Exam - Style Questions-Unit2
Exam - Style Questions-Unit2
1 A company owns a number of vending machines. Data is sent from each of these
machines at the end of the day. The data contains amount of money taken, products
sold and any error conditions/reports.
a) The company uses both echo checking and automatic repeat requests (ARQs).
i. Describe how echo checks work. Explain whether this is a suitable error checking
`method in this application. [2]
Echo checking involves sending back transmitted data to check for errors. Not ideal for vending machines
due to data volume, limited error detection, and complexity. CRC or checksum might be better.
Automatic Repeat Request (ARQ) is a reliable error control protocol used in data communication to ensure
the accurate and error-free delivery of data between a sender and a receiver.
Data Transmission: The sender sends data packets to the receiver through the communication channel.
Acknowledgment (ACK): After receiving a data packet, the receiver checks for errors in the received
data. If the received data packet is error-free, the receiver sends a positive acknowledgment (ACK) back to
the sender, indicating that the data packet was successfully received. If an error is detected, the receiving
device now sends a negative acknowledgement to the sending device and requests re-transmission of the
data.
Timeout Mechanism: After sending a data packet, the sender sets a timer. If the sender does not receive
the ACK within a certain time frame (timeout period), it assumes that the data packet was lost during
transmission, and it initiates retransmission.
Retransmission of Lost Packets: The sender retransmits lost data packet. The receiver then receives the
retransmitted data packet, verifies its integrity, and acknowledges its successful receipt through an ACK.
Repeat the Process: The data transmission and acknowledgment process continue until all data packets are
successfully received and acknowledged by the receiver.
b) Checksum and check digit are two terms often confused by students. Describe three
differences of the two techniques. [3]
It involves adding all the data bytes together It involves appending an extra digit to a number
and sending the result as an additional value. sequence, computed based on a specific algorithm.
In a checksum, the entire data is considered as Data is usually divided into smaller chunks, such as
a single unit, and a single checksum value is individual digits or characters. A check digit is then
generated for the entire data set. generated for each chunk, and these individual check
digits are combined to form the final check digit.
It is commonly used for larger data sets and is Check digits are more commonly used for validating
suitable for detecting errors in blocks of data. relatively short sequences of numbers or characters.
It can detect whether errors have occurred A check digit is also used for error detection, but it
during data transmission or storage, but it can additionally help in some simple error
cannot correct the errors. correction.
i. Packet switching
Packet switching is a method of data transmission in which a message is broken up into a number of
packets. Each packet can then be sent independently from start point to end point. At the destination, the
packets will need to be reassembled into their correct order (using the information sent in the header).
At each stage, there are nodes that contain a router. Each router will determine which route the packet
needs to take, in order to reach its destination (the destination IP address is used in this part of the process).
An error checking method in which all the 1-bits in the data packet payload are added and the total is stored
in the packet trailer; the same calculation is repeated at the receiving station.
Data that arrives at the destination with the bits no longer synchronized.
The Universal Serial Bus (USB) is an asynchronous serial data transmission method. It has quickly become
the standard method for transferring data between a computer and a number of devices.
v. Parity bit.
Parity checking is one method used to check whether data has been changed or corrupted following data
transmission. This method is based on the number of 1-bits in a byte of data.
The parity can be either called EVEN (that is, an even number of 1-bits in the byte) or ODD (that is, an odd
number of 1-bits in the byte). One of the bits in the byte (usually the most significant bit or left-most bit) is
reserved for a parity bit. The parity bit is set according to whether the parity being used is even or odd.
3 Eight descriptions are given in the following table. The table columns are labeled
checksum, parity check and ARQ.
