Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chapter 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

2 Communication and internet technologies

Introduction:

When data is sent from one device to another, it is important to consider how that data is
transmitted.
It is also important to ensure that data hasn’t been corrupted in any way as well.
Some of the important technologies going on in the background which support the internet
will be discussed in this chapter.

Data transmission:

According to our syllabus, we will consider three factors regarding data transmission:

1. The direction of data transmission.


2. The method of transmission.
3. The method of synchronization between the two devices.

1) The direction of data transmission:

i) Simplex data transmission:

It is in one direction only (i.e. from sender to receiver).


Example: data sent from computer to a printer,
microphone to computer, sensor to computer,
computer to speaker, computer to monitor etc.

ii) Half-duplex data transmission:

It is in both directions but not at the same time.


Example: a phone conversation between two
people where only one person speaks at a time,
a video conference where only one person speaks
at a time etc.

iii) Full-duplex data transmission:

It is also called “Duplex data transmission”.


It is in both directions simultaneously
(at the same time).
Example: broadband connection on a phone
line, instant messaging, computer to modem etc.

1
A confusing question regarding duplex data transmission:

Answer key

2) The method of data transmission: It means bits are sent one after the
other in a single stream.
i) Serial data transmission:

It is when data is sent, one bit at a time, over a single wire or channel.
The bits arrive in sequence.
It can be synchronous or asynchronous.

a) Advantages:

It uses a single wire/channel hence:


1. It is more reliable over longer distances.
2. The cost of wiring is less expensive since a single wire is used.
3. Single wire means less chance of interference/data corruption.

Data is sent one bit at a time:


4. Data is sent more accurately over longer distances.
5. There is a less chance of data being skewed.

1
b) Disadvantages:

It uses a single wire/channel hence:


1. Data is transmitted at a slower rate.

c) Applications:

1. Sending data from computer to a modem.


2. Data transmission in Universal Serial Bus (USB).
3. Data transmission in Wi-Fi.
4. It is used in places where data transmission is to be done over long distances e.g. 100
metres and above.

ii) Parallel data transmission:

It is when several bits of data (usually 1 byte) are sent down several wires or channels at
the same time. (one wire or channel is used to transmit each bit)
The bits may arrive out of sequence.
It can only be synchronous.

a) Advantages:

It uses multiple wires/channels hence:


1. Data is transmitted at a faster rate.

b) Disadvantages:

It uses multiple wires/channels hence:


1. It is less reliable over longer distances.
2. The cost of wiring is more expensive since many wires are used.
3. Multiple wires means more chances of interference/data corruption.

Data is sent several bits at a time:


4. Data is sent less accurately over longer distances.
5. There is a likely chance of data being skewed.

1
c) Applications:

1. Sending data from a computer to a printer.


2. Data transmission in internal electronics of computer.
3. Data transmission on pathways between CPU and the memory.
4. Data transmission in integrated circuits (IC), buses and other internal components.
5. It is used in places where data transmission is to be done over shorter distances e.g. 10
metres and less.

3) The method of synchronization between two devices:

i) Asynchronous data transmission:

It refers to data being transmitted in an agreed bit pattern.


Data bits (1s and 0s) are grouped together and sent with control bits (without these, it
would be impossible to separate groups of data as they arrive).

a) Advantages:

1. It prevents data being mixed up/skewed.

b) Disadvantages:

1. It is a slower method of data transfer.

ii) Synchronous data transmission:

It is a continuous stream of data.


Data is accompanied by timing signals generated by an internal clock (to ensure both
sender and receiver are synchronized with each other).
The receiver counts how many bits (1s and 0s) were sent and then reassembles them
into bytes of data.

a) Advantages:

1. It is a faster method of data transfer (mostly used in network communications)

b) Disadvantages:

1. The timing must be very accurate as there are no control bits sent along otherwise data
will be mixed up/skewed.

1
Exam style questions:
Instructions for attempting questions:

If examiner tells you that a person is using any of the following be it:

1) serial simplex data transmission 4) parallel simplex data transmission

2) serial half-duplex data transmission 5) parallel half-duplex data transmission


3) serial duplex data transmission 6) parallel duplex data transmission

And asks you to explain why the person is using that specific data transmission method.
Just remember that you have to address both parts of the questions to gain full marks. This
kind of question is mostly asked for 4 marks and above.
One part will address the advantages/benefits/choice of using either serial or parallel transmission.
The other part will address the advantages/benefits/choice of using either simplex, half-duplex or
duplex transmission.
If it is a 4 mark question, then 2 statements for direction of transmission + 2 statements for
method of transmission will earn you 4 marks.
If you only address either direction or method and forget the other, no more than 2/4 marks can
be secured.

