded cable

Two wires used for power and earth Even though the parity checks would reveal

Two wires used in data transmission the errors, the bit(s) changed wouldn’t be
identi ed

Advantages Disadvantages Parity Blocks

Automatically Transmission rate is To overcome the limitations of parity bits,

detected less than 120 mb/sec Parity blocks would be used.

Only t one way, Maximum cable


prevents incorrect length is about 5

connections metres

Di erent data

transmission rates

Any changes in bits would be identi ed


Backwards
through the rows and columns
compatible
Checksum
Industry standard
Whenever a block of data needs to be sent,

the sender would calculate the checksum


value using a speci c algorithm.
Once the data has been sent, The receiver

Methods of Error would calculate the checksum again with the


same set of data and the same algorithm used

Detection before.
The receiver would then compare the value
Parity Checks received and the newly calculated value. If
Uses the number of 1-bits in a byte they aren’t matched, A request is made to re-
Type Types - send the data.
Even - Even number of 1-bits
Echo Check
Odd - Odd numbers of 1-bits
Once the data has been sent, The receiver will
Example (Even Parity) -
send the data back to the sender for
veri cation. Ciphertext is the text produced after
The sender would compare the received and encryption
original data for errors. Symmetric and Asymmetric Encryption
The only downside is that we wouldn’t know if Symmetric Encryption:
the error occurred when sending the data or It uses an encryption key for the
sending the data back for veri cation. encryption process, The same key is used
Check Digits for both encrypting and decrypting the
Check digits are calculated from all the other data.

digits in the data (ex-codes). The check digit Asymmetric Encryption:


would be the last digit of the code. Uses a public key and a private key. The
These are used to identify mistyping errors public key is available to everyone
such as - whereas the private key is only available
6372 typed as 6379 to the user

8432 typed as 842 The receiver would have the private key

Automatic Repeat Requests (ARQs) and they would send the public key to the

Uses acknowledgments and timeouts to make sender. The sender can encrypt the

sure the user received the data message with the public key and the data

The receiver would check the data for errors; can be on decrypted using the private

if none are found, a positive acknowledgment key.

is sent to the sender. However, if errors are


found, a negative acknowledgment will be
sent, and the data will be sent again.
The sender uses timeouts to wait a pre-

determined amount of time for the


acknowledgment.

If no acknowledgments are received after the


timeout, the data will be sent again to the
receiver.

Encryption
Encryption is a process of turning the data
into an unreadable form so it doesn’t make
sense to hackers and other attackers.

Plaintext and Ciphertext


Plaintext is the original data that is being sent

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy