Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views4 pages

Data Transmission Summary Fixed

Uploaded by

nawabharis2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

Data Transmission Summary Fixed

Uploaded by

nawabharis2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 2: Data Transmission

Data Transmission

- Data transmission is the movement of data as bits between devices. This can happen through
cables like copper wire, optical fiber, or wirelessly.
- Key things to consider:
- How data is sent.
- How to detect and fix errors.
- Using encryption to keep data safe.

Transmission of Data

- Data is sent in small parts called packets.


- Packets are easier to manage than sending a huge file in one go.
- Advantage: If a path is busy or broken, packets can take other routes.
- Disadvantage: Packets must be reassembled at the end.

Data Packet Structure

- Header: Contains sender and receiver IPs, packet number, and size.
- Payload: The actual data (about 64 KiB).
- Trailer: Marks end of packet and includes error check (using CRC).

Packet Switching

- Packets take different paths based on router decisions.


- Sometimes packets arrive out of order and need rearranging.
- Benefits:
- No need to reserve a whole line.
- Can handle busy/faulty routes.
- Easy to expand and high speed.
- Drawbacks:
- Packets can be lost.
- Delay while reordering.
- Problems with live streaming.

Hopping
- Prevents packets from getting stuck by using a hop number that decreases at each router.
- If it hits zero, the packet is deleted and must be resent.

Data Transmission Modes

- Simplex: One-way only (e.g., keyboard to computer).


- Half-Duplex: Two-way but one at a time (e.g., walkie-talkie).
- Full-Duplex: Both ways at the same time (e.g., phone calls).

Serial vs. Parallel Transmission

- Serial: Sends one bit at a time (simple, cheap, but slow). Used in USBs and long distances.
- Parallel: Sends multiple bits at once (fast but can get messy over distance). Used inside computers
and for printers.

USB (Universal Serial Bus)

- Standard port for connecting devices.


- Supports both half and full-duplex.
- Advantages: Auto-detects devices, standard, fast.
- Disadvantages: Limited to 5 meters, older versions are slower, and even new versions are slower
than Ethernet.
- USB-C: New version with faster speeds, more power, and reversible connector.

Error Detection Methods

- Important because data can get corrupted by interference or lost packets.

Parity Check

- Adds an extra bit (parity bit) to check for errors.


- Uses even or odd parity rules.
- Drawback: Might miss errors if two bits get swapped.

Parity Block

- Checks both rows and columns in a block of data.


- Can detect and locate a single error.

Checksum
- Sends data with a calculated total (checksum).
- Receiver recalculates and compares to check for errors.

Echo Check

- Data is sent and then echoed back.


- Sender compares both copies.
- Drawback: Extra data sent and can't tell where the error occurred.

Check Digit

- Extra digit in codes (e.g., barcodes, ISBNs) to check correctness.


- Detects common mistakes like wrong numbers or swapped digits.
- Uses algorithms like modulo 11.

Automatic Repeat reQuest (ARQ)

- Uses acknowledgments (ACKs) and timeouts.


- If no ACK is received, data is resent.
- Used in mobile networks.

Encryption

- Protects data from hackers by turning it into unreadable form.


- Even if data is intercepted, encryption makes it useless without the key.

Types of Encryption

- Symmetric Encryption: Uses the same key to encrypt and decrypt.


- Problem: Key needs to be shared, which can be risky.
- Asymmetric Encryption: Uses two keys: Public (shared) and Private (secret).
- Sender uses the receiver's public key to encrypt.
- Receiver uses their private key to decrypt.
- Safer because private key is never shared.
- Used in banks and secure websites.

Key Terms

- Packet Switching: Breaks message into packets that take different paths.
- Router: Decides packet paths.
- Simplex/Half-Duplex/Full-Duplex: Types of data direction.
- Serial/Parallel: Ways to send data (bit by bit vs. many bits at once).
- Error Checks: Parity, checksum, echo, check digit, ARQ.
- Encryption: Turns data into secret code (Symmetric/Asymmetric).

You might also like