Professional Documents
Culture Documents
Data Transmission
Data Transmission
BOOK NAME:
SUBJECT CODE:
Chapter 3: Hardware
Computer Architecture
Input and Output Devices
Data Storage
Network Hardware
Chapter 2:
PAGE 45
Chapter 2: Data Transmission
This would be of great benefit if a transmission route was out of action or very
busy.
The drawback of splitting data into packets is the need to reassemble the
data when it reaches its destination.
Structure of a packet
Packet header consists of:
The IP address of sending device
The IP address of receiving device
Sequence number of the packet—to ensure all data packets can be reassembled into the
correct order.
Packet size—to ensure that all packets have arrived intact.
3.
the method of transmission (for example, how many bits can be sent
at the same time)
how will data be synchronized (that is, how to make sure the
received data is in the correct order).
Simplex data transmission:
Simplex occurs when data can be sent in ONE
DIRECTION ONLY (for example, from sender to
receiver). An example of this would be sending data
from a computer to a printer.
Half-duplex data transmission
Half-duplex occurs when data is sent in BOTH
DIRECTIONS but NOT AT THE SAME TIME (for example,
data can be sent from 'A' to 'B' and from 'B' to 'A' along
the same transmission line, but they can't both be done
at the same time). An example of this would be a
walkie-talkie where a message can be sent in one
direction only at a time; but messages can be both
received and sent.
Full-duplex data transmission
Full-duplex occurs when data can be sent in BOTH
DIRECTIONS AT THE SAME TIME (for example, data can
be sent from 'A' to 'B' and from 'B' to 'A' along the same
transmission line simultaneously). An example of this
would be a broadband internet connection
Types of data transmission
Serial
Serial data transmission occurs when data is
sent ONE BIT AT A TIME over a SINGLE
WIRE/CHANNEL. Bits are sent one after the
other as a single stream.
This method of error checking is similar to a traditional parity check except the data
is arranged in a virtual table with parity bits added to each row and column.
A single corrupted bit can be spotted at the intersection of a corrupted row and
column.
https://www.youtube.com/watch?v=jLuj62Gq-1I&t=69s
Checksum
https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-
checksum
Checksum
A block of data is sent alongside a calculated checksum value. The receiving computer
also calculates what it believes should be the checksum. The checksum values are then
compared to see if an error has occurred during transmission.
Method
The sending computer uses the block of data to be sent, and a predefined
mathematical algorithm, to calculate a checksum value.
The sending computer sends the data, plus the checksum value
The receiving computer uses the data it receives to also calculate what it believes should
be the checksum, using the same mathematical algorithm
Due to the nature of the algorithm, it is highly unlikely that corruption has occurred if the
checksum values match. If the checksum values don’t match, the receiving computer
requests that the data is transmitted again
Echo Check
With an echo check, the receiving computer sends a copy of the data immediately back to
the sending computer for comparison.
The sending computer compares the two sets of data to check if any errors occurred during
the transmission process.
If an error has occurred, the data will be transmitted again.
Marked Homework:
Use the internet to research how half-duplex data transmission
is used to create a wi-fi connection. Why is half-duplex, rather
than full duplex data transmission used in wi-fi connection?
Check Digit
A check digit is the final digit in a code of numbers.
It is calculated from all the other digits in the code.
It’s purpose is to spot human errors on data entry.
Check digits are often found in barcodes, product codes or ISBN book numbers.
There are many different mathematical algorithms that can be used to calculate a check digit. Different industries
will have their own preferred method.
Method
1.The check digit is calculated and added to the barcode, packaging, product code etc at the point of
manufacture. A human types the long numerical code into a computer, e.g. the cashier will type the barcode
number when a scanner fails or packaging is damaged. The computer calculates what it believes should be the
check digit, based on the numbers entered by the human.
2.The computer then compares it’s calculated check digit with the check digit typed in by the human (the last digit
in the long code). If the two don’t match, then the human has made an error when typing in the numerical code,
e.g. barcode number.
3.The human will be asked by the computer to re-enter the numerical code
Benefits
Good for spotting human errors such as:
• Incorrect digit entered
• Transposition of a digit or two digits
• Extra digit
Symmetric and asymmetric
encryption
https://youtu.be/o_g-M7UBqI8
Written Test of
Chapter 2 on
Monday 4 September 2023
th
Test