100% found this document useful (1 vote)
553 views

Exam - Style Questions-Unit2

This document contains exam questions about error checking techniques used in data transmission from vending machines to a central company. It discusses echo checking, automatic repeat requests (ARQ), checksums, check digits, and parity bits. Echo checking involves sending data back to check for errors but is not suitable for vending machine data due to volume and complexity. ARQ uses acknowledgments and retransmissions to ensure error-free delivery. Checksums calculate a value for an entire data set while check digits are used for shorter sequences. Parity bits check whether a byte has an even or odd number of 1-bits. The document tests understanding of these concepts through multiple choice and sequencing questions.

Uploaded by

imtiazakhtar012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
553 views

Exam - Style Questions-Unit2

This document contains exam questions about error checking techniques used in data transmission from vending machines to a central company. It discusses echo checking, automatic repeat requests (ARQ), checksums, check digits, and parity bits. Echo checking involves sending data back to check for errors but is not suitable for vending machine data due to volume and complexity. ARQ uses acknowledgments and retransmissions to ensure error-free delivery. Checksums calculate a value for an entire data set while check digits are used for shorter sequences. Parity bits check whether a byte has an even or odd number of 1-bits. The document tests understanding of these concepts through multiple choice and sequencing questions.

Uploaded by

imtiazakhtar012
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Unit #2 Exam – Styles Questions

1 A company owns a number of vending machines. Data is sent from each of these
machines at the end of the day. The data contains amount of money taken, products
sold and any error conditions/reports.

a) The company uses both echo checking and automatic repeat requests (ARQs).

i. Describe how echo checks work. Explain whether this is a suitable error checking
`method in this application. [2]

Here's how echo checks work in a simple step-by-step process:

 The sender sends a data packet to the receiver.


 The receiver receives the data packet and echoes it back to the sender.
 The sender compares the echoed data with the original data.
 If the echoed data matches the original data, it is considered error-free. If not, an error is detected.

Echo checking involves sending back transmitted data to check for errors. Not ideal for vending machines
due to data volume, limited error detection, and complexity. CRC or checksum might be better.

ii. Describe how automatic repeat request (ARQ) works. [3]

Automatic Repeat Request (ARQ) is a reliable error control protocol used in data communication to ensure
the accurate and error-free delivery of data between a sender and a receiver.

Here's how ARQ works in a typical communication process:

Data Transmission: The sender sends data packets to the receiver through the communication channel.

Acknowledgment (ACK): After receiving a data packet, the receiver checks for errors in the received
data. If the received data packet is error-free, the receiver sends a positive acknowledgment (ACK) back to
the sender, indicating that the data packet was successfully received. If an error is detected, the receiving
device now sends a negative acknowledgement to the sending device and requests re-transmission of the
data.
Timeout Mechanism: After sending a data packet, the sender sets a timer. If the sender does not receive
the ACK within a certain time frame (timeout period), it assumes that the data packet was lost during
transmission, and it initiates retransmission.

Retransmission of Lost Packets: The sender retransmits lost data packet. The receiver then receives the
retransmitted data packet, verifies its integrity, and acknowledges its successful receipt through an ACK.

Repeat the Process: The data transmission and acknowledgment process continue until all data packets are
successfully received and acknowledged by the receiver.

b) Checksum and check digit are two terms often confused by students. Describe three
differences of the two techniques. [3]

Checksum Check digit

It involves adding all the data bytes together It involves appending an extra digit to a number
and sending the result as an additional value. sequence, computed based on a specific algorithm.

In a checksum, the entire data is considered as Data is usually divided into smaller chunks, such as
a single unit, and a single checksum value is individual digits or characters. A check digit is then
generated for the entire data set. generated for each chunk, and these individual check
digits are combined to form the final check digit.

It is commonly used for larger data sets and is Check digits are more commonly used for validating
suitable for detecting errors in blocks of data. relatively short sequences of numbers or characters.