Tick (✓) the appropriate column which correctly matches each description to the error-
checking technique. For each description, it is possible to match 1, 2, 3 or none of the
error-checking methods. [8]
i. The sending computer waits for a period of time to see if the receiving computer
acknowledges receipt of the data
ii. After a set time period, a timeout occurs which automatically triggers the re-sending
of the data.
iii. The sending computer transmits a block of data to the receiving computer
iv. This continues until the receiving computer sends an acknowledgement that the
data has been received [3]
Correct sequence
iii. The sending computer transmits a block of data to the receiving computer
i. The sending computer waits for a period of time to see if the receiving computer acknowledges receipt of
the data
ii. After a set time period, a timeout occurs which automatically triggers the re-sending of the data.
iv. This continues until the receiving computer sends an acknowledgement that the data has been received
b) Five statements about checksum error checking are given below, but they are not in
the correct order. Put the statements into their correct sequence.
i. If the two checksum values don’t match, the receiving computer requests the data to
be re-transmitted
ii. The sending computer sends a block of data together with the checksum value
iii. The receiving computer uses the block of data it receives to re-calculate the
checksum using the same method as the sending computer
iv. The two checksum values are compared by the receiving computer
v. The sending computer uses the block of data to calculate the checksum using an
agreed method [4]
Correct sequence
ii. The sending computer sends a block of data together with the checksum value
v. The sending computer uses the block of data to calculate the checksum using an agreed method
iii. The receiving computer uses the block of data it receives to re-calculate the checksum using the same
method as the sending computer
iv. The two checksum values are compared by the receiving computer
i. If the two checksum values don’t match, the receiving computer requests the data to be re-transmitted
c) Five statements about parity checking are given below, but they are not in the correct
order. Put the statements into their correct sequence.
i. The sending computer sends the binary data including the parity bits
ii. The sending and receiving computers agree the parity protocol (odd or even)
iii. The sending computer adds a parity bit to each byte to make the byte odd or even
parity
iv. The receiving computer checks the parity of each byte received and checks it against
the agreed protocol
v. If the parity of the byte is incorrect, the receiving computer requests the data to be
re-sent [4]
Correct order
ii. The sending and receiving computers agree the parity protocol (odd or even)
iii. The sending computer adds a parity bit to each byte to make the byte odd or even parity
i. The sending computer sends the binary data including the parity bits
iv. The receiving computer checks the parity of each byte received and checks it against the agreed
protocol
v. If the parity of the byte is incorrect, the receiving computer requests the data to be re-sent
d) Six statements about check digits are given below, but they are not in the correct
order. Put the statements into their correct sequence.
i. A human operator will be asked by the computer to re-enter the numerical code
ii. The computer calculates the check digit based on the numerical code entered into
the computer by a human operator.
iii. If the two check digits don’t match, the human operator has made an error when
entering the numerical code.
iv. The computer compares the calculated check digit with the check digit typed in by
the human operator.
vi. The check digit is calculated and added to the numerical code [5]
Correct order
ii. The computer calculates the check digit based on the numerical code entered into the computer by a
human operator.
vi. The check digit is calculated and added to the numerical code
iv. The computer compares the calculated check digit with the check digit typed in by the human operator.
iii. If the two check digits don’t match, the human operator has made an error when entering the numerical
code.
i. A human operator will be asked by the computer to re-enter the numerical code
Symmetric encryption uses an encryption key; the same key is used to encrypt and decrypt the encoded
message. If you encrypt a zip file, then decrypt with the same key, you are using symmetric encryption.
Symmetric encryption is also called “secret key” encryption because the key must be kept secret from third
parties.
Asymmetric encryption was developed to overcome the security problems associated with symmetric
encryption. It makes use of two keys called the public key and the private key:
These keys are mathematically related but have different functions and purposes.
Public Key: This key is openly distributed and can be known by anyone. It's used for encryption by
anyone who wants to send an encrypted message to the owner of the corresponding private key.
Private Key: This key is kept secret and known only to the intended recipient. It is used for decryption of
messages that were encrypted using the corresponding public key.
However, asymmetric encryption tends to be slower and computationally more intensive compared to
symmetric encryption. As a result, it is often used in combination with symmetric encryption.
c) Explain why encryption is used when transmitting data over a network. [2]
When data is transmitted over any public network (wired or wireless), there is always a risk of it being
intercepted by, for example, a hacker. Under these circumstances, a hacker is often referred to as an
eavesdropper. Using encryption helps to minimize this risk.
