Chapter 2 of the IGCSE Computer Science (0478) covers data transmission, detailing packet structure, methods of transmission (serial, parallel, simplex, half-duplex, full-duplex), and the importance of error detection and encryption. It explains how data is sent in packets, the role of routers in packet switching, and various error detection methods like parity checks and checksums. The chapter emphasizes the need for secure data transmission through encryption to prevent unauthorized access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
76 views14 pages
IGCSE Chapter 2 Data Transmission
Chapter 2 of the IGCSE Computer Science (0478) covers data transmission, detailing packet structure, methods of transmission (serial, parallel, simplex, half-duplex, full-duplex), and the importance of error detection and encryption. It explains how data is sent in packets, the role of routers in packet switching, and various error detection methods like parity checks and checksums. The chapter emphasizes the need for secure data transmission through encryption to prevent unauthorized access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14
IGCSE Computer Science (0478)
Chapter 2: Data Transmission (Full
Detailed PPT) 2.1 Types and Methods of Data Transmission • Data is broken into packets before transmission. • Packet structure includes header, payload, trailer. • Packet switching used to send data across networks. • Multiple methods of transmission: Serial, Parallel, etc. Packet Structure • Each data packet contains: • - Header: destination address, origin address, packet number • - Payload: actual data being sent • - Trailer: error checking information Packet Switching • Packets can take different routes to the destination. • A router determines the best path for each packet. • Packets may arrive out of order and are reordered. • Ensures reliable transmission over networks. Data Transmission Methods • Serial: sends 1 bit at a time over a single wire. • Parallel: sends multiple bits simultaneously over multiple wires. • Simplex: one-way transmission only. • Half-duplex: both directions, but one at a time. • Full-duplex: both directions simultaneously. Suitability of Transmission Methods • Serial: long distances, less interference. • Parallel: short distances, faster, risk of crosstalk. • Simplex: e.g. keyboard to CPU. • Half-duplex: e.g. walkie-talkies. • Full-duplex: e.g. telephones. Universal Serial Bus (USB) • Uses serial data transmission. • Features: plug and play, power to device, hot- swappable. • Advantages: easy to use, widely supported. • Drawbacks: limited cable length, limited number of ports. 2.2 Error Detection - Why It Matters • Errors can occur due to noise/interference. • Data loss, gain, or change may occur. • Essential to detect and correct errors after transmission. Error Detection Methods • Parity Check (odd/even): parity bit ensures correct number of 1s. • Checksum: sum of data values checked at receiver. • Echo Check: data sent back to sender for confirmation. Check Digit • Used in data entry (e.g. barcodes, ISBN). • Last digit is calculated based on other digits. • Helps detect typing or scanning errors. Automatic Repeat reQuest (ARQ) • Ensures data is received correctly. • Uses acknowledgements (ACK/NAK). • Timeouts used to resend data if no response is received. 2.3 Encryption - Why It's Needed • Keeps data private and secure during transmission. • Prevents unauthorized access and data theft. Types of Encryption • Symmetric: same key for encryption and decryption. • - Fast but less secure. • Asymmetric: uses public and private keys. • - More secure, commonly used in web security (HTTPS). Chapter Summary • Data is transmitted in packets using various methods. • Different transmission modes suit different scenarios. • Error detection ensures reliable communication. • Encryption protects data from unauthorized access.