Chapter 2
Chapter 2
Chapter 2
Introduction:
When data is sent from one device to another, it is important to consider how that data is
transmitted.
It is also important to ensure that data hasn’t been corrupted in any way as well.
Some of the important technologies going on in the background which support the internet
will be discussed in this chapter.
Data transmission:
According to our syllabus, we will consider three factors regarding data transmission:
1
A confusing question regarding duplex data transmission:
Answer key
2) The method of data transmission: It means bits are sent one after the
other in a single stream.
i) Serial data transmission:
It is when data is sent, one bit at a time, over a single wire or channel.
The bits arrive in sequence.
It can be synchronous or asynchronous.
a) Advantages:
1
b) Disadvantages:
c) Applications:
It is when several bits of data (usually 1 byte) are sent down several wires or channels at
the same time. (one wire or channel is used to transmit each bit)
The bits may arrive out of sequence.
It can only be synchronous.
a) Advantages:
b) Disadvantages:
1
c) Applications:
a) Advantages:
b) Disadvantages:
a) Advantages:
b) Disadvantages:
1. The timing must be very accurate as there are no control bits sent along otherwise data
will be mixed up/skewed.
1
Exam style questions:
Instructions for attempting questions:
If examiner tells you that a person is using any of the following be it:
And asks you to explain why the person is using that specific data transmission method.
Just remember that you have to address both parts of the questions to gain full marks. This
kind of question is mostly asked for 4 marks and above.
One part will address the advantages/benefits/choice of using either serial or parallel transmission.
The other part will address the advantages/benefits/choice of using either simplex, half-duplex or
duplex transmission.
If it is a 4 mark question, then 2 statements for direction of transmission + 2 statements for
method of transmission will earn you 4 marks.
If you only address either direction or method and forget the other, no more than 2/4 marks can
be secured.
Q1. A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission. Describe how the computer uses these for data transmission, including the
type of data transmission used. (4)
Q2. Priya stores her website on a webserver. To transmit the website data to the webserver
she uses parallel duplex data transmission. Describe how data is transmitted using parallel
duplex data transmission. (4)
1
Q3. A file server is used as a central data store for a network of computers. Rory sends data
from his computer to a file server that is approximately 100 metres away. It is important
that the data is transmitted accurately. Rory needs to be able to read data from and write
data to the file server at the same time.
Identify the most suitable data transmission methods for this application: (2)
Serial ✓ Simplex
Parallel Half-duplex
Duplex ✓
Explain why your answer is the most suitable data transmission. (4)
Serial duplex is used since serial uses a single wire hence there is a less chance of
interference.
It is more reliable over longer distances (100 metres and above).
It is more accurate and bits won’t be skewed over a long distance.
Moreover, duplex transmits data in both directions simultaneous which allows read and
write operations at the same time.
Read and write at the same time won’t be allowed by other methods such as simplex and
half-duplex.
Q4. MIDI is a device that uses serial data transmission. Explain two advantages of using
serial transmission rather than parallel transmission. (4)
Serial transmission uses a single wire therefore it is cheaper to manufacture, buy and install.
Since a single wire is used, it is less likely to have interference and proves more reliable.
Moreover, data is sent one bit at a time therefore there are less chances of data being
skewed which makes it more accurate for longer distances.
Q5. A company has over 100 cameras. At the end of each day all these cameras send their
images, capture over the last 24 hours, to a central computer.
Explain why a company uses dedicated fibre optic cable rather than transmitting the data
over the local broadband network? (2)
1
Q6.
Answers:
1
Q7.
Answers:
True False
✔
✔
✔
✔
✔
1
Universal Serial Bus (USB):
1. Computer automatically detects the presence of device due to slight change in voltage
level.
2. The device is automatically recognized, and the appropriate device driver is loaded.
3. If a new device is detected, the computer looks up the device driver which matches the
device; if it’s unavailable, the user is prompted to download the appropriate software.
a) Fully detailed advantages: (memorize any four and use them when the question demands an
explanation of any number of advantages OR if question simply demands stating of advantages, then write
according to marks by summarizing the following points)
1. Devices are automatically detected and configured when initially attached due to change
in voltage level.
2. It is a universal standard so it is likely to be compatible with every computer.
3. It is impossible to connect device incorrectly as connector only fits one way.
4. It is a high-speed connection so data will be transmitted quicker.
5. It uses serial transmission so it is cheaper to manufacture/buy and less chance of skewing
of data.
6. It doesn't require a wireless network therefore, can be used if a network is down.
7. It is backwards compatible (with earlier versions of USB ports) so no additional technology
is needed.
