0% found this document useful (0 votes)
25 views

Data Transmission QA

Uploaded by

abdulwahid.bd25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Data Transmission QA

Uploaded by

abdulwahid.bd25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

2 Data transmission

1 a Explain the term data packet.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

b Data packets contain a header. Name three components that you would expect to find
in a header.

1 ......................................................................................................................................................................

2 ......................................................................................................................................................................

3 ......................................................................................................................................................................
2 Data transmission

c Data packets also have a payload and a trailer. Explain these two terms.

payload: ............................................................................................................................. ..............................

............................................................................................................................................................................

............................................................................................................................................................................

trailer: ............................................................................................................................. .................................

............................................................................................................................................................................

............................................................................................................................................................................

d
Computer B

Computer A

R1

R3
R2 R4
R5 Router B

Router A
R7
R6
R10
R8

R9

i. Using the above diagram, explain how packet switching works when
sending a 500 KiB file from computer 'A' to computer 'B'.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................
2 Data transmission

ii Using the diagram, explain why data packets need to be reassembled


atcomputer 'B'.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

2 Packet switching is used to send packets of data over a network.

a Give three benefits of using packet switching.

1 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

2 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

3 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

b Give three disadvantages of using packet switching.

1 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

2 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................
2 Data transmission

3 ......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

c Data packets can get lost due to 'bouncing' around from router to router and never reaching
their destination.

Explain the problems caused by data packets 'bouncing'.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

3 a Data transmission depends on data direction and how many bits of data can be sent at a
time. Complete the table below to show what type of data transmission is being
described in each case. Tick (✓) two boxes for each description.
Simplex Half-duplex Full-duplex Serial Parallel
Description of transmission taking place
(✓) (✓) (✓) (✓) (✓)
Data sent one bit at a time down a single wire
in one direction only
Data sent 16 bits at a time down 16 wires in
both directions, but not at the same time
Data sent 16 bits at a time down 16 wires in
both directions simultaneously
Data sent 8 bits at a time down 8 wires in one
direction only
Data sent one bit at a time down a single wire
in both directions simultaneously
Data sent one bit at a time down a single wire
in both directions, but not at the same time

b Five statements about serial and parallel data transmission are made in the table below.
By placing a tick (✓) in the appropriate column, select which statements refer to serial
transmission and which statements refer to parallel transmission.
Statements Serial (✓) Parallel (✓)

Transmission method used by the memory bus inside a computer


Data can be skewed (out of synch) when travelling over long distances
Least expensive of the two types due to fewer hardware requirements
Most appropriate if data is time-sensitive; for example, when live streaming where
faster transmission rate is essential
Suffers from less risk of external interference
2 Data transmission

4 a Explain what happens when a device is plugged into a computer using one of the USB ports.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

b Seven statements about USB connections are made in the table below. By ticking (✓) the
appropriate box, indicate which statements are true and which statements are FALSE.
Statements True (✓) False (✓)
USB uses a protocol that allows for error-free data transmission between device
and computer
USB can support any cable length between device and computer
USB uses serial data transfer
USB connections can transfer data using half-duplex or full-duplex
It is difficult to add more USB ports to a computer using USB hubs
USB data transfer rates are much faster than, for example, Ethernet connections
There is no need for devices to have a power source because USB cable supplies 5V
of power

5 a A system uses even parity. Indicate whether the following bytes would fail or pass an
even parity check:

1 1 0 0 0 0 1 1

............................................................................................................................................................................

1 0 1 1 0 1 1 0

............................................................................................................................................................................

0 0 0 1 1 1 1 1

............................................................................................................................................................................
2 Data transmission

b Explain why parity checks are used.

............................................................................................................................................................................

............................................................................................................................................................................

c Nine bytes of data were transmitted from one computer to another computer. Even parity was
used by both systems. An additional byte, called the parity byte was also sent at the end of
the transmission.

The following table shows the nine bytes and parity byte following transmission.
Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
Byte 1 1 1 1 0 1 1 1 0
Byte 2 1 0 0 0 0 1 0 0
Byte 3 0 1 1 1 0 0 1 0
Byte 4 0 1 1 1 1 0 1 1
Byte 5 1 1 0 0 0 1 1 0
Byte 6 0 1 1 0 1 1 0 1
Byte 7 1 0 0 1 0 0 0 0
Byte 8 0 1 1 1 1 1 0 1
Byte 9 0 0 0 0 1 0 0 1
Parity byte: 0 0 1 1 1 1 0 0

i One of the bits has been transmitted incorrectly. Indicate which bit is incorrect by
giving its bit number and byte number:

bit number: ................................................................................................................................................

byte number: .............................................................................................................................................

ii Explain how you arrived at your answer to part c i.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................
2 Data transmission

iii Write down the corrected byte.

