CH 2
CH 2
CH 2
• Router 1 As data is sent multiple bits at the As data is sent multiple bits at the
same time, the transmission of data is same time, bits do not arrive in order
• Router 2. quicker. and need to be reordered after
The pathway the second packet takes is: transmission. This increases the risk
of the data being skewed.
• Router 1
Many computers and devices use As data is sent along multiple wires,
• Router 4 parallel data transmission to transmit there is more chance of interference.
• Router 5. data internally. Therefore, there is no This means there is more chance of
requirement to convert this to serial error in the data.
The pathway the third packet takes is:
data transmission to transmit the data
• Router 1 across a network.
• Router 3 Multiple wires are needed for a
• Router 2. parallel transmission cable, therefore,
it is more expensive to manufacture
The pathway the fourth packet takes is: and also more expensive to buy.
• Router 1 Table 2.2: Advantages/disadvantages of parallel data transmission
• Router 4
• Router 3 Parallel transmission has an increased chance of data being skewed and an
increased chance of interference. This makes it more suitable for the
• Router 5. transmission of data over shorter distances. This is often limited to
The pathway the fifth packet takes is: approximately 5 metres.
• Router 1 Question
• Router 3
5 A marketing company prints leaflets to deliver to people’s houses. The
• Router 5. leaflets are designed on a computer and sent to a large printer that is 3
Draw a copy of the diagram of a network. Use coloured pens to draw the metres away. Large numbers of leaflets need to be printed in a short
pathway that each of the packets of data takes. period of time, to makes sure that they are ready for delivery. Would you
use a serial or a parallel data transmission cable to connect the computer
to the printer? Why would you choose this type of cable?
Self Assessment
Simplex, half-duplex and full-duplex transmission involve the direction in
What did you do to check if your diagram is correct? Have you tried which the data is transmitted.
tracing each route to see if it goes through the correct routers?
Simplex data transmission
2.3 Methods of data transmission In simplex data transmission, data is transmitted from one device to another in
one direction only. Figure 2.5 shows an example:
You might think that there is only one method that can be used to transmit data
from one device to another, but there are actually several. You need to
understand how data is transmitted using each of these methods. These
include:
• serial
• parallel
Figure 2.5: Simplex data transmission
• simplex
• half-duplex You would only use this type of data transmission when there is no need to
• full-duplex. send data both ways between the devices. One example is connecting a
keyboard to a computer. Simplex data transmission can be used to do this as
Serial and parallel data transmission involve the number of wires that are
data only needs to be sent from the keyboard to the computer, so that the
used to transmit the data, and how many bits of data are sent at a time.
computer screen can display the keys that are pressed. There is no reason
Serial data transmission why the computer would need to send data to the keyboard, so a simplex data
transmission connection is used.
In serial data transmission, data is transmitted using a single wire. Each bit of
data is transmitted one at a time along the single wire. Figure 2.3 shows an
example:
Serial transmission has less chance of data being skewed and less chance of
interference. This makes it more suitable for the transmission of data over long
distances.
ACTIVITY 2.6
esearch the data transfer speed of USB 4; is this different to USB 1, 2 and
3? What other differences can you find between the different versions of
USB?
Questions Questions
6 Which method of data transmission sends data along a single wire? 12 What does USB stand for?
7 Which method of data transmission sends data multiple bits at a time? 13 What type of data transmission method does a USB interface use?
8 If a data transmission connection sends data one bit at a time, in both 14 What are two advantages of using the USB interface?
directions, but not at the same time, what kind of data transmission
15 Can you name five devices that are connected using a USB interface?
methods are used?
16 What is the length a USB cable limited to? Can you think why it is limited
9 What are two advantages of serial data transmission?
to this length?
10 What are two disadvantages of parallel data transmission?
11 A business manager transmits data about its customers to a central file 2.5 Detecting errors in data transmission
server. The file server is 100 metres away from the business manager’s
office. They need to be able to send and receive customer data to and The transmission of data from one device to another is often not a perfect
from the server, at the same time. The accuracy of the customer’s data is process. In the process of transmitting the data, interference can occur. This
imperative. Which methods of data transmission should be used to create can cause data to be lost, data to be gained and data to change. This would
the connection between the business manager’s computer and the file not be helpful and could also lead to many issues. If a password wasn’t
server? Why would you choose those methods? transmitted correctly, then that person may not be able to log into their account.
If a person’s address wasn’t transmitted correctly, they may not get email that
needs to be sent to them. If a person’s details are not transmitted correctly to a
ACTIVITY 2.4 company, they may not get a product or service that they order. The accuracy
of data is often vital, therefore there needs to be a procedure in place to detect
Write a data transmission scenario like the one given in Question 11. any errors in data so that actions can be taken to correct this.