It can detect whether errors have occurred A check digit is also used for error detection, but it
during data transmission or storage, but it can additionally help in some simple error
cannot correct the errors. correction.

2 Explain each of the following computer terms: [10]

i. Packet switching

Packet switching is a method of data transmission in which a message is broken up into a number of
packets. Each packet can then be sent independently from start point to end point. At the destination, the
packets will need to be reassembled into their correct order (using the information sent in the header).

At each stage, there are nodes that contain a router. Each router will determine which route the packet
needs to take, in order to reach its destination (the destination IP address is used in this part of the process).

ii. Cyclic redundancy check

An error checking method in which all the 1-bits in the data packet payload are added and the total is stored
in the packet trailer; the same calculation is repeated at the receiving station.

iii. Data skewing

Data that arrives at the destination with the bits no longer synchronized.

iv. Universal serial bus

The Universal Serial Bus (USB) is an asynchronous serial data transmission method. It has quickly become
the standard method for transferring data between a computer and a number of devices.

v. Parity bit.

Parity checking is one method used to check whether data has been changed or corrupted following data
transmission. This method is based on the number of 1-bits in a byte of data.

The parity can be either called EVEN (that is, an even number of 1-bits in the byte) or ODD (that is, an odd
number of 1-bits in the byte). One of the bits in the byte (usually the most significant bit or left-most bit) is
reserved for a parity bit. The parity bit is set according to whether the parity being used is even or odd.

3 Eight descriptions are given in the following table. The table columns are labeled
checksum, parity check and ARQ.

Tick (✓) the appropriate column which correctly matches each description to the error-
checking technique. For each description, it is possible to match 1, 2, 3 or none of the
error-checking methods. [8]

Description Chec Parity ARQ


ksum check
Extra bit sent with each byte of data ✓
Makes use of timeout and acknowledgement ✓
If an error is found, a request is made to re-send the data ✓
Check on whether a data packet has been changed following transmission ✓
Re-calculation made on any additional data values sent to the recipient ✓
Data is transmitted in blocks or packets ✓
A method that can determine which bit in a data stream has been changed ✓
Additional value sent at the end of a block of data to be used to check if ✓
any data transmission errors occurred
4. a) Four statements about automatic repeat requests (ARQs) are given below, but they
are not in the correct order. Put the statements into their correct sequence.

i. The sending computer waits for a period of time to see if the receiving computer
acknowledges receipt of the data

ii. After a set time period, a timeout occurs which automatically triggers the re-sending
of the data.

iii. The sending computer transmits a block of data to the receiving computer

iv. This continues until the receiving computer sends an acknowledgement that the
data has been received [3]

Correct sequence

iii. The sending computer transmits a block of data to the receiving computer

i. The sending computer waits for a period of time to see if the receiving computer acknowledges receipt of
the data

ii. After a set time period, a timeout occurs which automatically triggers the re-sending of the data.

iv. This continues until the receiving computer sends an acknowledgement that the data has been received

b) Five statements about checksum error checking are given below, but they are not in
the correct order. Put the statements into their correct sequence.

i. If the two checksum values don’t match, the receiving computer requests the data to
be re-transmitted

ii. The sending computer sends a block of data together with the checksum value

iii. The receiving computer uses the block of data it receives to re-calculate the
checksum using the same method as the sending computer

iv. The two checksum values are compared by the receiving computer

v. The sending computer uses the block of data to calculate the checksum using an
agreed method [4]

Correct sequence

ii. The sending computer sends a block of data together with the checksum value

v. The sending computer uses the block of data to calculate the checksum using an agreed method

iii. The receiving computer uses the block of data it receives to re-calculate the checksum using the same
method as the sending computer

iv. The two checksum values are compared by the receiving computer

i. If the two checksum values don’t match, the receiving computer requests the data to be re-transmitted

c) Five statements about parity checking are given below, but they are not in the correct
order. Put the statements into their correct sequence.

