2.2 Error Checking Flashcards

1
Q

why do we need error checking

A

with the complexity of computers and vast amount of 1s and 0s being transmitted, there is always room for error, data corruptions or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how can errors occur in data transmission

A

electrical interference such as electrical fields or waves can cause data to be corrupted, ie 1s become 0s or lost
packet switching can be incorrect and packets can be lost enroute or corrupted or gained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the reasons for transmission errors

A

, imperfections in the wire, or electricl fields or intereference with the wire, can be stopped with insulating outer material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the common methods of error checking

A

parity checks
parity block checks
checksums
echo checks
check digits
ARQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a parity check

A

a error detection method that stores the most significant bit (MSB = the biggest bit) as a parity bit to show the amount of 1s in a byte as odd or even
example 10001001 using odd parity
the 1 at the start, MSB, means that the amount of 1s are odd, there are 3 ones in that byte so there is no error according to the parity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pros and cons of parity check

A

simple errors can be found however the exact corrupted bit cannot be identified as the computer recognises if its odd or even, so any bit can be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how can you advance parity checks to detect the exact bit and correct it

A

parity block checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are parity block checks

A

when a whole block of bytes has been sent, parity checks can be used horizontally an vertically to identify the exact bit corrupted and fix the error without asking for a retransmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is checksum

A

an error detection method where a set of bytes is sent along with an extra byte which is a checksum used to evaluate the data at the reciever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does checksum works

A

an extra checksum byte is added, this checksum is calculated using a pre agreed algorithm and send along with the data, the reciever recalculated the checksum using the same preagreed algorith, generating another checksum, if both sender and reciever checksums match then the data is error free, otherwise not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is an echo checkk

A

when the sender sends the data and reciever resends what it has recieved to the sender in order for it make sure what the sender has recieved is the same than what it has sent, if it does not match then the data is resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a con of echo check (2)

A

you cannot tell wether the data has been corrupted while sending, or corrupted while being recieved
it also creates unessesary network traffic because 2-3 transmissions are send back and forth for one set of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are check digits

A

the last digit in a code calculated with an algorithm used the predescesing digits in order to check for errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are check digits used for

A

in order to detect errors during data entry normally caused by mistyping or scanning error ig barcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are check digits used IN

A

ISBN NUMERS
bank card numbers
VIN car numbers

16
Q

how to calculate check digits using modulus 11

A
  • from left to right, give the numbers a weighting of 10-2
  • multiply the numbers with their weighting
  • add all the sums up
  • divide by 11 and the remainder will become the check digit
17
Q

how to check a check digit

A
  • from left to right, give the numbers their weighting INCLUDING the check digit
  • multiply the numbers with their weight, INCLUDING the check digit
  • add all the sums up
  • divide by 11 and if the remainder is 0, the check digit is correct
18
Q

what are some commen errors in data entry

A

incorrect digits entered

transposition errors, so 493 becomes 439

phonetic errors like 13 instead of 30

omitted extra digits, like 4567 instead of 456

19
Q

what is ARQ

A

Automatic Repeat reQuest or Query
an error detection method

20
Q

how does ARQ check errors

A

the sender sends a data packet along with an error detection code, usually a Cylic redundancy code or CRC, the reciever the checsk for errors, if there are no errors then it sends an acklowedgement signal either acknowledging it was error free or not, if it was error free then the sender does not resend the data, otherwise it does. the sender has a time limit of recieving an acknowledgement signal and if it doesnt not recieve anything before a timelimit, then it will keep resending the data unless there is a cap on the amount of times it will resend it

21
Q

what is enryption

A

encoding a message so it can only be read by the sender and recipient

22
Q

what is symmetric encryption

A

when one key is used to encrypt and decrypt data being sent

23
Q

what are the drawbacks of symmetric encryption

A

very prone to data interception and can be encrypted with a key copy

24
what is assymetric encryption
when 4 keys are used to encrypt and decrypt data, a public key and private key the recievers public and recievers private both sender and reciever exchange public keys and if a message is encrypted using person A private key, it can be decrypted by Person B with Person As public key, the public key is public and can be used by anyone however the private key is private and never shared
25
how does assymetric encryption authentic user messages
By using a private key to encrypt data to be sent, you might think why would you do this because it can be decrypted using a public key, however if it CAN be decrypted using a public key it shows that the message has came from the private key, authenticating the message, but for the encryption to not be intercepted the private key ALONG with the public key is used togethor, a combined encryption key, so the private to public authenticates message, and the public to private encrypts it