Search Header Logo
Chapter 2 Lesson Reviewer

Chapter 2 Lesson Reviewer

Assessment

Presentation

Computers

9th Grade

Medium

Created by

Casielyn Miraflores Capistrano

Used 1+ times

FREE Resource

60 Slides • 53 Questions

1

​DATA TRANSMISSION

By Casielyn Capistrano

media

2

DATA TRANSMISSION

  • Data transmission is the movement of data from one device or computer system to another, typically over a communication medium such as cables, wireless signals, or optical fiber.

  • The process of sending data from one computer or device to another, using defined directions, methods, and modes.

media

​Data transmission is the transfer of data from one digital device to another

3

DATA PACKETS

- A data packet is a small, formatted unit of data carried across a network. When information like a file, email, or video stream is transmitted over a digital network, it is broken down into packets to make transmission more efficient and reliable.
- Data packets are the fundamental units of communication for devices connected to the internet.
- Data packets are individual information organized into one packet sent through a network path.

- Packets are small 'chunks' of data that make up a larger piece of data that has been broken down by the TCP protocol so that it can be transmitted over the internet.
- TCP stands for Transmission Control Protocol and is used for organising data transmission over networks

- Small 'chunks' of data are easier and quicker to route over the internet than big 'chunks' of data
* Routing involves finding the most optimal path over a network

- Data can include anything from text, images, audio, video, animations, etc, or any combination of these

4

media

​When data is sent over the internet, it is broken into packets. Each packet follows a journey through different stages before reaching its destination.
1. The user creates or requests data e.g., sending an email or loading a webpage.
2. The data is divided into smaller packets, each containing part of the message along with addressing information.

3. The packets are processed and prepared for transmission using the Transmission Control Protocol (TCP)
4. The packets are assigned an IP address to identify the sender and receiver.
5. The packets are sent to the user’s Internet Service Provider (ISP).

5

media

When data is sent over the internet it is first broken down into packets. Each packet is given a destination IP address and other control information. The packets are sent to the sender’s local ISP (Internet Service Provider), where they are passed through routers using TCP/IP. The packets may travel across many different networks, through long-haul providers and exchanges, using the best available route chosen by routing protocols such as BGP. Once they reach the destination ISP, the packets are delivered to the receiver’s router and modem. The packets are then reassembled in the correct order and passed to the receiving application.

6

media

6. The packets travel across several networks, through:

- The local ISP of the destination

- Long-haul providers

- Additional network exchanges

- Border Gateway Protocol (BGP) routers that direct packets along the best available path
7. The packets arrive at the ISP serving the destination device.
8. The packets are passed through the modem and router, ready for delivery.
9. The packets are reassembled in the correct order to recreate the original data.
10. The receiving application e.g., a web browser or email client uses the data.

7

Fill in the Blank

When data is sent over the internet it is first broken down into __________.
Each packet is given a destination __________ address and other control information.
The packets are sent to the sender’s local __________, where they are passed through routers using __________.

/

8

Fill in the Blank

The packets may travel across many different networks, through long-haul providers and exchanges, using the best available route chosen by routing protocols such as border Gateway Protocol (BGP).
Once they reach the __________ ISP, the packets are delivered to the receiver’s __________ and modem.
The packets are then __________ in the correct order and passed to the receiving application.

9

Multiple Choice

Why is data split into packets before being transmitted?

1

To prevent viruses spreading across the network

2

To remove the need for error checking

3

To allow multiple users to share the same communication line efficiently

4

To make transmission slower but more reliable

10

media

HEADER - Sender's IP address, Receiver's IP address, Protocol, Packet Number
PAYLOAD - Data
TRAILER - Data to show end of packet, error correction

PACKETS STRUCTURE

11

What do packets contain?

media

12

media

To transmit the message “This is a message :)”over the internet, TCP might break the message down into 4 packets.
- Each packet contains a:

  • source IP address

  • destination IP address

  • payload (the data)

  • a packet number/sequence number (critical for reliability, ordering, and integrity of communication over networks where packets may arrive late, out of order, duplicated, or lost)

- Error checks make sure that when a packet is received there is minimal or no corruption of the data

- Corruption is where packet data is changed or lost in some way, or data is gained that originally was not in the packet

13

Multiple Choice

Which of the following is found in the payload of a data packet?

1

Destination address

2

The actual data being sent

3

Error detection code

4

Sequence number

14

Multiple Choice

What is included in the header of a data packet?

1

The data only

2

The IP address of the destination and source

3

The speed of the network

4

The username of the sender

15

Multiple Choice

Which of the following correctly describes the three main parts of a packet?

1

Bit, byte, frame

2

Source, destination, data

3

Address, error code, checksum

4

Header, payload, trailer

16

Multiple Choice

What is the main purpose of the trailer in a data packet?

1

To identify the type of network used

2

To store the password of the sender

3

To check for errors in transmission

4

To indicate the size of the packet

17

Multiple Choice

What happens if a packet is lost during transmission?

1

Only the missing packet is requested again

2

The sender is disconnected from the network

3

The entire message must be resent

4

The receiver ignores it and completes the message

18

Multiple Choice

A packet trailer contains error detection information. What is its purpose?

1

To check whether data has been corrupted

2

To recover lost packets

3

To store the destination IP address

4

To encrypt the data

19

Multiple Choice

Why is a sequence number included in the structure of a packet?

1

To identify the start and end of a file

2

To prevent data from being corrupted during transmission

3

To ensure packets can be reassembled in the correct order

4

To encrypt the packet for security

20

Multiple Choice

Which of the following statements best describes the structure of a data packet?

1

A packet contains a header, payload, and trailer, each with a specific role.

2

A packet is a continuous stream of binary digits with no divisions.

3

A packet is a single unit of storage used to hold data inside the CPU.

4

A packet consists only of the message data being transmitted.

21

Open Ended

Explain the structure of a data packet.

22

Multiple Choice

Why might packets from the same message arrive in the wrong order?

1

Packets are corrupted in transit

2

The receiving computer requests them out of order

3

The sender’s computer sends them randomly

4

Packets may take different routes through the network

23

PACKET SWITCHING

Packet Switching is like sending letters or the internet today, think of it like sending DMs or snaps., sending 100 TikTok clips via Wi-Fi, they take different routes but still reach your friend’s phone because data split into small pieces, each may take different paths, then reassembled while Circuit Switching is like a phone call or an old-school phone calls. Think of it like being on a private FaceTime call where a lane is reserved just for you, staying on a Discord voice call, one private “line” is locked for you two the whole time, circuit switching is a fixed path is reserved for the whole communication.

media

​In other words, in packets switching data split into small pieces, travel separately or in different path then reassembled Circuit switching used a fixed path and reserved for the whole communication..

24

media

25

media

26

When data is transmitted across a network, it is often broken down into packets. These packets may travel through different routes in the network before reaching their destination. Certain devices are responsible for deciding the path that each packet should take.

Switch- is a device that controls where packets go inside a LAN”
Router is device that controls which path a packet takes between networks

Devices that control Data Packets

media

27

  • Devices use routing algorithms and tables:

    • Static routing, predefined fixed path.

    • Dynamic routing, path chosen depending on network traffic, failures, or congestion.

  • Factors include:

    • Distance (number of hops).

    • Network congestion.

    • Reliability of the route.

How the Path is Decided?

28

Devices that control Data Packets

media

29

Multiple Choice

Packet switching is used to transmit data packets across the network.

Identify the device that controls which path is taken by each data packet.

1

Switch

2

Hub

3

Gateway

4

Router

30

Multiple Choice

In packet switching, what happens if a network link is busy or unavailable?

1

The router chooses an alternative path

2

The switch retransmits the packet

3

The router stores the packet until the link is free.

4

The hub delays the packet until the network is clear

31

Multiple Choice

Which device controls the path taken by each data packet?

1

Router

2

Switch

3

Hub

4

Bridge

32

Multiple Choice

Which device controls the path taken by each data packet?

1

Router

2

Switch

3

Hub

4

Bridge

33

media

34

DIRECTION OF TRANSMISSION

media
media
media

35

media

36

DIRECTION OF TRANSMISSION

- Direction of transmission refers to the way data flows between two devices during data transmission.

- The direction of transmission describes whether data is sent in one direction or both directions between two devices.

It can be:

1. Simplex
- data flows in
one direction only e.g., keyboard to computer.

2. Half-duplex
- data flows in
both directions, but only one at a time e.g., walkie-talkie.

3. Full-duplex

- data flows in both directions simultaneously e.g., phone call.

media

37

media

38

MODE OF TRANSMISSION

Mode of transmission refers to the how data is sent. This refers to how bits are transmitted between devices.

A. Serial Transmission

- Bits are sent one at a time over a single channel.

- Slower for short distances but more reliable over long distances (less interference).

- Example: USB, Ethernet.

B. Parallel Transmission

- Multiple bits sent simultaneously across multiple channels.

- Faster for short distances but prone to interference and timing issues (skew).

- Example: Inside CPU to memory bus, older printers.


Serial is for long distance, reliable

Parallel is for short distance, faster but error-prone

media
media

39

Synchronous & Asynchronous Transmissions

When data is transmitted, the sender and receiver must agree on how and when the bits are sent. This agreement is handled by synchronization methods:
Synchronous Transmission

-Data is sent one byte or character at a time.
- Each unit of data is wrapped with control bits: Start bit (alerts the receiver that data is coming, Data bits (the actual byte), Stop bit(s) (signal the end of transmission.
- Timing between characters is not important, as the start bit re-synchronizes the devices each time.

Asynchronous Transmission

- Data is sent in a continuous stream of bits, grouped into blocks or frames, without start/stop bits for each byte.
-Sender and receiver share a common clock signal to stay synchronized.

More efficient because less overhead is required.

40

media

41

REMEMBER ME!

Mode (Serial vs Parallel) is concerns the number of data lines used and how the bits travel. Think of it like Are we sending one bit at a time or many at once?
Serial like one lane road, bits one by one, long distance, slower but reliable while Parallel like multi-lane highway, many bits at once, short distance, faster but costly.
- Serial = Simple wire, Parallel = Plenty of wires.



Direction (Simplex, Half, Full) is concerns who can send/receive and whether it’s simultaneous or not. Think of it like Who gets to talk, and when?
Simplex is like only one talks, the other only listens. (TV broadcast).

Half-Duplex is like both can talk, but one at a time. (Walkie-talkie).

Full-Duplex is like both can talk at the same time. (Telephone).
- Simplex = Single-way, Half = Half the time, Full = Free both ways.

Timing (Synchronous vs Asynchronous) is concerns the synchronization methof between sender and receiver during data transmission like how the sender and receiver stay coordinated in time when exchanging data. Think of it like How do we stay in sync while talking?

Synchronous is like shared clock, continuous flow, efficient while Asynchronous is like start/stop bits, slower but simple.

Sync = Same clock, Async = Alone (start/stop help).

42

Open Ended

Why is synchronous transmission faster?

43

Open Ended

Give an example of asynchronous transmission.

44

Multiple Choice

Which type of transmission sends data in both directions but only one way at a time?

1

Simplex

2

Half-duplex

3

Full-duplex

4

Multoplex

45

Multiple Choice

Which type of data transmission sends bits one at a time over a single wire?

1

serial

2

parallel

3

duplex

4

packet

46

Multiple Choice

Which data transmission method is described below?
“Data is transmitted down a single wire, one bit at a time, in one direction only.”

1

Serial Simplex

2

Parallel Simplex

3

Serial Half-Duplex

4

Parallel Full-Duplex

47

Multiple Choice

Which data transmission method is described below?
“Data is transmitted down a single wire, one bit at a time, in both directions at the same time.”

1

Parallel Half-Duplex

2

Serial Simplex

3

Serial Full Duplex

4

Parallel Duplex

48

Multiple Choice

Which data transmission method is described below?
“Data is transmitted down multiple wires, multiple bits at a time, in one direction only.”

1

serial simplex

2

parallel half-duplex

3

serial full-duplex

4

parallel simplex

49

Multiple Choice

Which data transmission method is described below?
“Data is transmitted down multiple wires, multiple bits at a time, in both directions, but only one direction at a time.”

1

Parallel Half-Duplex

2

Serial, Full-Duplex

3

Serial, Half-Duplex

4

Serial, Half-Duplex

50

Multiple Select

Which improvements would be made if parallel transmission is used instead of serial transmission? Choose possible answer.

1

More than one bit is transmitted at the same time, making transmission faster over short distances.

2

The data may be transmitted faster. 

3

The cost of the transmission medium is reduced.

4

Data can travel longer distances without errors.

5

Data can only be sent in one direction at a time.

51

Multiple Select

A school has introduced a smart attendance system. Students tap their ID cards on a scanner when they arrive. The data is transmitted across the school network to the main server that stores attendance records. The data is sent using serial full-duplex data transmission.

Give two reasons why serial full-duplex is a suitable data transmission method for the attendance data. Choose all possible answer.

1

It uses fewer wires, making it cheaper to install and more reliable over longer distances.

2

Data can travel in both directions at the same time, allowing confirmation messages to be sent while data is transmitted.

3

It is always faster than parallel transmission because it sends multiple bits at once.

4

Serial is suitable as there is less chance of error and Full-duplex is suitable as data data needs to go in both directions.

5

Serial has sufficient transmission speed as not much data being sent. Full-duplex as so notification

of errors can be sent back to customer .

52

Open Ended

Define serial transmission and give one advantage of using it.

53

Open Ended

Explain the difference between synchronous and asynchronous data transmission.

54

Open Ended

State two reasons why parallel transmission is not commonly used over long distances.

55

Open Ended

A student is streaming a video online.

Explain why packet switching is used instead of circuit switching.

56

Open Ended

Data can be transmitted in parallel or serial. Describe each method, compare their advantages/disadvantages, and explain which is better for long-distance communication.

57

FACTORS AFFECTING DATA TRANSMISSION

Baud Rate: Number of signal changes per second.

Bit Rate: Number of bits transmitted per second.

Bit Rate = Baud Rate × Number of bits per signal

Bandwidth: Range of frequencies available for transmission.

Latency: Time delay in transmission.

Error rate: How many bits get corrupted.

58

DATA TRANSMISSION ERRORS

media

59

Data Transmission Errors

A data transmission error occurs when the data received does not match the data that was originally sent. This happens when bits are changed, lost, or corrupted during transmission due to problems in the communication medium.

60

Causes of Data Transmission Errors

  • Noise or interference happens when unwanted electrical signals disturb the data being transmitted.

    • Example: A Wi-Fi connection becoming unstable because a nearby microwave oven or cordless phone is emitting signals on a similar frequency.

  • Attenuation refers to the weakening of a signal’s strength as it travels over long distances.

    • Example: An Ethernet cable that runs for more than 100 metres without a repeater may deliver a much weaker signal at the other end.

  • Synchronization issues occur when the sender and receiver clocks are out of step, causing data misalignment.

    • Example: If two computers using synchronous transmission do not share an accurate clock signal, bits may be read at the wrong time, leading to corrupted data.

61

Causes of Data Transmission Errors

  • Hardware faults may result from faulty cables, connectors, or devices that corrupt the data.

    • Example: A damaged USB cable or a loose connector on a router can cause files to transfer with missing or corrupted parts.

  • Crosstalk occurs when signals from one channel interfere with signals in another channel.

    • Example: In telephone lines or poorly shielded network cables, one conversation or data stream may “leak” into another, creating noise and errors.

62

ERROR DETECTION METHODS

media

63

ERROR DETECTION AND CORRECTION METHODS

media

64

An extra parity bit is added to the data so that the total number of 1s is either even (even parity) or odd (odd parity).