Q1. A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission. Describe how the computer uses these for data transmission, including the
type of data transmission used. (4)

Integrated circuit (IC) is used for sending data internally.


In IC, parallel data transmission is used. It means data is sent several bits over several wires
or channels at the same time.
Universal serial bus (USB) is used for sending data externally (between devices).
In USB, serial data transmission is used. It means data is sent one bit at a time over a single
wire or channel.

Q2. Priya stores her website on a webserver. To transmit the website data to the webserver
she uses parallel duplex data transmission. Describe how data is transmitted using parallel
duplex data transmission. (4)

It allows several/multiple bits to be transmitted simultaneously.


Several/multiple wires are used for transmission of data.
Moreover, data is transmitted in both directions at the same time.

1
Q3. A file server is used as a central data store for a network of computers. Rory sends data
from his computer to a file server that is approximately 100 metres away. It is important
that the data is transmitted accurately. Rory needs to be able to read data from and write
data to the file server at the same time.
Identify the most suitable data transmission methods for this application: (2)

Method 1 Tick Method 2 Tick

Serial ✓ Simplex

Parallel Half-duplex

Duplex ✓

Explain why your answer is the most suitable data transmission. (4)

Serial duplex is used since serial uses a single wire hence there is a less chance of
interference.
It is more reliable over longer distances (100 metres and above).
It is more accurate and bits won’t be skewed over a long distance.
Moreover, duplex transmits data in both directions simultaneous which allows read and
write operations at the same time.
Read and write at the same time won’t be allowed by other methods such as simplex and
half-duplex.

Q4. MIDI is a device that uses serial data transmission. Explain two advantages of using
serial transmission rather than parallel transmission. (4)

Serial transmission uses a single wire therefore it is cheaper to manufacture, buy and install.
Since a single wire is used, it is less likely to have interference and proves more reliable.
Moreover, data is sent one bit at a time therefore there are less chances of data being
skewed which makes it more accurate for longer distances.

Q5. A company has over 100 cameras. At the end of each day all these cameras send their
images, capture over the last 24 hours, to a central computer.
Explain why a company uses dedicated fibre optic cable rather than transmitting the data
over the local broadband network? (2)

Data is transmitted more securely because it is a dedicated line.


Fibre optic is not only more reliable than local broadband but it also transmits data at a
faster rate.

1
Q6.

Answers:

1
Q7.

Answers:

True False




1
Universal Serial Bus (USB):

It is an asynchronous serial data transmission method.


It is used for transferring data between a computer and a number of devices.

Essentially the USB cable consists of:

1. A four-wire shielded cable.


2. Two of the wires are used for power and earth.
3. Two of the wires are used in data transmission.

When a device is plugged into a computer using USB port:

1. Computer automatically detects the presence of device due to slight change in voltage
level.
2. The device is automatically recognized, and the appropriate device driver is loaded.
3. If a new device is detected, the computer looks up the device driver which matches the
device; if it’s unavailable, the user is prompted to download the appropriate software.

a) Fully detailed advantages: (memorize any four and use them when the question demands an
explanation of any number of advantages OR if question simply demands stating of advantages, then write
according to marks by summarizing the following points)

1. Devices are automatically detected and configured when initially attached due to change
in voltage level.
2. It is a universal standard so it is likely to be compatible with every computer.
3. It is impossible to connect device incorrectly as connector only fits one way.
4. It is a high-speed connection so data will be transmitted quicker.
5. It uses serial transmission so it is cheaper to manufacture/buy and less chance of skewing
of data.
6. It doesn't require a wireless network therefore, can be used if a network is down.
7. It is backwards compatible (with earlier versions of USB ports) so no additional technology
is needed.
8. It can power the device therefore no separate source of power is needed.
9. Drivers are automatically downloaded so no need to find them online or install manually.

b) Disadvantages:

1. The maximum cable length is presently about 5 metres


2. The present transmission rate is limited to less than 500 megabits per second
3. The older USB standard (e.g. 1.1) may not be supported in near future.

