Search Header Logo
Data Transmission

Data Transmission

Assessment

Presentation

Computers

Professional Development

Practice Problem

Easy

Created by

Robert B.A

Used 14+ times

FREE Resource

41 Slides • 62 Questions

1

media

Data Transmission

2

Outline

  • Types and methods of data transmission

  • Methods of error detection

  • Encryption

3

Why this topic?

Data is frequently transferred from one device to another. The two

devices could be in the same building or thousands of kilometres away. Irrespective of the distance travelled, the transmission of data needs to be considered with respect to:

  • how the data is transmitted

  • How can errors following transmission be detected and can the data be recovered

  • the role of encryption to make sure data that falls into the wrong hands can’t be used

4

Types and methods of data transmission

5

Poll

Is it possible to send a big file like 100GiB within a second?

Yes

No

6

Open Ended

Why do you think is impossible

7

Packet

  • A small unit of data

  • A small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data.

  • The packets of data are usually quite small, typically 64 KiB,

    which are much easier to control than a long continuous stream of data.

8

Packet Structure

A typical packet is split up into:

  • header

  • Payload

  • Trailer

9

Packet header

This consists of

  • the IP address of the sending device

  • the IP address of the receiving device

  • the sequence number of the packet (this is to ensure that all the packets can be reassembled into the correct order once they reach the destination)

  • packet size (In bytes)

10

Payload

This is the actual data being sent in the packet.

11

Word Cloud

Describe one or two words that come to mind when you think about the word 'trailer' in relation to the way you watch movies.

12

Fill in the Blanks

13

Multiple Choice

What is the purpose of dividing data into packets during transmission?

1

To make the data transmission slower

2

To reduce the chances of successful transmission

3

To improve the reliability and efficiency of data transmission

4

To increase the cost of network infrastructure

14

Multiple Choice

In a network, what is the purpose of the header in a data packet?

1

It contains the actual data being transmitted

2

It provides information about the destination and source of the packet

3

It is a security feature to encrypt the data

4

It is unnecessary and can be omitted for faster transmission

15

Multiple Choice

What is a data packet in the context of data transmission?

1

A physical cable used to connect devices

2

A unit of data that is transmitted over a network

3

A type of encryption algorithm

4

A software application for data storage

16

Multiple Choice

What happens if a data packet is lost during transmission

1

The entire message is lost

2

The destination automatically requests retransmission

3

The missing packet is ignored, and the rest are delivered

4

The network crashes

17

Multiple Choice

Which part of a packet is also known as a footer?

1

Packet header

2

Trailer

3

Payload

18

Multiple Choice

Which part of a packet has information about the IP address of the sending and receiving device?

1

The packet header

2

The Payload

3

Trailer

19

Fill in the Blanks

20

Multiple Choice

Which part of the packet check for errors?

1

Packet header

2

Payload

3

Trailer

21

Packet Switching

22

Packet Switching

  • A method of transmitting data packets accross the network.

  • Each data packet is able to take an individual pathway across the network.

  • Router : A device that controls which pathway will be used to transmit each packet.

23

media

24

  • There is no need to tie up a single communication line

  • It is relatively easy to expand usage

  • A high transmission rate is possible

  • It is possible to overcome failed/busy lines by re-routing packets

Benefits of packet switching

25

Drawbacks of packet switching

  • Packets lost need to be re-sent

  • Prone to errors with real-time streaming

  • Delay when packets are re-ordered.

26

Multiple Choice

What is the role of routers in a packet-switched network?

1

Transmit voice data

2

Establish dedicated circuits

3

Forward packets between networks

4

Provide encryption for data

27

Multiple Choice

What is packet switching?

1
Method of grouping data transmitted over a network into packets
2
Converting data into sound waves for transmission
3
Sending data through physical mail
4
Using Morse code to transmit information

28

Multiple Choice

Which of the following is a characteristic of packet switching?

1
Data is sent as a whole without breaking into packets
2
Data is broken into packets and sent independently
3
Packets are reassembled at the destination before being processed
4
Packet switching is slower than circuit switching

29

Multiple Choice

In packet switching, what happens if a network node receives more packets than it can transmit at once?

1
It discards the excess packets immediately
2
It sends an error message to the sender and drops the excess packets
3
It slows down the transmission speed to accommodate the excess packets
4
It stores the excess packets in a buffer until it can transmit them.

30

Multiple Choice

What is a packet in the context of packet switching?

1
A unit of data transmitted over a network
2
A type of computer virus
3
A form of currency used in online transactions
4
A type of hardware used in networking

31

Data Transmission

Data transmission can be either over a short distance (for example, computer to printer) or over longer distances (for example, from one computer to another in a global network).
Essentially, three factors need to be considered when transmitting data:

1. The direction of data transmission (for example, can data transmit in one direction only, or in both directions)
2. the method of transmission
3. how will data be synchronised - To make sure that the data arrives in a correct order

32

media

Methods of Data Transmission

33

​Simplex data transmission

Simplex mode occurs when data can be sent in ONE DIRECTION ONLY (for example, from sender to receiver). An example of this would be sending data from a computer to a printer.