Data = 1010 (two 1s, even). With even parity, parity bit = 0. Transmitted data = 10100.

It is simple and fast but if two bits change, the error may not be detected.

Parity Check

Error Detection and Correction Methods

​The table below shows 6 bytes that are transmitted using odd parity. Each byte already includes its parity bit. Complete the parity byte for the entire block of data.

media

65

PARITY CHECK

media

66

PARITY CHECK

​The table below shows 6 bytes that are transmitted using odd parity. Each byte already includes its parity bit. Complete the parity byte for the entire block of data.

Each column (parity bit, bit 6 … bit 1) must have an odd number of 1s.

If the count of 1s in a column is already odd THEN parity byte = 0.

If the count is even THEN parity byte = 1 to make it odd.

media

67

PARITY CHECK

​The table below shows 4 bytes that are transmitted using even parity. Each byte already includes its parity bit. Complete the parity byte for the entire block of data.

Each column (parity bit, bit 7 … bit 1) must have an even number of 1s.

If the count of 1s in a column is already even THEN parity byte = 0.

If the count is odd THEN parity byte = 1 to make it odd.

media

68

CHECKSUM

The data is split into blocks. The values of the blocks are added together. The sum (checksum) is transmitted along with the data. The receiver recalculates the checksum and compares.

Data blocks = 1010 (decimal 10) and 1100 (decimal 12). Sum = 22. Checksum = 22. Receiver adds blocks; if the result is not 22, error detected.

Detects more errors than parity however it cannot correct errors, only detects them.

​A system uses the checksum method for error detection. The data to be transmitted is divided into three 8-bit blocks:

Block 1: 10101100

Block 2: 11110000

Block 3: 00011110

Calculate the checksum value that will be transmitted with the data.
(At the receiver side, the data blocks received are:
Block 1: 10101100

Block 2: 11110000

Block 3: 00011111

69

CHECKSUM

media

70

CHECKSUM

​A system uses the checksum method for error detection. The data to be transmitted is divided into three 8-bit blocks:

Block 1: 10101100

Block 2: 11110000

Block 3: 00011110

Calculate the checksum value that will be transmitted with the data.
(At the receiver side, the data blocks received are:
Block 1: 10101100

Block 2: 11110000

Block 3: 00011111

Solution:
Sender side:

1. Convert each block to denary:
- Block 1 = 172
- Block 2 = 240
- Block 3 = 30

2. Add them together:
172 + 240 + 30 =
442
3. Convert the sum into binary let’s use 8 bits, so we only take the lower 8 bits if it overflows:

442 in binary = 110111010

Take lower 8 bits = 10111010 (denary 186)
4.
Checksum = 10111010

71

CHECKSUM

​A system uses the checksum method for error detection. The data to be transmitted is divided into three 8-bit blocks:

Block 1: 10101100

Block 2: 11110000

Block 3: 00011110

Calculate the checksum value that will be transmitted with the data.
(At the receiver side, the data blocks received are:
Block 1: 10101100

Block 2: 11110000

Block 3: 00011111

Solution:
Sender side:

1. Convert each block to denary:
Block 1 = 172

Block 2 = 240

Block 3 = 31

2. Add them together:
172 + 240 + 31 = 443
3. Compare with checksum (denary 186).

Expected total (with checksum) = 442

Actual total (with checksum) = 443

Take lower 8 bits = 10111010 (denary 186)
Since they are different, an error occurred during transmission.

72

Echo Check

Echo check is an error detection method used during data transmission. The idea is simple:

The sender transmits the data to the receiver.

The receiver immediately returns the same data back to the sender (an “echo”).

The sender compares the returned data with the original data it sent.

If the two sets of data match THEN transmission is considered correct.

If they don’t match THEN an error has occurred.

media

73

Echo Check

Step-by-Step Example

  • Sender transmits the binary sequence: 1011001

  • Receiver gets it and immediately sends back: 1011001

  • Sender compares:

    • If returned = original then data accepted.

    • If returned ≠ original (e.g., 1011101) then error detected.

media

74

Echo Check

A company is transmitting employee records to a remote server. The system uses an Echo Check to verify the accuracy of data transmission.