......................................................................................................................................................................

iv Describe a situation where a parity check wouldn’t identify which bit had been
transmitted incorrectly.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

v Name and briefly describe another method to check if data has been transmitted correctly.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

6 a Explain how the checksum system is used to identify any errors during data transmission.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................
2 Data transmission

b Explain how echo checks are used to check data following data transmission.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

c Explain how automatic repeat requests (ARQs) work during data transmission.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

7 Check digits are used to check data during data entry.

a Give four types of error that check digits can identify.

1 ......................................................................................................................................................................

......................................................................................................................................................................

2 ......................................................................................................................................................................

......................................................................................................................................................................

3 ......................................................................................................................................................................

......................................................................................................................................................................

4 ......................................................................................................................................................................

......................................................................................................................................................................
2 Data transmission

b ISBN-13 is a type of check digit standard.

i The following algorithm generates a check digit for a 12-digit ISBN book code:
1 add all odd-numbered digits together
2 add all even-numbered digits together and then multiply the result by 3
3 add together the results for steps 1 and 2, and then divide the result by 10
4 take away the remainder of the division from 10, leaving the check digit
Showing your working, calculate the check digit for the following 12-digit ISBN code:
9 781 471 86867

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................
2 Data transmission

ii The following algorithm checks that the check digit in a 13-digit code is correct:

1 add all odd-numbered digits together, including the check digit

2 add all even-numbered digits together and then multiply the result by 3

3 add together the results for steps 1 and 2, and then divide the result by 10

4 the check digit is correct if the remainder is zero

Showing your working, use the above algorithm to check whether or not the check digit in
the following ISBN-13 code is correct:

9 781 471 80721 8

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

8 For each of the following ten questions, choose which of the five options corresponds to the
correct response.

a What is meant by the term ciphertext when used in encryption? Circle the correct answer.

A an encryption or decryption algorithm

B a message before it has been encrypted

C a type of session key

D another name for plaintext

E text following an encryption algorithm


2 Data transmission

b Which one of the following statements about asymmetric encryption is true? Circle the
correct answer.

A uses a public key only

B uses both a public key and a private key

C always uses 64-bit encryption

D the value of the private key is symmetrical

E uses private key only

c In encryption, which of the following is the term used to describe the message before it is
encrypted? Circle the correct answer.

A simpletext

B plaintext

C notext

D ciphertext

E firsttext

d Which of the following is the biggest disadvantage of using symmetric encryption? Circle the
correct answer.

A it is very complex and time consuming

B it is rarely used anymore

C the value of the key reads the same in both directions

D it only works on computers with older operating systems

E there is a security problem when transmitting the encryption key

e Which of the following is the correct name for a form of encryption in which both the sender
and the recipient use the same key to encrypt and decrypt? Circle the correct answer.

A symmetric key encryption

B asymmetric key encryption

C public key encryption

D same key encryption

E block cipher encryption


2 Data transmission

f Which of the following is the final number in a code, calculated from all the numbers in the
code, whose purpose is to find errors in data entry? Circle the correct answer.

A parity check

B checksum

C cyclic redundancy check

D parity bit

E check digit

g Which of the following is a form of error detection that makes use of a system of
acknowledgements and timeouts? Circle the correct answer.

A automatic repeat request

B echo check

C check digit

D parity bit

E cyclic redundancy check

h Which of the following methods uses an extra bit added to a byte to ensure it contains an even
number of 1s or odd number of 1s? Circle the correct answer.

A cyclic redundancy check

B parity check

C checksum

D check digit

E echo check

i Which of the following uses a calculated value which is sent after a block of data: the receiving
computer also calculates the value from the block of data and compares the values? Circle the
correct answer.

A parity check

B check digit

C packet switching

D checksum

E automatic repeat request


2 Data transmission

j Which of the following describes the check where the receiving computer sends back a copy of
the data to the sending computer to allow it to compare the data? Circle the correct answer.