i. The sending computer sends the binary data including the parity bits

ii. The sending and receiving computers agree the parity protocol (odd or even)

iii. The sending computer adds a parity bit to each byte to make the byte odd or even
parity
iv. The receiving computer checks the parity of each byte received and checks it against
the agreed protocol

v. If the parity of the byte is incorrect, the receiving computer requests the data to be
re-sent [4]

Correct order

ii. The sending and receiving computers agree the parity protocol (odd or even)

iii. The sending computer adds a parity bit to each byte to make the byte odd or even parity

i. The sending computer sends the binary data including the parity bits

iv. The receiving computer checks the parity of each byte received and checks it against the agreed
protocol

v. If the parity of the byte is incorrect, the receiving computer requests the data to be re-sent

d) Six statements about check digits are given below, but they are not in the correct
order. Put the statements into their correct sequence.

i. A human operator will be asked by the computer to re-enter the numerical code

ii. The computer calculates the check digit based on the numerical code entered into
the computer by a human operator.

iii. If the two check digits don’t match, the human operator has made an error when
entering the numerical code.

iv. The computer compares the calculated check digit with the check digit typed in by
the human operator.

v. A human operator types in the numerical code into the computer

vi. The check digit is calculated and added to the numerical code [5]

Correct order

v. A human operator types in the numerical code into the computer

ii. The computer calculates the check digit based on the numerical code entered into the computer by a
human operator.

vi. The check digit is calculated and added to the numerical code

iv. The computer compares the calculated check digit with the check digit typed in by the human operator.

iii. If the two check digits don’t match, the human operator has made an error when entering the numerical
code.

i. A human operator will be asked by the computer to re-enter the numerical code

5 a) Describe what is meant by symmetric encryption. [2]

Symmetric encryption uses an encryption key; the same key is used to encrypt and decrypt the encoded
message. If you encrypt a zip file, then decrypt with the same key, you are using symmetric encryption.
Symmetric encryption is also called “secret key” encryption because the key must be kept secret from third
parties.

b) Describe what is meant by asymmetric encryption. [3]

Asymmetric encryption was developed to overcome the security problems associated with symmetric
encryption. It makes use of two keys called the public key and the private key:
These keys are mathematically related but have different functions and purposes.

Public Key: This key is openly distributed and can be known by anyone. It's used for encryption by
anyone who wants to send an encrypted message to the owner of the corresponding private key.

Private Key: This key is kept secret and known only to the intended recipient. It is used for decryption of
messages that were encrypted using the corresponding public key.

Asymmetric encryption offers several advantages:

 Secure Key Exchange


 Digital Signatures
 Secure Communication

However, asymmetric encryption tends to be slower and computationally more intensive compared to
symmetric encryption. As a result, it is often used in combination with symmetric encryption.

c) Explain why encryption is used when transmitting data over a network. [2]

When data is transmitted over any public network (wired or wireless), there is always a risk of it being
intercepted by, for example, a hacker. Under these circumstances, a hacker is often referred to as an
eavesdropper. Using encryption helps to minimize this risk.

Encryption alters data into a form that is unreadable by anybody for whom the data is not intended. It
cannot prevent the data being intercepted, but it stops it from making any sense to the eavesdropper. This is
particularly important if the data is sensitive or confidential (for example, credit card/bank details, medical
history or legal documents).

6 Six descriptions are shown on the left and ten computer terms on the right.

By drawing lines, connect each description to the correct computer term (not all of the
computer terms will be used). [6]
a method of error detection; a value is calculated Skewed data
from a block of data and is sent with the block of
data during data transmission
Half - duplex

a method of error detection; it is based on


counting the number of 1-bits; uses an Checksum
additional bit which is the most significant bit in
the byte ARQ

a data transmission method where data can be


Full – duplex
sent in both directions at the same time
(simultaneously)
Check digit
a data transmission method where data is sent
one bit at a time over a single channel/wire
Universal serial
bus

a data error occurring when data arrives at the Encryption


destination out of synchronization.