(a) Describe how an echo check works.

(b) State one advantage and one limitation of using an echo check.

75

Echo Check

A company is transmitting employee records to a remote server. The system uses an Echo Check to verify the accuracy of data transmission.

(a) Describe how an echo check works.
The data is sent from the sender to the receiver.

The receiver immediately returns the same data back to the sender.

The sender compares the returned data with the original to check for errors.

(b) State one advantage and one limitation of using an echo check.
Advantage: Easy/simple to implement.

Limitation: Requires two-way communication, doubles transmission time, or only detects but does not correct errors.

76

CHECK DIGITS

Worked Example (ISBN-13)

Number (first 12 digits): 7 9 8 1 3 1 6 4 0 6 1 5

  • Multiply alternately by 1 and 3:
    7×1 + 9×3 + 8×1 + 1×3 + 3×1 + 1×3 + 6×1 + 4×3 + 0×1 + 6×3 + 1×1 + 5×3
    = 7 + 27 + 8 + 3 + 3 + 3 + 6 + 12 + 0 + 18 + 1 + 15 =
    103

  • 103 mod 10 = 3 → check digit = 10 − 3 = 7

Final ISBN-13: 798131640615 7

media

77

CHECK DIGITS

Worked Example (ISBN-10)

Number (first 9 digits): 0 3 0 6 4 0 6 1 5

  • Multiply each digit by descending weights 10 to 2:
    (0×10) + (3×9) + (0×8) + (6×7) + (4×6) + (0×5) + (6×4) + (1×3) + (5×2)
    = 0 + 27 + 0 + 42 + 24 + 0 + 24 + 3 + 10 =
    130

  • 130 mod 11 = 9 → check digit = 11 − 9 = 2

Final ISBN-10: 0 3 0 6 4 0 6 1 5 2

media

78

CHECK DIGITS

A formula is applied to the main digits (weights, sums, or modulus calculations).

The result is turned into the check digit.

The number is stored or transmitted with this extra digit.

When the number is received or entered, the same calculation is repeated:

If the check digit matches then data accepted.

If not then error detected.

79

CHECK DIGITS

A check digit is an extra digit added to the end of a number (like ISBN, credit card, or barcode) to detect errors during data entry or transmission.

It is calculated from the other digits using a specific algorithm.

If the check digit does not match when the number is re-calculated, an error has occurred.
it use to detect common errors such as mistyping a digit e.g., typing 6 instead of 8 and swapping digits e.g., typing 27 instead of 72. Also, to reduce incorrect data being accepted into systems.

Examples of Systems Using Check Digits

  • ISBN-10 and ISBN-13 for books.

  • Bank account numbers and credit cards (Luhn algorithm).

  • Barcodes on products in supermarkets.

80

​A company librarian is entering new books into the computerized library system. Each book has a unique International Standard Book Number (ISBN). To check for transmission errors, the librarian uses ISBN check digit algorithms. (a) Using the ISBN-10 algorithm, calculate the check digit for: 1 5 1 0 4 5 7 5 9
b) Using the ISBN-13 algorithm, calculate the check digit for:
7 7 9 1 5 1 1 4 5 7 6 9


You will compute or find the check digit here

81

​A company librarian is entering new books into the computerized library system. Each book has a unique International Standard Book Number (ISBN). To check for transmission errors, the librarian uses ISBN check digit algorithms. (a) Using the ISBN-10 algorithm, calculate the check digit for: 1 5 1 0 4 5 7 5 9
Rule:

Multiply the first 9 digits by weights 10 down to 2, sum the products.

Choose check digit d₁₀ so that total sum + d₁₀ is divisible by 11.

If the check digit is 10, write X.

media

82

(a) Using the ISBN-10 algorithm, calculate the check digit for: 1 5 1 0 4 5 7 5 9
Rule:

Multiply the first 9 digits by weights 10 down to 2, sum the products.

Choose check digit d₁₀ so that total sum + d₁₀ is divisible by 11.