1
Internet technologies:

According to our syllabus, we should know the following topics related to internet technologies:

1. Understanding of the role of the browser and concept of Uniform Resource Locator (URL).
2. Understanding of the role of an Internet Service Provider (ISP).
3. Understanding of what is meant by hypertext transfer protocol (http and https) and HTML.
4. Distinguish between HTML structure and presentation.
5. Understanding of the concepts of MAC address and Internet Protocol (IP) address.

1) Web browsers:

It is a software which allows a user to display a web page on their computer screen.
Web browsers translate the HTML code from websites and show the result of translation (in
the form of text, videos, images or sounds etc.).

Uniform Resource Locator (URL):

A URL includes the domain name and protocol used along with other detailed information,
to create a complete address (or “web address”).
It directs a browser to a specific page online called a web page.
In essence, it's a set of directions and every web page has a unique one.

In a web browser, the address bar (also URL bar) shows the current URL. The user can either click
on a link or type a URL into the bar manually to navigate to a chosen website.

The web browser will break up the URL into three parts:

The first part: it is the access protocol used. It can only be either http or https.
The second part: It is the domain name or also called web servers name.
The third part: It is the file name (often the webpage)

What is DNS?

It is domain name system.


It translates domain names to IP addresses so browsers can load Internet resources.

1
Functions/features of browsers:

1) Displays a webpage. 6) Stores history and cookies.

2) Sends a request to web server. 7) Stores bookmarks & favorites.

3) Receives data from web server. 8) Allows multiple tabs to be opened.

4) Translates/interprets the HTML files 9) Stores data in its cache

5) Translates/interprets embedded
10) Identifies protocols, such as https, SSL
scripting e.g. java script

Q1. Explain how the web browser uses the URL to access the webpage. (4)

The web browser sends the URL to DNS (domain name system).
DNS stores an index of URL and matching IP address.
DNS searches for URL to obtain the IP address.
IP address is sent to the web browser, if found.
Web browser then sends request to IP of webserver.
Webserver sends the webpage to web browser.
Web browser interprets/translates HTML code to display the web page.
If URL is not found, DNS returns an error to the browser.

Q2. What is WWW?

The World Wide Web (WWW), commonly known as the Web, is an information system
where documents and other web resources are identified by Uniform Resource Locators.

Q3.

Answer:

Part 1 = access protocol Part 2 = domain name Part 3 = file name

1
2) Internet Service Provider (ISP):
It is simply a company that provides the user with access to the internet.
They charge a monthly fee for this service.
Examples of ISP’s include PTCL, Wi-Tribe and Fiber Link etc.

3) HyperText Transfer Protocol (http):


HyperText Transfer Protocol (http) is a set of rules that must be obeyed when using the
internet.
It is an access/application-layer protocol for transmitting hypermedia documents, such as
HTML.
It is used for communication between web browsers and web servers.

*The statements written above are for both http and https.

What is meant by https?

It means HyperText Transfer Protocol Secure.


It is an access protocol and often indicated by a padlock sign in the status bar.
It means that the website uses SSL/TLS (secure sockets layer/transport layer security).
It means that the website uses encryption (data sent to and from the webserver is
encrypted).
It secures the website and the data being transmitted.
It is slower to use as compared to http; and it is usually used when sensitive or private data
is being transferred across the internet.

4) HyperText Mark-up Language (HTML):


It is used to create and develop webpages/websites (web authoring language).
It uses both structure and presentation.
It is used in processing, definition and presentation of text.
It is translated by a browser to display webpages on screen.
It uses opening and closing tags to display and format content (e.g. color, font, layout etc.).

The HTML structure and presentation are both defined using mark-up tags and they dictate the
appearance of the website.
*The examples stated in both structure and presentation are very important and must be memorized
along with the tags stated.

i) HTML Structure:

It is the layout of the web page.


Example: placing an image alongside some text using tag such as <div>

1
ii) HTML Presentation:

It is the style/formatting of the web page.