Serial
a form of serial data transmission which allows
devices to communicate with a computer; it has Parity check
become the industrial standard
7 A file server is used as a central data store for a network of computers. Rory sends
data from his computer to a file server that is approximately 100 meters away. It is
important that the data is transmitted accurately. Rory needs to be able to read data
from and write data to the file server at the same time.

a) i. Use ticks (✓) to identify the most suitable data transmission methods for this
application. [2]

Method 1 Tick Method 2 Tick


Serial ✓ Simplex
Parallel Half duplex
Duplex ✓

ii. Explain why your answer to a i is the most suitable data transmission. [4]

For the scenario, the most suitable transmission method would be Serial transmission.

Serial transmission involves sending data one bit at a time over a single communication channel. It is well-
suited for long-distance communication, as it requires fewer physical wires or communication lines
compared to parallel transmission. In Rory's case, where the file server is approximately 100 meters away,
serial transmission would be more practical and cost-effective.

Additionally, serial transmission can be easily implemented in full-duplex communication, where data can
flow bidirectional, enabling Rory to send and receive data to and from the file server simultaneously.

Parallel transmission can offer faster data transfer rates over short distances, it becomes more complex and
expensive when dealing with longer distances, such as the 100-meter distance in Rory's case.

Therefore, for accurate data transmission and practicality over the 100-meter distance, serial transmission
with full-duplex communication would be the more appropriate choice.

b) Identify and describe two methods of error checking that can be used to make sure
that the data stored after transmission is accurate. [6]

To ensure accurate data transmission between Rory's computer and the file server, two methods of error
checking that can be used are:

Checksum:

The sending computer calculates the checksum by adding all the data bytes together and sends the
checksum value along with the data to the receiving computer. Upon receiving the data, the receiving
computer recalculates the checksum on the received data and compares it with the received checksum.

If the calculated checksum at the receiver matches the received checksum, it indicates that the data was
likely transmitted accurately without errors. If the checksums do not match, it indicates that errors may
have occurred during transmission, and the receiver can request retransmission of the data to ensure its
accuracy.

Checksums are relatively easy to implement and offer a reasonable level of error detection capability. They
are commonly used in network communication protocols and data storage systems.

Automatic Repeat Request (ARQ):

When Rory's computer sends data to the file server, it waits for an acknowledgment (ACK) from the file
server. If the file server successfully receives the data without errors, it sends an ACK back to Rory's
computer.

ARQ ensures that data transmission errors are detected and corrected by re-sending the data until the file
server acknowledges successful receipt of error-free data. It provides a robust error detection and correction
mechanism, making it highly suitable for critical communication systems.
Both checksum and ARQ offer effective error checking capabilities. Checksum provides error detection,
indicating when data integrity may have been compromised, while ARQ provides error correction by
requesting retransmission of corrupted data. The choice between these methods depends on factors like the
required level of error control, the nature of the communication system, and the specific application's
requirements.

8 Maisey purchases a new router and attaches it to her computer. The connection she
sets up uses duplex data transmission.

a) Five statements are given about duplex data transmission.

Tick (✓) to show if the statement is True or False. [5]

Statement True False


Duplex data transmission can be either serial or
parallel. ✓

Duplex data transmission is when data is transmitted


both ways, but only one way at a time ✓

Duplex transmission is always used to connect a device


to a computer ✓

Duplex data transmission is when data is transmitted


both ways at the same time ✓

Duplex data transmission automatically detects any ✓


errors in data

b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends
multiple bits at the same time.

State whether the IC uses serial or parallel data transmission. [1]

Parallel communication has been used for integrated circuits to send multiple bits at the same time.

c) Maisey purchases a new printer and connects it to her computer using the USB port.

Explain two benefits of using a USB connection. [4]

 Devices plugged into the computer are automatically detected and device drivers are automatically
loaded up
 Connections can only fit one way preventing incorrect connections being made
 It has become an industry standard, which means considerable support is available
 It can support different data transmission rates (from 1.5 Mbps to 5 Gbps)
 USB is backward compatible (that is, older versions are still supported)

You might also like