If the check digit is 10, write X.
Sum of products = 173

173 mod 11 = 8

Check digit d₁₀ = 11 − 8 = 3

ISBN-10: 1 5 1 0 4 5 7 5 9 3

Answer is 3

media

83

​A company librarian is entering new books into the computerized library system. Each book has a unique International Standard Book Number (ISBN). To check for transmission errors, the librarian uses ISBN check digit algorithms. b) Using the ISBN-13 algorithm, calculate the check digit for:
7 7 9 1 5 1 1 4 5 7 6 1


Rule:

1. Multiply the first 12 digits alternately by 1 and 3 (starting with 1), sum the products.

2. Check digit d₁₃ = the number that makes the total a multiple of 10.

3. Equivalently: d₁₃ = (10 − (sum mod 10)) mod 10.

media

​Sum = 7 + 21 + 9 + 3 + 5 + 3 + 1 + 12 + 5 + 21 + 6 + 3 = 96

84

Rule:

1. Multiply the first 12 digits alternately by 1 and 3 (starting with 1), sum the products.

2. Check digit d₁₃ = the number that makes the total a multiple of 10.

3. Equivalently: d₁₃ = (10 − (sum mod 10)) mod 10.
Find remainder (mod 10)
96 mod 10 = 6
Calculate check digit

d₁₃=(10−(summod10)) mod 10
= (10 − (96-10)
=
4


or = 10 - remainder
= 10-6
=4
Check digit is 4

media

The ISBN-13 check digit is 4.

So the complete ISBN-13 is:

7 7 9 1 5 1 1 4 5 7 6 1 4

85

media

​Automatic Repeat reQuest (ARQ)

Automatic Repeat reQuest (ARQ) is an error detection and correction method used in data transmission. It ensures that the data received is exactly the same as the data sent by using acknowledgments (ACKs), negative acknowledgments (NACKs), and timeouts. It combines: Error detection (using methods like parity check, checksum). Error correction (by retransmitting incorrect data).

86

Example:

Imagine a student downloading a file.
The file is divided into packets, and each packet is sent and checked by the receiver.
If a packet arrives correctly, the receiver sends back an acknowledgment (ACK).
If a packet is corrupted or missing, the receiver either sends a negative acknowledgment (NACK) or the sender detects a timeout, and the packet is retransmitted.

This process continues until the entire file is received correctly.

87

Types of ARQ

Positive ARQ

  • Receiver only sends back an ACK when the data is correct.

  • If the sender does not receive an ACK within the timeout, it resends the data.

Negative ARQ

  • Receiver sends a NACK if an error is detected.

  • Sender immediately retransmits the data.

88

​Automatic Repeat reQuest (ARQ) Definition

How ARQ Works:

Sender transmits data in packets.

Receiver checks the data using an error-detection method (parity, checksum, etc.).

If correct:

  • The receiver sends back an ACK (acknowledgment).

If incorrect:

  • The receiver sends a NACK (negative acknowledgment), or

  • If the sender does not receive an ACK within a certain timeout period, it assumes the packet was lost or corrupted.

Sender retransmits the packet until it is received correctly.

This guarantees that no corrupted data is accepted.

89

Encryption

Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable code) using a mathematical algorithm and a key.

It protects data during storage or transmission so that only authorized users can read it.

Decryption is the reverse process: converting ciphertext back into plaintext using a key.

90

media

91

media

92

media

93

Multiple Choice

Which error detection method uses a mathematical calculation on the data?

1

Check digit

2

ARQ

3

Parity check

4

Checksum

94

Fill in the Blank

Plain text is encrypted into ______ text.

95

Fill in the Blank

Plain text is encrypted into cipher text
using a ______ key

96

Fill in the Blank

The encrypted data is then transmitted from the

sender to the receiver. The encrypted data is then decrypted using a _______ key

97

Multiple Select

Which improvements would be made if parallel transmission is used instead of serial transmission? Choose possible answer.

1

More than one bit is transmitted at the same time, making transmission faster over short distances.

