Unit 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what are data packets

A

a packet is a small unit of data that being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the structure of a data packet

A

header
payload
trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does the header contain

A

senders IP address
Recievers IP address
Packet number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the payload contain

A

data/part of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does the trailer contain

A

bits to show end of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is packet switching

A

data packets are sent through different routes so that data transfer is efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the advantages of packet switching

A

packets can take different routes to get to their destination
this ensures message is delivered despite the unavailability of a route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe the process of packet switching

A

data is broken down into packets
each packet takes a different route
a router controls the route a packet takes
the packets are reassembled at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is simplex data transmission

A

when data is sent in one direction only
computer to a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is half duplex data transmission

A

when data is sent in both directions but not at the same time
walkie talkies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

full duplex transmission

A

when data is sent in both directions at the same time
broadband internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

serial data transmission

A

one bit at a time over a single wire/channel
connecting a computer through a USB connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

advantage of serial data transmission

A

works well over long distances since data is fully synchronised in the correct order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

disadvantage of serial data transmission

A

transmitted at a slower rate than parallel data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

parallel data transmission

A

when several bits of data is sent down several channels/wires at the same time
used in the internal circuits of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advantage of parallel data transmission

A

works well over short distances
faster than serial transmission

17
Q

disadvantages of parallel transmission

A

data can become skewed(mixed)
the longer the wire, the worse it becomes

18
Q

what is the USB

A

Universal Serial Bus
form of serial data transmission
allows both half duplex and full duplex transmission
standard method for transmission of data

19
Q

benefits of USB

A

become industry standard
is backward compatible
automatically detected when plugged in
no need for external power source
easy to add more USB ports

20
Q

drawbacks of USB

A

only supports cable length of 5 metres
early forms of USB may not be supported by computers
data transfer rate is slow

21
Q

how can errors occur during data transmission

A

interference
problems due to packet switching
skewing of data

22
Q

what is parity checking

A

it can be called even or odd
one of the bits is reserved for a parity bit and the number of 1’s is counted. the even or odd parity check will make the total number of 1s even or odd

23
Q

what is the problem with parity checks

A

sometimes more than 1 byte it corrupted but the parity is maintained
this is why other methods are needed to ensure errors are never missed

24
Q

what are parity blocks

A

a block of data is sent and the number of 1bits are totalled horizontally and vertically.
this identifies that an error has occurred and where the error is

25
Q

what is checksum

A

used to check if data has been changed or corrupted following data transmission
data is sent in blocks and an additional value, the checksum, is sent

26
Q

what is the process of checksum

A

the checksum is calculated from a block a data
the calculation is done using an agreed algorithm
checksum is transmitted with the block of data
the reciever recalculates from the block of data
if the checksums are the same, no error occured otherwise a request is made to resend the data

27
Q

what is echo check

A

when data is sent to one device, it is sent back to the reciever
the sender then compares the sets of data to check if errors occur

28
Q

what is the problem with echo check

A

it isnt known whether the error has been made while sending the data or recieving it meaning it isnt reliable

29
Q

what is check digit

A

the final digit included in a code
calculated from all other digits in the code
example- ISBN

30
Q

what is check digit used for

A

used to identify errors that occur in data entry caused by mistyping or misscanning

31
Q

What are ARQ’s

A

Automatic Repeat Requests
used to check data following data transmission

32
Q

How do ARQ’s work

A

the reciever sends back a positive or negative acknowledgements to the sender and the data is the resent depending
also uses timeouts where if no data is recieved by the sender, the data is automatically resent

33
Q

what is plaintext

A

the data being sent is known as plaintext

34
Q

what is cyphertext

A

the data once it has gone through an encryption algorithm

35
Q

what is symmetric encryption

A

the same key is used to encrypt and decrypt the encoded message

36
Q

disadvantage of symmetric encryption

A

the encryption key can always be intercepted which brings about the question of security

37
Q

what is asymmetric encryption

A

uses 2 keys called the private and public key
the private key is known only to the computer user
the public key is known to everybody

38
Q

process of asymmetric encyption

A

a matching pair of keys is generated
the public key is then sent to user 2 from user 1
user 2 encrypts their own message with the key and sends the encrypted data back to user 1
the private key is used by user 1 to decrypt the data