Example: the color that is applied to some text using tag such as <font-color>

Q1. What is meant by HTML structure and presentation? (4)

Both are defined using mark-up tags and they dictate the appearance of the website.
Structure is the layout of the web page e.g. placing an image alongside some text using tag
such as <div>
Presentation is the style/formatting of the web page e.g. the color that is applied to some
text using tag such as <font-color>

Q2. What is CSS?

It means cascading style sheet.


The CSS file contains everything to control the actual presentation of the web page.

5) Internet Protocol (IP) Address:

Each device on the internet is given a unique address known as the internet protocol (IP)
address by network / ISP (internet service providers).
It is used to identify the location of a device on the internet.
IP addresses can be IPv4 (32 bit) or IPv6 (128 bit).
It can be either static or dynamic.
It can be used in place of URL.
Example: 109.108.158.1

Q1. What does the terms static and dynamic IP address mean?

Static IP address means it doesn't change each time it is connected to the internet whereas
dynamic IP address means it can change each time a device is connected to the internet.

Q2. What is the difference between MAC address and IP address?

IP address gives the location of a device on the internet.


It is an address given to each device on the internet by the network/ISP.

MAC address identifies the device connected to the internet.


It is a unique address given to a device on a network by the manufacturer.

*IP address can change but the MAC address remains fairly unchanged.

1
Q3.

Answer:

1
Error-checking methods:
According to our syllabus, we will study four error-checking methods:

6. Parity checking
7. Check digits
8. Checksums
9. Automatic Repeat ReQuests (ARQ)

Descriptions and working of the error-checking methods:

1) Parity checking:

It checks a byte of data.


Before transfer, a byte of data is allocated a parity bit and it is transmitted with each byte of
data.
An agreement is made between sender and receiver about whether odd or even parity will
be used.
It counts number of 1's to see if 1's are even or odd.
Each byte is checked after transmission to see if it matches the odd/even parity used.
If parity is incorrect, error is detected.

Describe a situation in which a parity check cannot detect corruption of a byte OR describe a
situation in which an error during parity check goes undetected.

Error will not be detected if there are multiple errors in same byte that still produce the
same parity bit.
It will not be detected if an even/odd number of digits are changed (depending upon
even/odd parity used).
It will not be detected if a transposition error has occurred.

2) Check digits:

What is (1) meant by a check digit and (2) how it is used to detect errors. (4)

It is a validation method.
1
It is used to check data entry.
It is a digit that is calculated from the data.
It is then added to the data.
Digit is recalculated when data is entered.
2
Digits are compared to check for error.
If digits are different, error is detected.
If digits match, no error is detected.

1
3) Checksums:

Before transmission, calculation is performed on data to get an additional value called


checksum.
Checksum is then sent with the block of data.
At the receivers end, it is re-calculated from block of data received.
Comparison is made between checksum before and after transmission.
If checksums are different, then error is detected and retransmission request is sent.
If they are same, then data has been transmitted correctly.

We will assume the checksum of a block of data is 1 byte in length. This gives a maximum value of
28 – 1 (i.e. 255). The value 0000 0000 is ignored in this calculation.

If the sum of all the bytes in the transmitted block of data is


<= 255, then the checksum is this value. However, if the sum
of all the bytes in the data block > 255, then the checksum is
found using the simple algorithm shown below.

Example:
Suppose the value of X is 1185, so we get:
X = 1185
1185/256 = 4.629
Rounding to nearest whole number gives Y = 4
Z = Y x 256
Z = 4 x 256 = 1024
X – Z = 1185 – 1024 = 161
Checksum = 161

4) Automatic Repeat Requests (ARQ)

It uses an acknowledgment and timeout.


Request is sent with data requiring acknowledgment.
A check is performed on received data (e.g. error detected by parity check or check sum).
If an error is detected then a request is automatically sent to resend data.
Resend request is repeatedly sent until data is received correctly or limit is reached.

What is acknowledgment? What is timeout?


It is a message sent by the receiver indicating It is the time allowed to elapse before an
that data has been received correctly. acknowledgment is received.

1
Exam Style Questions:

Q1. A library’s archive system uses an error detection and correction system that combines a
parity check with an automatic repeat request (ARQ)

Describe how this system uses the parity check and ARQ. (6)

The system could use either odd or even parity.


