02 Data Transmission
02 Data Transmission
TRANSMISSION
Types and methods of data
transmission
Data packets
• Data sent over long distances is usually broken up into data
packets (sometimes called datagrams).
• The idea of splitting up data in this way means each packet can be
sent along a different route to its destination. This would clearly be of
great benefit if a particular transmission route was out of action or
very busy. The only obvious drawback of splitting data into packets is
the need to reassemble the data when it reaches its destination.
Packet structure
A typical packet is split up
into:
» a packet header
» the payload
» a trailer.
an error checking method; cyclic redundancy checks
(CRCs) are used to check data packets:
– this involves the sending computer adding up all the 1-bits
in the payload
and storing this as a hex value in the trailer before it is
sent
– once the packet arrives, the receiving computer
recalculates the number
of 1-bits in the payload
– the computer then checks this value against the one sent in
the trailer
– if the two values match, then no transmission errors have
occurred;
otherwise the packet needs to be re-sent.
Packet switching
Packet switching is a method of data transmission in which a
message is broken
up into aour
Suppose number of packets
photograph has been split up into five packets that have
been sent in the following order:
» routers will determine the route of each packet
» routing selection depends on the number of packets waiting to be
processed
at each node
» the shortest possible path available is always selected – this may not
always
be the shortest path that could be taken, since certain parts of the
route may
be too busy or not suitable
» unfortunately, packets can reach the destination in a different order to
The benefits of packet switching are:
Industry-standard
Methods of error detection
The need to check for errors
» parity checks
» checksum
» echo check.
Parity checks
Parity checking is one method used to check whether data has
been changed or
corrupted following data transmission. This method is based on
the number of
1-bits in a byte of data.
The parity can be either called EVEN (that is, an even number of
1-bits in the
byte) or ODD (that is, an odd number of 1-bits in the byte). One
A checksum is a method used to check if data has been
changed or corrupted
following data transmission. Data is sent in blocks, and an
additional value,
called the checksum, is sent at the end of the block of
data.
The checksum process is as follows:
» when a block of data is about to be transmitted, the checksum
is calculated
from the block of data
» the calculation is done using an agreed algorithm (this
algorithm has been
agreed by sender and receiver)
» the checksum is then transmitted with the block of data
» at the receiving end, the checksum is recalculated by the
computer using the
Echo check
With echo check, when data is sent to another device, this data
is sent back
again to the sender. The sender’s computer compares the two
sets of data to
If the two sets of data are different, it isn’t known whether the error
check if any errors occurred during the transmission process.
occurred when sending the data in the first place, or if the error
occurred when sending the data back for checking.
However, if no errors occurred, then it is another way to check that
the data was
transmitted correctly. In summary:
•Symmetric Encryption:
• It uses an encryption key for the encryption process; the same key is
used for encrypting and decrypting the data.
•Asymmetric Encryption:
• Uses a public key and a private key. The public key is available to
everyone, whereas the private key is only available to the user.
• The receiver would have the private key, and they would send the
public key to the sender. The sender can encrypt the message with
the public key, and the data can be decrypted using the private key.