Think about which data transmission methods could be used for your
scenario and why they would be the most suitable.
Peer Assessment
Give the scenario to a friend and ask them which data transmission
methods they would use. Are they the same methods that you thought
should be used? If you have chosen different methods, discuss and come
to an agreement about which methods should be used. If you chose the
same methods, see if you had the same reasons for choosing those
methods.
A USB device, such as a USB memory stick, is a device that uses the USB • echo check.
interface. It plugs into a USB port on a computer and it transmits data using a Each of these methods is designed to check for errors after the data has been
USB connection. A USB cable can be used to connect devices, such as a transmitted from one device to another.
mouse, to a computer.
A USB connection uses serial data transmission to transmit data between the Parity check
devices. However, it a special type of serial data transmission connection that A parity check can use an odd or even check method. Each byte of data has
is used that is designed to transmit data at high speeds. 7 bits and 1 extra bit that is called a parity bit (see Figure 2.11). The parity bit is
normally the first or last bit of data in the byte.
ACTIVITY 2.5
One of the issues with serial data transmission is the transmission speed
is slower than parallel. Research how a USB connection is able to
transmit data at a faster rate.
Figure 2.11: The parity bit is the first bit of data in this byte
Before transmission begins, the parity check is set to be either odd or even
parity. The number of 1s in the 7 bits of data is totalled. In the example in In a negative acknowledgement method:
Figure 2.11, the result of that would be 2. If an odd parity check is used, then a • The sending device transmits the first data packet.
1 is added as a parity bit. This is because all the 1s in the byte now add up to
3, which is an odd number. If an even parity check is used a parity bit of 0 • The receiving device receives the data packet and checks it for errors.
would have been added instead. This is because all the 1s in the byte would • If the receiving device detects no errors, no further action is taken.
then add up to 2, which is an even number. When the parity bit has been
added to each byte, the data can be transmitted. After transmission, the • If the receiving device does detect errors, it will send a negative
receiving device will check each byte of data for errors. If an odd parity check acknowledgement back to the sender.
has been used and the device finds a byte that has an even number of 1s, • If the sender receives a negative acknowledgement, it knows this means
then it knows that an error has occurred with this byte of data. The error is the data was received incorrectly, so it can resend the data packet.
detected!
• A timeout is set by the sending device when it sends the data. This is just
Questions so that the sending device knows that if it doesn’t receive a negative
acknowledgement back within that set time period, it doesn’t need to be
17 Which of these bytes would have been transmitted incorrectly if an even still be waiting for it and can send the next data packet.
parity check has been used?
a 10111011 ACTIVITY 2.10
b 01110111
Draw a diagram to represent how an ARQ system operates using
c 10101000 negative acknowledgement.
18 Which of these bytes would have been transmitted incorrectly if an odd
parity check has been used?
a 00110001 REFLECTION
b 10110101 After completing activities 2.8, 2.9 and 2.10: How have you made sure
c 10001000 that your diagrams for an echo check and both ARQ methods are correct?
19 Can you think of an instance in which an error could occur in the data,
but this would not be detected by a parity check?
Check digit
Checksum
You have learnt that errors, such as data loss, data gain and data being
A checksum uses a calculated value to check for errors. A value is calculated changed can occur when data is transmitted. You now know that these errors
from the data that will be transmitted, before transmission takes place. A normally occur due to interference. It is also possible for errors to occur when
method such as modulus 11 could be used to calculate the value. data entry is performed. This could be manual data entry, for example, a
human typing in a value, or it could be automatic data entry, for example, a
ACTIVITY 2.7 barcode scanner scanning a barcode to obtain the data stored in the barcode.
Use the internet to find out how the modulus 11 method calculates a value • A check digit value is previously calculated from the data that will be
from the data. You do not need to be able to remember how to do this entered at some point, for example, a barcode number or an ISBN
method of calculation for the exam, but it will help you to know how a number. This number is stored with the data.
checksum is calculated.
• When the data is entered, for example, the barcode is scanned, the check
digit is recalculated from the data entered.
Once the checksum value has been calculated it is added to the data to be • If the previously calculated check digit and the stored check digit match,
transmitted with it. After transmission, the receiving device uses the same the data entered is correct.
method to calculate a value from the received data. If the values match, then
the device knows that no error has occurred during transmission. If the values • If the previously calculated check digit and the stored check digit do not
do not match, the device knows that an error has occurred during match, the data entered is incorrect.
transmission. The error is detected! Although the process is similar, you should not confuse the operation of a
check digit and a checksum. Make sure that you take the time to understand
Questions the difference between the two.