A parity bit is added to the byte of data.
Each byte is checked after transmission to see if it matches the odd/even parity used as
numbers of 1’s are counted.
If parity is correct, no error is found.
An acknowledgment is sent that data is received correctly and the next packet of data is
transmitted.
If parity is incorrect, an error is detected and a request is automatically sent to resend data.
Resend request is repeatedly sent until data is received correctly or limit is reached.

*Each error-checking method is asked for no more than 4 marks in an exam. The examiner can
either give a specific error-checking method alone for 4 marks or ask you to write any one of your
choice. If methods are combined then examiner can ask in following ways:

Q2. There are various methods used to detect errors that can occur during data transmission
and storage.
Describe each of the following error detection methods: [8]

1) Parity check
2) Check digit
3) Checksum
4) Automatic Repeat request (ARQ)

*Since 4 methods are asked and 8 marks are assigned, each method will be answered for no more
than 2 marks so (2 x 4 = 8).

Q3. Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred. [9]

*Since 3 methods are asked and 9 marks are assigned, each method will be answered for no more
than 3 marks so (3 x 3 = 9).

1
Questions and other conceptual explanations of (i) check digit and (ii) parity checking:

i) Check digit:

Q1.

1
Q2.

1
Answer:

Q1.

Q2.

ii) Parity checking:

1) Systems that use EVEN PARITY have an even number of 1- bits; systems that use ODD
PARITY have an odd number of 1-bits.

2) If it is given in a question that even parity is used and an incomplete register like below is
given, you need to count the number of 1’s to see if they are even or odd. If they are even
already, then simply add 0’s in the blank space. If 1’s are odd, then you need to balance and
write 1’s until the total number of 1’s become even.

1
3) Similarly, if it is given in a question that odd parity is used and an incomplete register is given,
you need to count the number of 1’s to see if they are even or odd. If they are odd already, then
simply add 0’s in the blank space. If 1’s are even, then you need to balance and write 1’s until
the total number of 1’s become odd.

4) If the examiner gives you a complete register filled with 8 bits, and tells you that even parity
is used, asking you to identify if the data was transmitted correctly. You simply need to count
the number of 1’s in the register and check if they are even. If they are even then data was
transmitted correctly and if they are odd then it was corrupted during transmission.

5) Similarly, if the examiner gives you a complete register filled with 8 bits, and tells you that
odd parity is used, asking you to identify if the data was transmitted correctly. You simply
need to count the number of 1’s in the register and check if they are odd. If they are odd then
data was transmitted correctly and if they are even then it was corrupted during transmission.

Now attempt the following questions:

Q1. A system uses even parity.


Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.

Received byte Byte transmitted correctly Byte transmitted incorrectly

11001000

01111100

01101001

Q2. A system uses odd parity.


Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.

Received byte Byte transmitted correctly Byte transmitted incorrectly

10110100

01101101

10000001

1
Q3.

Q4.

Q5.

1
Q6.

To solve questions like the following:

1
1) First we need to see what type of parity is used.
2) According to the even/odd parity used, we need to count 1’s in all columns and check which of
the column does not follow the even/odd parity used.
3) Then we need to count 1’s in all bytes (rows) and check which of the column does not follow the
even/odd parity used.
4) The intersection point of the column and byte gives the corrupted bit.
6) If the examiner asks to circle the corrupted bit then simply encircle the bit at the intersection
point.
5) If the examiner asks to write byte number and column number, we simply write in the answer
the byte number with wrong parity and the column number with wrong parity.

7
6

ii) How did you arrive to your answer in part (i)? (2) The corrupted bit has been encircled
as well for you to understand
Column 6 has odd number of 1’s (7 ones).
(though it is not the requirement of
Byte 7 has odd number of 1’s (3 ones).
this question)

1
Exam Style Questions:

Q1.

Answer:

1
Q2.

Answer:

1
Q3.

Answer:

Register C
Count the number of 1 bits in each byte/register.
Two registers have an odd number of 1 bits (odd parity).
Odd parity must be the parity used.
One register has an even number of 1 bits (even parity).
One with an even number of one bits is incorrect.
Register C should have odd parity.

1
Q4.

Answer:

Register Y
Count the number of 1 bits in each byte/register.
Two registers have an odd number of 1 bits (odd parity).
Even parity must be the parity used.
One register has an even number of 1 bits (even parity).
The two registers with an odd number of one bits is incorrect.
Register X and Z should have even parity.

You might also like