A echo check

B automatic repeat request

C checksum

D parity check

E check digit

9 Some students sat a computer science exam. A number of their responses were incorrect.

Explain why the following eight responses given by the students are incorrect:

a 'A data packet header contains the MAC address of the sending computer and the receiving
computer.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

b 'Half-duplex refers to the fact that four bits of data (half a byte) can be sent from "A" to "B"
along four single wires.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

c 'Because USB connections can be fitted in any way, they have become the industry standard.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................
2 Data transmission

d 'Odd parity means a binary number has an odd value, for example, 01110001 (i.e. 113).'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

e 'Even parity means a binary number has an even number of zeros.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

f 'Check digits are used to make sure data has been transmitted without errors.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

g 'A checksum is calculated by adding up all the 1-bits in a byte, and sending this value at
the end of the byte.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

h 'Asymmetric encryption makes use of the same key to encrypt and decrypt an encoded message.'

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................
2 Data transmission

10 Five statements are shown on the left and eight computer terms are shown on the right in the
following diagram.

Draw lines to connect each statement to the correct computer term.


Error checking method where data is sent Symmetric encryption
to another device and is then sent back
to the sender; if the two sets of data are
different then there has been an error during Encryption
transmission

Cipher text
Data is made unreadable to anyone without
the necessary keys to unlock the encoded data
Echo check

A form of encryption which makes use of a


public key and a private key to encrypt and
decrypt coded messages Full-duplex

Transmission error check that makes use Asymmetric encryption


of positive acknowledgement and timeout
following data transmission
Half-duplex

Type of data transmission where data can be


sent in both directions at the same time Automatic repeat request

11 Use the following word/phrase list to complete the paragraph below. Each word or phrase
may be used once, more than once or not at all.
» algorithm » decrypt » matching pairs » private
» asymmetric encryption » document » matching private » public
» cipher text » encrypted » mathematically » public key
» confidential » matching document » plain text » symmetric encryption

............................ makes use of a ............................ key and a .................. key. Suppose Asif and Karl
both work for the same company, and Asif wants to send a confidential .................... to Karl.

Asif and Karl’s computers both use the same ............................ to generate their own ................... of
keys; these keys are ................... linked, but cannot be derived from each other. Karl now sends
his ............................ to Asif. Asif now uses Karl’s .................. to encrypt the document he wishes to
send to Karl.

Asif then sends his ............................ document back to Karl. Karl uses his .................... key to unlock
Asif’s ............................ and .................. it.
ANSWERS
Data transmission
1 a A data packet is when message/data is split up into smaller groups of bytes:
• for transmission over a network
• containing a header, payload and a trailer
b In any order:
• IP address of the sender
• IP address of the recipient
• the sequence number of the data packet
• the size of the packet (in bytes)
c • The payload contains the actual data being sent in the packet.
• The trailer is a way of identifying the end of a packet and it also contains an error-
method, such as a cyclic redundancy check (CRC).

d i • The 500 KiB file is split up into a number of packets.


• Each packet will follow its own path from 'A' to 'B'.
• Routers (R1 to R10) will determine the path of each data packet.
• The routing selection depends on the number of packets (at each router).
• The shortest path available is always selected.
ii • Data packets frequently reach the destination in a different order to the one in
which they are sent …
• … which means the data packets need to be re-assembled into the correct order.
2 a Three from:
• There is no need to tie up a single communications line.
• It is possible to overcome failed, busy or faulty lines by re-routing packets.
• It is relatively easy to expand package usage.
• A high data transmission rate is possible.
b In any order:
• Packets can be lost and need to be re-sent.
• The method doesn’t work well with real-time streaming.
• There is a delay at the destination while waiting for all of the packets to arrive and then
to reassemble them in the correct order.
c The network would grind to a halt as the number of lost packets mount up, ‘clogging up’
the system.

8
3 a Half- Full-
Description of transmission Simplex Serial Parallel
duplex duplex
taking place (✓) (✓) (✓)
(✓) (✓)

Data sent one bit at a time down a


✓ ✓
single wire in one direction only

Data sent 16 bits at a time down


16 wires in both directions, but ✓ ✓
not at the same time
Data sent 16 bits at a time down
16 wires in both directions ✓ ✓
simultaneously

Data sent 8 bits at a time down


✓ ✓
8 wires in one direction only

Data sent one bit at a time down a


single wire in both directions ✓ ✓
simultaneously
Data sent one bit at a time down a
single wire in both directions, but ✓ ✓
not at the same time

b Serial Parallel
Statements
(✓) (✓)

Transmission method used by the memory bus inside a computer ✓

Data can be skewed (out of synch) when travelling over long



distances
Least expensive of the two types due to fewer hardware

requirements

Most appropriate where faster transmission rate is essential ✓

Suffers from less risk of external interference ✓

4 a • The computer automatically detects a device being connected.