Encryption alters data into a form that is unreadable by anybody for whom the data is not intended. It
cannot prevent the data being intercepted, but it stops it from making any sense to the eavesdropper. This is
particularly important if the data is sensitive or confidential (for example, credit card/bank details, medical
history or legal documents).
6 Six descriptions are shown on the left and ten computer terms on the right.
By drawing lines, connect each description to the correct computer term (not all of the
computer terms will be used). [6]
a method of error detection; a value is calculated Skewed data
from a block of data and is sent with the block of
data during data transmission
Half - duplex
Serial
a form of serial data transmission which allows
devices to communicate with a computer; it has Parity check
become the industrial standard
7 A file server is used as a central data store for a network of computers. Rory sends
data from his computer to a file server that is approximately 100 meters away. It is
important that the data is transmitted accurately. Rory needs to be able to read data
from and write data to the file server at the same time.
a) i. Use ticks (✓) to identify the most suitable data transmission methods for this
application. [2]
ii. Explain why your answer to a i is the most suitable data transmission. [4]
For the scenario, the most suitable transmission method would be Serial transmission.
Serial transmission involves sending data one bit at a time over a single communication channel. It is well-
suited for long-distance communication, as it requires fewer physical wires or communication lines
compared to parallel transmission. In Rory's case, where the file server is approximately 100 meters away,
serial transmission would be more practical and cost-effective.
Additionally, serial transmission can be easily implemented in full-duplex communication, where data can
flow bidirectional, enabling Rory to send and receive data to and from the file server simultaneously.
Parallel transmission can offer faster data transfer rates over short distances, it becomes more complex and
expensive when dealing with longer distances, such as the 100-meter distance in Rory's case.
Therefore, for accurate data transmission and practicality over the 100-meter distance, serial transmission
with full-duplex communication would be the more appropriate choice.
b) Identify and describe two methods of error checking that can be used to make sure
that the data stored after transmission is accurate. [6]
To ensure accurate data transmission between Rory's computer and the file server, two methods of error
checking that can be used are:
Checksum:
The sending computer calculates the checksum by adding all the data bytes together and sends the
checksum value along with the data to the receiving computer. Upon receiving the data, the receiving
computer recalculates the checksum on the received data and compares it with the received checksum.
If the calculated checksum at the receiver matches the received checksum, it indicates that the data was
likely transmitted accurately without errors. If the checksums do not match, it indicates that errors may
have occurred during transmission, and the receiver can request retransmission of the data to ensure its
accuracy.
Checksums are relatively easy to implement and offer a reasonable level of error detection capability. They
are commonly used in network communication protocols and data storage systems.
When Rory's computer sends data to the file server, it waits for an acknowledgment (ACK) from the file
server. If the file server successfully receives the data without errors, it sends an ACK back to Rory's
computer.
ARQ ensures that data transmission errors are detected and corrected by re-sending the data until the file
server acknowledges successful receipt of error-free data. It provides a robust error detection and correction
mechanism, making it highly suitable for critical communication systems.
Both checksum and ARQ offer effective error checking capabilities. Checksum provides error detection,
indicating when data integrity may have been compromised, while ARQ provides error correction by
requesting retransmission of corrupted data. The choice between these methods depends on factors like the
required level of error control, the nature of the communication system, and the specific application's
requirements.
8 Maisey purchases a new router and attaches it to her computer. The connection she
sets up uses duplex data transmission.
b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends
multiple bits at the same time.
Parallel communication has been used for integrated circuits to send multiple bits at the same time.
c) Maisey purchases a new printer and connects it to her computer using the USB port.
Devices plugged into the computer are automatically detected and device drivers are automatically
loaded up
Connections can only fit one way preventing incorrect connections being made
It has become an industry standard, which means considerable support is available
It can support different data transmission rates (from 1.5 Mbps to 5 Gbps)
USB is backward compatible (that is, older versions are still supported)