34

Half-duplex data transmission

Half-duplex mode occurs when data is sent in BOTH DIRECTIONS but NOT AT THE SAME TIME
An example of this would be a walkie-talkie where a message can be sent in one direction only at a time; but messages can be both received and sent.

35

Full-duplex data transmission

Full-duplex mode occurs when data can be sent in BOTH DIRECTIONS AT THE SAME TIME
An example of this would be a broadband internet connection.

36

Serial data transmission

Serial data transmission occurs when data is sent ONE BIT AT A TIME over a SINGLE WIRE/CHANNEL.
Examples are like USB and Bluetooth

37

Parallel data transmission

Parallel data transmission occurs when SEVERAL BITS OF DATA (usually one byte) are sent down SEVERAL CHANNELS/WIRES all at the same time. Each channel/wire transmits one bit

38

Word Cloud

Which method of data transmission sends data along a single wire?

39

Word Cloud

Which method of data transmission sends data multiple bits at a time?

40

Word Cloud

If a data transmission connection sends data one bit at a time, in both directions, but not at the same time, What kind of data transmission methods are used?

41

Pair Work (5 Minutes)

Attempt Question number 11 from your course book.

42

Fill in the Blanks

43

Individual Work

  1. Explain the followings

  • USB port

  • USB Cable

  • USB Connection

  • USB Device

  1. Give two advantages and two disadvantages of USB Interface

44

Homework

Question 12 - 16 from your course book

45

Multiple Choice

Packets have a header which contains the IP address of the sender and

the receiver

1

TRUE

2

FALSE

46

Multiple Choice

Packets don’t require any form of error checking

1

TRUE

2

FALSE

47

Multiple Choice

USBs use a protocol that allows for error-free data transmission between

device and computer

1

TRUE

2

FALSE

48

Multiple Choice

Serial data transmission suffers from data skewing

1

TRUE

2

FALSE

49

Multiple Choice

The longest cable length supported by USB is 5 metres or less

1

TRUE

2

FALSE

50

Multiple Choice

Simplex data transmission occurs when data is transmitted one bit at a time

1

TRUE

2

FALSE

51

Multiple Choice

USB uses serial data transfer

1

TRUE

2

FALSE

52

Multiple Choice

USB uses serial data transfer

1

TRUE

2

FALSE

53

Can you raed tihs?

“I cnduo’t bvleiee taht I culod aulaclty uesdtannrd waht I was rdnaieg.

Unisg the icndeblire pweor of the hmuan mnid, aocdcrnig to rseecrah at

Cmabridge Uinervtisy, it dseno’t mttaer in waht oderr the lterets in a

wrod are, the olny irpoamtnt tihng is taht the frsit and lsat ltteer be in the

rhgit pclae. The rset can be a taotl mses and you can sitll raed it whoutit a

pboerlm.

Tihs is bucseae the huamn mnid deos not raed ervey ltteer by istlef, but

the wrod as a wlohe.

Aaznmig, huh? Yeah and I awlyas tghhuot slelinpg was ipmorantt! See if

yuor fdreins can raed tihs too”

(from an unknown source at Cambridge University)

54

Methods of error detection

55

The need to check for errors

Errors can occur during data transmission due to:

  1. Interference

  2. problems during packet switching

56

Methods of checking errors

  1. parity checks

  2. checksum

  3. echo check.

57

  1. Parity checks

  • Parity checking is one method used to check whether data has been changed or corrupted following data transmission. This method is based on the number of 1-bits in a byte of data.

  • The parity can be either called EVEN (that is, an even number of 1-bits in the byte) or ODD (that is, an odd number of 1-bits in the byte).

  • The left most bit is reserved for a parity bit.

58

Consider this example




Byte

Odd

Even


Since there are 4 ones odd parity is 1 and even parity is 0


















​0

1​

​1

​0

​1

1​

​0

0

59

Find the parity bits for each of the following bytes:
The parity bit is denoted using letter x

60

Fill in the Blanks

61

Fill in the Blanks

62

Fill in the Blanks

63

Fill in the Blanks

64

Fill in the Blanks

65

Fill in the Blanks

66

Fill in the Blanks

67

Fill in the Blanks

68

Fill in the Blanks

69

Fill in the Blanks

70

Identifying errors

If odd parity is used there is no error if and only if the received packet has odd parity, otherwise there is an error.
The same applies to even

71

Which of the following received bytes indicate an error has occurred following data transmission?

72

Multiple Choice

1 1 1 0 1 1 0 1

even parity being used

1

No error

2

Error

73

Multiple Choice

0 1 0 0 1 1 1 1

even parity being used

1

No error

2

Error

74

Multiple Choice

0 0 1 1 1 0 0 0

even parity being used

1

No error

2

Error

75

Multiple Choice

1 1 1 1 0 1 0 0

odd parity being used

1

No error

2

Error

76

Multiple Choice

1 1 0 1 1 0 1 1

odd parity being used

1

No error

2

Error

77

Multiple Choice

1 1 1 1 1 1 1 1

odd parity being used

1

No error

2

Error

78

Multiple Choice

0 0 0 0 0 0 0 0 even parity being used

1

No error

2

Error

79

Multiple Choice

1 1 1 0 0 0 0 0

odd parity being used

1

No error

2

Error

80

Multiple Choice

0 1 0 1 0 1 0 1

even parity being used

1

No error

2

Error

81

Multiple Choice

1 1 1 0 0 0 1 1

odd parity being used

1

No error

2

Error

82

2. Check sum

A checksum is a method used to check if data has been changed or corrupted following data transmission. Data is sent in blocks, and an additional value, called the checksum, is sent at the end of the block of data.
The checksum is then compared from the receiving and the sending side. if they are the same indicates that there is no error. otherwise there is an error in sending the files.

