2 Data transmission Flashcards

1
Q

What is data broken down into when transmitted?

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different sections of a data packet?

A

Packet header, payload, trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the packet header contain?

A

Destination address, packet number, originators address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the payload of a packet? How is the data overall transmitted?

A

The actual data being transmitted. The data is broken into many small units and sent as the payload in each packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the trailer (footer) of a packet?

A

Contains marker to indicate it is the end of the packet, and the data for any error detection systems used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the addresses in the packet header of a packet (type)? What is this type of address?

A

Normally internet protocol (IP) addresses, unique address given to a device when it is connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is packet switching?

A

A method of transmitting data across a network, each packet able to take an individual pathway across the network to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a router and what does it do in packet switching?

A

A network component which examines a data packet to obtain its destination address and then decides which pathway to send the packet along to reach this address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a network?

A

Computers and devices joined together using cables or wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different types of data transmission methods?

A

Serial, parallel (number of wires); simplex, half-duplex, full-duplex (direction of data transmission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is serial data transmission and where might it be used?

A

A transmission method where data is sent one bit at a time down a single wire, suitable for transmission over long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the advantages and disadvantages of serial data transmission?

A

Should arrive in order, lower chance of data skewed; less chance of interference; cheaper; transmission slower; additional data needed to indicate transmission start and stop (start bit and stop bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is parallel data transmission and where might it be used?

A

A transmission method where data is sent multiple bits at a time down multiple wires, suitable for transmission over shorter distances, approximately 5 metres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the advantages and disadvantages of parallel data transmission?

A

Transmission quicker; many devices use parallel transmission internally, no need to convert to serial transmission to transmit across network; bits don’t arrive in order, higher chance of skewed; more chance of interference and error in data; more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is simplex data transmission and where might it be used?

A

Transmission method where data is transmitted in single direction only, used when connecting a keyboard to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is half-duplex data transmission and where is it used?

A

Transmission method where data is transmitted it both directions, but only one direction at a time, Wi-Fi uses half-duplex data transmission

17
Q

What is full-duplex data transmission?

A

Transmission method where data is transmitted in both directions simultaneously, used in telephones

18
Q

What is the universal serial bus (USB)?

A

An industry standard used to transmit data

19
Q

What is a USB port?

A

A socket which is part of a device or computer that enables a USB cable or USB device to be inserted

20
Q

What is a USB cable?

A

A type of transmission media that uses the USB method to transmit data, can be used to connect devices

21
Q

What is a USB connection?

A

Collective name for using a USB cable plugged into a USB port to transfer data, special type of connection designed to transmit data at high speeds

22
Q

What is a USB device?

A

A device that plugs into a USB port on a computer and transmits data using a USB connection

23
Q

What are the advantages and disadvantages of the USB interface?

A

Simple interface, less error in devices likely to be made; speed relatively high; USB interface is universal standard; connections after first shouldn’t need download of drivers; connection can power a device; USB cable length limited, normally to 5 metres; speed not as high as other connection types like ethernet

24
Q

What is ethernet?

A

A type of connection that can be used to transmit data within a network

25
Q

What are error detection methods?

A

Procedures used to detect errors in data so actions can be taken to correct them

26
Q

What are some error detection methods?

A

Parity check, checksum, echo check, automatic repeat request (ARQ), check digit

27
Q

What is a parity check and how does it work?

A

A type of error detection method that adds an additional parity bit to each byte to create odd or even sum of 1s, (depends on odd or even parity check used), if device finds byte with number of 1s different from parity check, it knows error has occurred

28
Q

What is a checksum and how does it work?

A

An error detection method which performs a calculation on data to create checksum value, added to data and value calculated from received data, two values compared, if different, an error has occurred and been detected

29
Q

What is an echo check?

A

An error detection method where receiving device transmits received data back to sending device, which compares data. If data sent and received doesn’t match, error has occurred and is detected

30
Q

What is an automatic repeat request and its ways of operating?

A

An error detection method where acknowledgement whether data is received correctly or not, and timeout, a period of time set and used to wait for an acknowledgement to be received, are used, ARQ can operate using a positive or negative acknowledgement method

31
Q

How does the positive acknowledgement method of an automatic repeat request (ARQ) work?

A

The receiving device sends a positive acknowledgement back to sender when no errors detected, next data packet send; if sender doesn’t receive positive acknowledgement in time, timeout occurs and sender keep resending data packet until positive acknowledgement received or a limit reached

32
Q

How does the negative acknowledgement method of an automatic repeat request (ARQ) work?

A

If receiving device detects errors, negative acknowledgement sent back to sender, after which sender resends data packet, if sender doesn’t receive negative acknowledgement within set timeframe, next data packet sent

33
Q

What is a check digit and how does it work?

A

An error detection method used for data entry, check digit value previously calculated and stored with data, check digit recalculated when data is entered, if check digits don’t match, data entered is incorrect

34
Q

What is encryption?

A

A method of securing data for storage or transmission that scrambles it and makes it meaningless

35
Q

What is plain and cipher text, and how is the latter generated?

A

Data before encryption is plain text, an encryption key is an algorithm which is used to scramble the data and make it meaningless, the result being cipher text

36
Q

What are the two main methods of encryption?

A

Symmetric and asymmetric encryption

37
Q

What is symmetric encryption?

A

Plain text is encrypted into cipher text using encryption key, cipher text and encryption key are separately sent to receiving device, which uses same key to decrypt cipher text back into plain text

38
Q

How does asymmetric encryption work?

A

Plain text encrypted into cipher text using public key, cipher text transmitted to receiving device, cipher text decrypted using a private key, cnanot be decrypted using the public key