• The device is automatically recognised and appropriate device driver software is
loaded up.
• If a new device is connected for the first time, the computer will look for a device
driver that matches the device or the user is prompted to download the device driver
from the internet.

9
b True False
Statements
(✓) (✓)
USBs use a protocol that allows for error-free data transmission

between device and computer
USBs can support any cable length between device and computer ✓
USBs use serial data transfer ✓
USB connections can transfer data using half-duplex or

full-duplex
It is difficult to add more USB ports to a computer using

USB hubs
USB data transfer rates are much faster than, for example,

Ethernet connections
There is no need for devices to have a power source because

USB cable supplies 5V of power

5 a pass, fail, fail


b to check for errors following data transmission
c i bit number = 4, byte number = 6
ii bit 4 has odd parity (five 1-bits), byte 6 has odd parity (five 1-bits)
iii corrected byte is: 0 1 1 1 1 1 0 1
iv if even parity retained (for example, if two bits have changed)
v • checksum: a method which calculates a check sum from the block of data being
sent; the value is sent at the end of the block of data
• echo check: a method where the data is sent back to the sender which then checks
that it matches the data originally sent
• Automatic Repeat Request (ARQ): a method that uses time-out and
acknowledgement to automatically request the re-sending of data
6 a • A checksum is calculated from a block of data.
• The calculation is done using an agreed algorithm.
• The checksum is transmitted with the block of data.
• At the receiving end, the checksum is recalculated by the computer using the block of
data just sent (using the same agreed algorithm).
• The recalculated checksum is compared to the checksum sent with the block of data.
• If both checksums are the same, then no transmission errors have occurred; otherwise a
request to re-send the data block is made.
b • A copy of the data is sent back to the sender.
• The returned data is compared to the original data sent by the sending computer.
• If there are no differences, then the data has been sent without error.
• If the two sets of data have differences then an error has occurred at some stage during
the data transmission.
10
c • They use an acknowledgement and time-outs.
• When a receiving device detects an error following data transmission, it asks for the
data packet to be re-sent.
• If no errors are detected, a positive acknowledgement is sent to the sender.
• The sending device will re-send the data packet if:
• a request to re-send data has been received, OR
• a time-out has occurred
• The whole process is continuous until the data packet received is correct or until the
time-out is reached.
7 a In any order:
• an incorrect digit entered, for example, 5327 instead of 5307
• a transposition error occurred, for example, 5037 instead of 5307
• omitted or extra digits, for example, 537 or 53107 instead of 5307
• phonetic errors, such as 13 (thirteen) instead of 30 (thirty)

b i 978147186867
9 + 8 + 4 + 1 + 6 + 6 = 34
3 × (7 + 1 + 7 + 8 + 8 + 7) = 3 × 38 = 114
34 + 114 = 148
148/10 = 14 remainder 8
10 – 8 = 2; the check digit
ii 9781471807218
9 + 8 + 4 + 1 + 0 + 2 + 8 = 32
3 × (7 + 1 + 7 + 8 + 7 + 1) = 3 × 31 = 93
32 + 93 = 125
125/10 = 12 remainder 5
Therefore, the check digit is incorrect – an input error has occurred.
8 a E
b B
c B
d E
e A
f E
g A
h B
i D
j A
9 a A data packet header doesn’t contain MAC addresses. It contains the IP addresses of the
sender and recipient.
b Half-duplex refers to data sent in both directions, but not at the same time. The use of four
bits sent along four channels refers to parallel transmission.

11
c Although USB has become an industry standard, this has nothing to do with the orientation
of connectors. USB connectors can only be fitted in one way.
d Odd parity is to do with the number of 1-bits and nothing to do with the denary value of the
number. Odd parity means a byte contains an odd number of 1-bits.
e Even parity is measured by checking if an even number of 1-bits are sent. A number
such as 0 1 1 0 1 1 0 0 1 has four 0-bits but has five 1-bits and is therefore not showing
even parity.
f Check digits are used to check if data has been entered correctly. They are not used to
check for transmission errors.
g A checksum is calculated from bytes in the data block and not from the 1-bits in
a single byte.
h Asymmetric encryption uses two separate keys – a public key and a private key.

10

11 • asymmetric encryption
• public
• private
• document
• algorithm
• matching pairs
• mathematically
• public key
• public key
• encrypted
• matching private
• document
• decrypt

12
13

You might also like