2

The data may be transmitted faster. 

3

The cost of the transmission medium is reduced.

4

Data can travel longer distances without errors.

5

Data can only be sent in one direction at a time.

98

Multiple Select

Which of the following describe the checksum process? Select ALL possible answer.

1

The data is divided into blocks or packets before transmission.

2

The receiver recalculates the checksum value from the received data.

3

Each block of data is added together using a formula to produce a value called the checksum.

4

If the calculated checksum matches the transmitted checksum, the data is assumed to be error-free.

5

The checksum value is appended to the end of the data before transmission.

99

Multiple Choice

Describe how positive automatic repeat requests (ARQs) operate to check for errors.
Which of the following BEST describes the process?

1

The receiver sends an acknowledgment (ACK) back to the sender when data is received correctly; if no acknowledgment is received, the sender retransmits the data.

2

The receiver automatically fixes errors in the received data and continues without informing the sender.

3

The sender adds extra parity bits to every packet so the receiver can always detect and correct errors without feedback.

100

Multiple Choice

A byte of data is transmitted using odd parity. The byte 1011001 is sent with an extra parity bit. What should the parity bit be?

1

0

2

1

3

Cannot be determined

4

No parity bit needed

101

Multiple Choice

Which of the following is an error detection method used in data transmission?

1

Parity Check, CheckSum, Echo Check

2

Parity Check, CheckSum, Echo Check, ARQ

3

Parity Check, CheckSum, Echo Check, ARQ, ISBN, Compression, Encryption, Decryption

4

Parity Check, CheckSum, Echo Check, ARQ,, ISBN

102

Multiple Choice

Which error detection method works by the receiver sending the received data back to the sender for comparison?

1

Parity check

2

Checksum

3

Echo check

4

Automatic Repeat reQuest (ARQ)

103

Multiple Choice

Which error detection method involves adding up all the data values and sending the total with the data?

1

Parity check

2

Cipher key

3

Checksum

4

Echo check

104

Multiple Choice

Which of the following is the main limitation of a parity check?

1

It cannot detect when an even number of bits have changed.

2

It requires too much processing power.

3

It increases data size by one extra byte.

4

It cannot detect a single-bit error.

105

Multiple Choice

Which of the following error detection methods can also be combined with ARQ Automatic Repeat reQuest to request retransmission of corrupted data?

1

Parity check

2

Checksum

3

Both A and B

4

Neither A nor B

106

Multiple Choice

In Positive ARQ, what happens if the sender does not receive an acknowledgment (ACK) within a set time?

1

The sender retransmits the data.

2

The receiver automatically fixes the error.

3

The sender stops sending any further data.

4

The sender assumes the data was received correctly.

107

Open Ended

Explain how Automatic Repeat Request (ARQ) ensures error-free data transmission.

108

Open Ended

A student is downloading a file from the internet. Describe how ARQ is used to make sure the file is received without errors.

109

Multiple Choice

Which of the following describes how ARQ works?

1

The data is sent twice and compared.

2

The receiver checks the data and requests retransmission if errors are found.

3

An extra parity bit is added to make the number of 1s even.

4

The checksum is calculated and compared at the sender only.

110

Open Ended

State the difference between positive ARQ and negative ARQ.

111

Multiple Choice

During a video call of Sunoo, one packet is corrupted. The receiver detects the error and does not send an acknowledgment. After a timeout, the sender transmits the packet again.

1

Parity check

2

Checksum

3

ARQ

4

Echo check

112

Multiple Choice

Which of the following best describes symmetric encryption?

1

Uses one key for encryption and decryption

2

Uses two different keys for encryption and decryption

3

No keys are required

4

Uses only a public key

113

Multiple Choice

Why is asymmetric encryption slower than symmetric encryption?

1

It can only encrypt small files

2

It always requires digital signatures

3

It requires data to be transmitted twice

4

It uses longer keys and more complex algorithms

​DATA TRANSMISSION

By Casielyn Capistrano

media

Show answer

Auto Play

Slide 1 / 113

SLIDE