83

3. Echo check

With echo check, when data is sent to another device, this data is sent back again to the sender. The sender’s computer compares the two sets of data to check if any errors occurred during the transmission process.

84

4.Automatic Repeat Requests (ARQs)

  • A type of error detection method that uses acknoledgement and timeout to see if data has arrived correctly after transmission.

  • Acknowledgement: A message that is sent from one device to another to indicate whether the data is received correctly.

  • timeout: A period of time that is set and used to wait for an acknowledgement to be received.

85

Check digits

A check digit is the final digit included in a code; it is calculated from all the other digits in the code. Check digits are used for barcodes on products, such as International Standard Book Numbers (ISBN) and Vehicle Identification Numbers (VIN)

86

Homework

  1. Explain what is the difference between positive and negative acknowledgement method in ARQ

  2. Exam style questions Question number six (Page 51)

87

Multiple Choice

Some error detection methods use a calculated value to check for errors.

Select one box to show which error detection method does not use a calculated value to

check for errors.

1

Check digit

2

Checksum

3

Echo check

4

Parity check

88

Multiple Choice

The data is transmitted one bit at a time down a single wire. The computer can transmit data

to the printer and the printer can transmit data to the computer, using the same connection.

Select two data transmission methods that will transmit data in this way.

1

parallel full-duplex

2

parallel half-duplex

3

parallel simplex

4

serial full-duplex

5

serial half-duplex

89

Fill in the Blanks

90

Encryption

A method of securing data for storage or transmission that scrambles it and make it meaningless.
encryption helps to minimize the risk of loosing data from hackers.

91

Plaintext and ciphertext

  • The original data being sent is known as plaintext. Once it has gone through an encryption algorithm, it produces ciphertext:

92

Symmetric encryption

  • Symmetric encryption uses an encryption key; the same key is used to encrypt and decrypt the encoded message.ciphertext:

  • The real difficulty is keeping the encryption key a secret (for example, it needs to be sent in an email or a text message which can be intercepted). Therefore, the issue of security is always the main drawback of symmetrical encryption, since a single encryption key is required for both sender and recipient.

93

Asymmetric encryption

  • Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption. It makes use of two keys called the public key and the private key:

  • public key (made available to everybody)

  • private key (only known to the computer user).

94

Multiple Choice

What is meant by the term ciphertext when used in encryption?

1

an encryption or decryption algorithm

2

an encrypted message

3

a type of session key

4

another name for plaintext

5

text following an encryption algorithm

95

Multiple Choice

When carrying out asymmetric encryption, which of the following users would

keep the private key?

1

the sender

2

the receiver

3

both sender and receiver

4

all recipients of the message

96

Multiple Choice

In encryption, which of the following is the term used to describe the message

before it is encrypted?

1

simpletext

2

plaintext

3

notext

4

firsttext

5

ciphertext

97

Multiple Choice

Which of the following is the biggest disadvantage of using symmetric encryption?

1

it is very complex and time consuming

2

it is rarely used anymore

3

the value of the key reads the same in both directions

4

it only works on computers with older operating systems

5

there is a security problem when transmitting the encryption key

98

Multiple Choice

Which of the following is the correct name for a form of encryption in which

both the sender and the recipient use the same key to encrypt and decrypt?

1

symmetric key encryption

2

asymmetric key encryption

3

public key encryption

4

same key encryption

99

Multiple Choice

What of the following is the final number in a code, which is calculated from all

the numbers in the code; its purpose is to find errors in data entry?

1

parity check

2

checksum

3

check digit

4

parity bit

100

Multiple Choice

Which of the following is a form of error detection that makes use of a system

of acknowledgements and timeouts?

1

automatic repeat request

2

parity bit

3

echo check

4

parity bit

101

Multiple Choice

Which of the following methods uses an extra bit added to a byte to ensure it

contains an even number of 1s or odd number of 1s?

1

cyclic redundancy check

2

check digit

3

parity check

4

echo check

102

Multiple Choice

Which of the following uses a calculated value which is sent after a block of

data; the receiving computer also calculates the value from the block of data

and compares the values?

1

parity check

2

check digit

3

automatic repeat request

4

checksum

103

Multiple Choice

Which of the following describes the check where the receiving computer

sends back a copy of the data to the sending computer to allow it to compare

the data?

1

echo check

2

automatic repeat request

3

checksum

4

check digit

media

Data Transmission

Show answer

Auto Play

Slide 1 / 103

SLIDE