Chap 2.2 / 3 - error checking, encryption Flashcards

1
Q

types of error checking

A

-Cyclic Redundancy Checks (CRC)
-Check digit (ISBN-13 / Modulo 11)
-Checksum
-Echo check
-Parity Checks
-Automatic Repeat Request (ARQs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which error checking check following transmission

A

-parity checks
-echo checks
-checksum
-ARQs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define CRC

A

-type of error checking where the no. of 1’s are counted and put as a Hex value in the trailer to be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does CRC work

A

-count no. 1’s
-put value as Hex in the trailer
-receiving comp counts no. 1’s & CRC
-if match = no error; no match = error & packet resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why do you need to check for errors

A

-risk that data may be tampered with during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Errors can occur due to:

A

-interference = all cables can suffer from electrical interference
-problems during packet switching
-skewing of data = in parallel transmission, bits arrive out of sync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define parity checking

A

-type of error checking where a parity bit is added based on the chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

define parity bit

A

-extra bit added based on the chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does Parity Check work

A

-choose even or odd
even:
-count no. 1’s
-if even, parity bit = 0; if odd, parity bit = 1
odd:
-count no. 1’s
-if odd, parity bit = 0; if even, parity bit = 1

-receiving comp checks if no. 1’s matched chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to find faulty bit in parity check

A

-Criss cross method
-count no. 1’s in each column & row (parity bit & byte), find one that doesn’t match chosen parity system
-find intersection point
-can determine which digital stream was changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define checksum

A

-type of error checking where a checksum is calculated form the data using and agreed algorithm & transmitted with the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how does checksum work

A

-calculate checksum from agreed algorithm
-checksum is sent with data
-receiving comp recalculates checksum & compares them
-if match = no error; no match = error & resend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define Echo check

A

-type of error checking where sent data is sent back to sender to check if any error occurred during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does echo check work

A

(don’t know if error happened at 1 / 2 transmission)
-data is sent
-copy of data is sent back to sender
-returned & og data are compared
-no diff = no error, yes diff = yes error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define check digit

A

-final digit in code calculated from all other digits in the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

types of check digit

A

-ISBN-13
-Modulo 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what can check digits identify

A

-incorrect digit entered
-transposition error occurred
-omitted or extra digits
-phonetic errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how is check digit used

A

-check digit is calculated by human & added to code
-human types numerical code
-comp. calculate check digit based on numerical code & compare with human check digit
-no match = human made an error
-asked to re-enter code

19
Q

ISBN 13 algorithm

A

1)from left to right, first digit is odd
2)-add all no.s in odd index sequence
2)-add all no.s in even index sequence x 3
3)- 1) + 2) / 10
4)- if remainder = 0, use
5)- else 10- remainder
6) do same for recalculation, 0 = corret transmission

20
Q

Modulo-11 algorithm (generation)

A

1)-each digit has weighting starting from 2 from right
2)-each digit x their weighting and add all
3)-total / 11
4)-if remainder = 10, check digit = X
5)-else 11- remainder

21
Q

Modulo-11 algorithm (recalculation)

A

1)-each digit has weighting starting from 1 from right to end
2)-each digit x their weighting and add all
3)-total / 11
4)-if remainder = 0, no. is correct

22
Q

diff btw Checksum & check digit

A

checksum:
-calculated from block of data
-sent with block of data
-recalculated at receiving
-if diff = error occurred
-used to check errors flowing data transmission
check digit:
-final digit in code
-calculated form other digits in code
-used to check errors during data entry
-detects, incorrect digit entered, transposition error occurred, omitted or extra digits, phonetic errors

23
Q

define ARQs

A

-type of error checking where an ( - )/( + )acknowledgment is sent within the timeout before the data is resent

24
Q

how does ARQs work

A

-data is sent to receiver with an error detection code
-no error = ( + ) acknowledgment, no resend
-yes error = ( - ) acknowledgment, yes resend
-no acknowledgment within timeout = yes resend

25
Q

define acknowledgement in ARQS

A

-message sent to sender indicated if data had errors during transmission

26
Q

define timeouts in ARQS

A

time interval allowed to elapse before an acknowledgment is received

27
Q

define plain text

A

-og messge

28
Q

define cipher text

A

-texts following and encryption algorithm

29
Q

why is encryption used

A

-to make data transmission safe
-no interception not guaranteed but data will make no sense

30
Q

types of encryption

A

-symmetric
-asymmetric

31
Q

define pub. key

A

-key known to all users

32
Q

define pvt. key

A

-key used to decrypt for asymmetric encryption

33
Q

define shared secret

A

-key used to encrypt & decrypt for symmetric encryption

34
Q

how does symmetric encryption work

A

-public key is used to encrypt & decrypt plain & cipher texts btw Alice & bob
-2 pub keys

35
Q

how does asymmetric encryption work

A

-Alice gives out pub. key to Bob to encrypt plain text
-cipher text is decrypted using Alice’s pvt. key
-only Alice has pvt. key
-pub, & pvt, keys are mathematically linked tgt
-pub & pvt key

36
Q

how does end-to-end encryption work

A

-Alice & Bod each have pub. & pvt. keys
-they send pub. keys
cipher text send to each other can be decrypted by their own pvt. key

37
Q

describe a situation where parity check wouldn’t identify which bit has been transmitted incorrectly

A

-even/ odd no. errors so if (parity type) retained
eg, 2 bits have changed

38
Q

how does encryption improve security

A

-encrypted text is meaningless
-need a key to decrypt

39
Q

how to make encryption more secure

A

-add more bits to the key so less chance of decryption by brute force

40
Q

3 differences between symmetric & asymmetric encryption

A

-sym uses the same keys for encryption and decryption but asym uses 2 different keys for encryption and decryption
-asym has a pvt key but sym does not
-asym is used for secure key exchange but sym is used for bulk data transmission

41
Q

how does a data logger calculate the parity bit

A

-count the number of 1’s in the first 7 bits
-add a 0 or 1 depending on the parity type

42
Q

role of parity byte in error detection

A

It provides a means to check for errors by ensuring that the total number of 1s in the byte is even or odd

43
Q

disadvantage of symmetric encryption

A

security problem when transmitting encryption key

44
Q

define symmetric encryption key

A

-sender & receiver use same key to encrypt & decrypt message