20 What is the checksum value calculated from?
21 What happens to the checksum value when it has been calculated before ACTIVITY 2.11
transmission?
With a partner, discuss and write down the differences between a check
22 Why would checksum values that do not match show that an error has digit and a checksum.
occurred?
Echo check
COMPUTER SCIENCE IN CONTEXT
An echo check involves a simple comparison of the data sent to the data
received. The sending device transmits the data to the receiving device. The Companies will normally combine several error checking methods to
receiving device then transmits the data it receives back to the sending device. make sure that the data they transmit and receive is error free. This
The sending device compares the data it sent to the data it has received back means that the data can be checked in several ways to make sure that
from the receiving device to see if they match. If they do, then no error has any error that could occur is being checked. This is because the data that
occurred. If they don’t match, then the sending device knows the data was many companies use is vital to their business, they want to do everything
received with error. The error is detected! they can to make sure that it does not contain any errors caused by
transmitting the data.
ACTIVITY 2.8
Question
23 If the data does not match that which is sent back by the receiving
device, will this always mean that the receiving device did not receive the
data correctly? How do you know that?
ACTIVITY 2.9
A bank uses asymmetric encryption for all the banking transactions that
are completed on a daily basis. As you can imagine, the data that is
transmitted for these banking transactions is very sensitive and personal
data, so the bank has to make sure that they use a very secure method of
encryption for this process.
Questions
24 What is the name given to an encryption algorithm?
25 What is the name given to data that has been encrypted?
26 Does encryption stop data being stolen by a hacker? Why or why not?
27 Why is asymmetric encryption a more secure method of encryption than
symmetric?
EXAM-STYLE QUESTIONS SELF-EVALUATION CHECKLIST
After studying this chapter, think about how confident you are with the
1 Identify two items of data that would be included in the different topics. This will help you to see any gaps in your knowledge and
header of a packet of data. help you to learn more effectively.
[2]
2 Explain why and how packets of data are reordered after You might find it helpful to rate how confident you are for each of these
packet switching has been used to transmit data across a statements when you are revising. You should revisit any topics that you
network. rated ‘Needs more work’ or ‘Getting there’.
[2]
I can... See Needs Getting Confident
3 Describe how data is transmitted using serial half-duplex data
topic more there to move
transmission. [4] work on
4 Give two benefits of using the USB interface to connect describe the structure of a packet 2.1
hardware devices to a computer. [2] of data.
describe the process of packet 2.2
5 A company has a central file server that is located 500 m away from
switching.
the main office where employees work at their computers.
describe how data is transmitted 2.3
Employees send and retrieve files to and from the file server on a
using serial and parallel data
daily basis, often at the same time.
transmission.
Identify the type of data transmission that would be most
describe how data is transmitted 2.3
suitable for the given context. Explain why this would be the
using simplex, half-duplex and full-
most suitable method of transmission. [6]
duplex data transmission.
6 Four statements are given about error detection methods. choose a suitable data 2.3
Tick (✓) to show which statement applies to which error transmission for a given context
detection method. Some statements may apply to more than and explain why that is the best
one error detection method. [4] method of data transmission.
describe how data is transmitted 2.4
Statement Checksum Echo check Parity check using the USB interface.
This method checks for explain how errors can occur 2.5
errors in data after it has during data transmission.
been transmitted.
describe how a parity check uses 2.5
This method can use an a parity bit to detects errors.
odd or even process.
describe how a checksum value 2.5
This method sends data can be used to detect errors.
back from the receiver to
the sender to compare the describe how an echo check 2.5
data to check for errors. compares data to detects errors.
This method uses a value describe how an ARQ can monitor 2.5
that is calculated from the if data is received correctly.
data to check for errors. describe how a check digit can be 2.5
used to detect errors involving
7 The given paragraph describes how data is encrypted using data entry.
symmetric encryption. explain why data may need to be 2.6
Complete the missing terms in the paragraph using the given list. Not encrypted.
all terms need to be used. describe how data is encrypted 2.6
• a different using symmetric encryption.
• cipher text describe how data is encrypted 2.6
using asymmetric encryption.
• decrypted
• encrypted
• key
• lock
• meaningless
• plain text
• the same
• understandable
Before encryption the data is known as …………………………
. This data is encrypted using an algorithm that is known as a
………………………… . After the data has been encrypted it is
known as ………………………… . This type of data is
scrambled and ………………………… if it is stolen. When the
data is received it is ………………………… using
………………………… encryption algorithm. [6]