0% found this document useful (0 votes)
24 views20 pages

02 Data Transmission

The document discusses various methods and types of data transmission, including packet switching and different modes such as simplex, half-duplex, and full-duplex. It explains the structure of data packets, error detection methods, and the importance of encryption in securing data. Additionally, it highlights the advantages and disadvantages of different transmission methods, including USB technology and error-checking techniques.

Uploaded by

anish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views20 pages

02 Data Transmission

The document discusses various methods and types of data transmission, including packet switching and different modes such as simplex, half-duplex, and full-duplex. It explains the structure of data packets, error detection methods, and the importance of encryption in securing data. Additionally, it highlights the advantages and disadvantages of different transmission methods, including USB technology and error-checking techniques.

Uploaded by

anish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

DATA

TRANSMISSION
Types and methods of data
transmission
Data packets
• Data sent over long distances is usually broken up into data
packets (sometimes called datagrams).
• The idea of splitting up data in this way means each packet can be
sent along a different route to its destination. This would clearly be of
great benefit if a particular transmission route was out of action or
very busy. The only obvious drawback of splitting data into packets is
the need to reassemble the data when it reaches its destination.
Packet structure
A typical packet is split up
into:
» a packet header
» the payload
» a trailer.
 an error checking method; cyclic redundancy checks
(CRCs) are used to check data packets:
– this involves the sending computer adding up all the 1-bits
in the payload
and storing this as a hex value in the trailer before it is
sent
– once the packet arrives, the receiving computer
recalculates the number
of 1-bits in the payload
– the computer then checks this value against the one sent in
the trailer
– if the two values match, then no transmission errors have
occurred;
otherwise the packet needs to be re-sent.
Packet switching
Packet switching is a method of data transmission in which a
message is broken
up into aour
Suppose number of packets
photograph has been split up into five packets that have
been sent in the following order:
» routers will determine the route of each packet
» routing selection depends on the number of packets waiting to be
processed
at each node
» the shortest possible path available is always selected – this may not
always
be the shortest path that could be taken, since certain parts of the
route may
be too busy or not suitable
» unfortunately, packets can reach the destination in a different order to
The benefits of packet switching are:

» there is no need to tie up a single communication line


» it is possible to overcome failed, busy or faulty lines by simply
re-routing
packets
» it is relatively easy to expand package usage
» a high data transmission rate is possible.

The drawbacks of packet switching include:

» packets can be lost and need to be re-sent


» the method is more prone to errors with real-time streaming
(for example, a
live sporting event being transmitted over the internet)
Data transmission

Data transmission can be either over a short distance (for


example, computer to printer) or over longer distances
(for example, from one computer to another in a global
network).
Essentially, three factors need to be considered when
transmitting data:
» the direction of data transmission (for example, can
data transmit in
one direction only, or in both directions)
» the method of transmission (for example, how many bits
can be sent
at the same time)
Simplex data transmission
Simplex mode occurs when data can be sent in ONE
DIRECTION ONLY (for example, from sender to
receiver). An example of this would be sending data from
a computer to a printer.
Half-duplex data transmission
Half-duplex mode occurs when data is sent in BOTH
DIRECTIONS but NOT AT
THE SAME TIME (for example, data can be sent from ‘A’ to ‘B’
and from ‘B’ to ‘A’
along the same transmission line, but they can’t both be done at
the same time).
An example of this would be a walkie-talkie where a message can
be sent in one
direction only at a time; but messages can be both received and
sent.

Full-duplex data transmission


Full-duplex mode occurs when data can be sent in BOTH
DIRECTIONS AT THE
Serial data transmission can be simplex, half-duplex or full-
duplex.)
Serial data transmission works well over long distances.
However, the data is
transmitted at a slower rate than parallel data transmission.
Because only one
channel/wire is used, data will arrive at its destination fully
synchronised (i.e.
in the correct order). An example of its use is when connecting
a computer to a
printer via a USB connection
Universal Serial Bus (USB)

universal serial bus (USB) is a form of serial data transmission.


USB is now the most common type of input/output port found on computers
and has led to a standardization method for the transfer of data
between devices and a computer. It is important to note that USB allows both
half-duplex and full-duplex data transmission

USB consists of:

• Four-wire shielded cable


• Two wires are used for power and earth
• Two wires are used in data transmission
Advantages Disadvantages
Transmission rate is less than
Automatically detected
120 MB/sec
Only fit one way, prevents Maximum cable length is
incorrect connections about 5 metres

Different data transmission


rates(from 1.5 Mbps to 5 Gbps)

No external power source

Backwards compatible (that is,


older versions are still supported)

Industry-standard
Methods of error detection
The need to check for errors

When data is transmitted, there is always a risk that it may be


corrupted, lost or
even gained.
Errors can occur during data transmission due to:

» interference (all types of cable can suffer from electrical


interference, which
can cause data to be corrupted or even lost)

» problems during packet switching (this can lead to data loss –


or it is even
possible to gain data!)
There are a number of ways data can be checked for errors following
transmission:

» parity checks
» checksum
» echo check.

Parity checks
Parity checking is one method used to check whether data has
been changed or
corrupted following data transmission. This method is based on
the number of
1-bits in a byte of data.
The parity can be either called EVEN (that is, an even number of
1-bits in the
byte) or ODD (that is, an odd number of 1-bits in the byte). One
A checksum is a method used to check if data has been
changed or corrupted
following data transmission. Data is sent in blocks, and an
additional value,
called the checksum, is sent at the end of the block of
data.
The checksum process is as follows:
» when a block of data is about to be transmitted, the checksum
is calculated
from the block of data
» the calculation is done using an agreed algorithm (this
algorithm has been
agreed by sender and receiver)
» the checksum is then transmitted with the block of data
» at the receiving end, the checksum is recalculated by the
computer using the
Echo check
With echo check, when data is sent to another device, this data
is sent back
again to the sender. The sender’s computer compares the two
sets of data to
If the two sets of data are different, it isn’t known whether the error
check if any errors occurred during the transmission process.
occurred when sending the data in the first place, or if the error
occurred when sending the data back for checking.
However, if no errors occurred, then it is another way to check that
the data was
transmitted correctly. In summary:

» a copy of the data is sent back to the sender


» the returned data is compared with the original data by
the sender’s computer
» if there are no differences, then the data was sent without
error
Automatic Repeat Requests (ARQs)

•Uses acknowledgements and timeouts to make


sure the user received the data
•The receiver would check the data for any errors; if
none are found, a positive acknowledgement is sent
to the sender. However, if errors are found, a
negative acknowledgement will be sent, and the
data will be sent again.
•The sender uses timeouts to wait for a pre-
determined amount for the acknowledgement.
•If no acknowledgements are received after the
timeout, the data will be sent again to the receiver.
Encryption
•Encryption is a process of turning the data into an unreadable form so it
doesn’t make sense to hackers and other attackers.
Plaintext and Ciphertext
•Plaintext is the original data that is being sent
•Ciphertext is the text produced after encryption
Symmetric and Asymmetric Encryption

•Symmetric Encryption:
• It uses an encryption key for the encryption process; the same key is
used for encrypting and decrypting the data.
•Asymmetric Encryption:
• Uses a public key and a private key. The public key is available to
everyone, whereas the private key is only available to the user.
• The receiver would have the private key, and they would send the
public key to the sender. The sender can encrypt the message with
the public key, and the data can be decrypted using the private key.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy