Data Transmission - Error Detection, Check Digits, Encryption Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

when can data transmission errors occur and what is the consequence

A
  • due to ** electrical interference**: data loss, data gain and data
    change
  • alters pattern of the 0s and 1s –> affecting the integrity / correctness of the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the most common reasons for data corruption

A
  • interference - data changed
  • packet switching - data lost or gained
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

describe the stages of a parity check

A
  1. computers can either use odd or even parity
  2. when sending data, the most significant ne bit is used as the parity bit
  3. parity bit = 1 OR 0 at the start of transmission –> makes the total number of 1s odd or even, depending on machine
  4. 1s are counted at the receiving end –> if wrong number of bits are ‘on’ or 1 –> error detected + data is resent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when is a parity block check used

A
  • used when sending multiple bytes in one transmission block
  • can locate the position of the error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when it is an even parity, what is the parity bit set to

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe the stages of error detecting using a parity block check

A
  1. each byte has its own parity bit
  2. a final parity bit is used for each column
  3. a horizontal parity check is performed on each byte –> identifies error in one of the bytes
  4. Vertical parity check performed on whole block
  5. error located + corrected without having to ask for data to be re-sent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when is a checksum used

A

to verify of data has become corrupt after a transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe the staged of a checksum

A
  1. data sent in blocks with a checksum added at the end
  2. before data is transmitted, a checksum is calculated from the block of data based on a pre-agreed algorithm
  3. Data + checksum transmitted
  4. receiving device uses the same pre-agreed algorithm to recalculate the checksum
  5. recalculated checksum is compared to original checksum –> if two checksums are the same = no errors.
  6. Otherwise, request to re-send the original data is sent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describe how an echo check is performed

A
  • data transmitted to destination device
  • recipient device returns an exact copy of data back to the originator
  • returned data is compared* with original data –> if *different = ** error occurred** + data resent –> same = data arrived without error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does ARQ stand for

A

Automatic Repeat Query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does it ensure

A

to verify that transmitted data has arrived unchanged, and error free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a positive acknowledgement in ARQs

A

message sent to the **sender **indicating that the data has been received correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a negative acknowledgement in ARQs

A

message sent to the sender indicating the data has not been received correctly + wants data resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is timeout

A
  • feature used by the sending device
  • when no acknowledgement has returned within a certain time period - timeout is registered and sending device automatically resends data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

describe the stages of the ARQ

A
  1. destination device receives the data transmission along with a error detection code
  2. code used to determine if data contains any transmission error
  3. if no errors –> positive acknowledgement sent back
  4. if error detected –> negative acknowledgement: re-transmission request sent back to sending device
  5. if no acknowledgement is returned after a certain time period, a timeout is registered and the sending computer resends the packet
  6. process repeats until packet received is correct OR until ARQ limit is reached
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what do check digits do

A

form of validating data entry rather than detecting errors

17
Q

what is a check digit and how does it detect errors

A
  • is an last additional digit at the end of a string of numbers calculated from the other digits in the code
  • is recalculated on data entry
  • if recalculated check digit matches the one at the end –> numbers are deemed correct and in the right order
18
Q

how do you calculate the check digit

A

Modulus 11 system:
- Weight: start with weight = 2 on the RHS E.g. for code 45305, 5=2, 0=3, 3=4 …
- Multiplication: code digit x weight no.
- Addition: add all numbers
- Remainder: remainder when sum divided by 11
- Subtraction: subtract remainder from 11

19
Q

how do you check the check digit

A

Same as calculating check digit BUT:
- weight start with 1 on the rhs
- when total divided by 11, if remainder = 0 –> number is valid

20
Q

id the result of subtracting the remainder from 11 is 10, what is the check digit

A

X = Roman 10

21
Q

where are check digits commonly used:

A
  • barcodes
  • ISBN numbers (international standard book numbers)
  • Vehicle Identification Numbers (VIN)
22
Q

what is plaintext

A

the original message or data file to be encryted

23
Q

Ciphertext =

A

the encrypted message that is the result of putting a plaintext through an encryption algorithm

24
Q

encryption algorithm =

A

the complex piece of software that transform plaintext into ciphertext

25
Q

describe the steps of symmetric encryption

A
  • private key encryption
  • uses the same pre-shared key to encode + decode data
  • key must also be transferred separately to the recipient to decrypt message
26
Q

what is the problem with symmetric encryption

A

can be intercepted –> anyone that obtains the key can encrypt or decrypt the message

27
Q
A