8. It can power the device therefore no separate source of power is needed.
9. Drivers are automatically downloaded so no need to find them online or install manually.
b) Disadvantages:
1
Internet technologies:
According to our syllabus, we should know the following topics related to internet technologies:
1. Understanding of the role of the browser and concept of Uniform Resource Locator (URL).
2. Understanding of the role of an Internet Service Provider (ISP).
3. Understanding of what is meant by hypertext transfer protocol (http and https) and HTML.
4. Distinguish between HTML structure and presentation.
5. Understanding of the concepts of MAC address and Internet Protocol (IP) address.
1) Web browsers:
It is a software which allows a user to display a web page on their computer screen.
Web browsers translate the HTML code from websites and show the result of translation (in
the form of text, videos, images or sounds etc.).
A URL includes the domain name and protocol used along with other detailed information,
to create a complete address (or “web address”).
It directs a browser to a specific page online called a web page.
In essence, it's a set of directions and every web page has a unique one.
In a web browser, the address bar (also URL bar) shows the current URL. The user can either click
on a link or type a URL into the bar manually to navigate to a chosen website.
The web browser will break up the URL into three parts:
The first part: it is the access protocol used. It can only be either http or https.
The second part: It is the domain name or also called web servers name.
The third part: It is the file name (often the webpage)
What is DNS?
1
Functions/features of browsers:
5) Translates/interprets embedded
10) Identifies protocols, such as https, SSL
scripting e.g. java script
Q1. Explain how the web browser uses the URL to access the webpage. (4)
The web browser sends the URL to DNS (domain name system).
DNS stores an index of URL and matching IP address.
DNS searches for URL to obtain the IP address.
IP address is sent to the web browser, if found.
Web browser then sends request to IP of webserver.
Webserver sends the webpage to web browser.
Web browser interprets/translates HTML code to display the web page.
If URL is not found, DNS returns an error to the browser.
The World Wide Web (WWW), commonly known as the Web, is an information system
where documents and other web resources are identified by Uniform Resource Locators.
Q3.
Answer:
1
2) Internet Service Provider (ISP):
It is simply a company that provides the user with access to the internet.
They charge a monthly fee for this service.
Examples of ISP’s include PTCL, Wi-Tribe and Fiber Link etc.
*The statements written above are for both http and https.
The HTML structure and presentation are both defined using mark-up tags and they dictate the
appearance of the website.
*The examples stated in both structure and presentation are very important and must be memorized
along with the tags stated.
i) HTML Structure:
1
ii) HTML Presentation:
Both are defined using mark-up tags and they dictate the appearance of the website.
Structure is the layout of the web page e.g. placing an image alongside some text using tag
such as <div>
Presentation is the style/formatting of the web page e.g. the color that is applied to some
text using tag such as <font-color>
Each device on the internet is given a unique address known as the internet protocol (IP)
address by network / ISP (internet service providers).
It is used to identify the location of a device on the internet.
IP addresses can be IPv4 (32 bit) or IPv6 (128 bit).
It can be either static or dynamic.
It can be used in place of URL.
Example: 109.108.158.1
Q1. What does the terms static and dynamic IP address mean?
Static IP address means it doesn't change each time it is connected to the internet whereas
dynamic IP address means it can change each time a device is connected to the internet.
*IP address can change but the MAC address remains fairly unchanged.
1
Q3.
Answer:
1
Error-checking methods:
According to our syllabus, we will study four error-checking methods:
6. Parity checking
7. Check digits
8. Checksums
9. Automatic Repeat ReQuests (ARQ)
1) Parity checking:
Describe a situation in which a parity check cannot detect corruption of a byte OR describe a
situation in which an error during parity check goes undetected.
Error will not be detected if there are multiple errors in same byte that still produce the
same parity bit.
It will not be detected if an even/odd number of digits are changed (depending upon
even/odd parity used).
It will not be detected if a transposition error has occurred.
2) Check digits:
What is (1) meant by a check digit and (2) how it is used to detect errors. (4)
It is a validation method.
1
It is used to check data entry.
It is a digit that is calculated from the data.
It is then added to the data.
Digit is recalculated when data is entered.
2
Digits are compared to check for error.
If digits are different, error is detected.
If digits match, no error is detected.
1
3) Checksums:
We will assume the checksum of a block of data is 1 byte in length. This gives a maximum value of
28 – 1 (i.e. 255). The value 0000 0000 is ignored in this calculation.
Example:
Suppose the value of X is 1185, so we get:
X = 1185
1185/256 = 4.629
Rounding to nearest whole number gives Y = 4
Z = Y x 256
Z = 4 x 256 = 1024
X – Z = 1185 – 1024 = 161
Checksum = 161
1
Exam Style Questions:
Q1. A library’s archive system uses an error detection and correction system that combines a
parity check with an automatic repeat request (ARQ)
Describe how this system uses the parity check and ARQ. (6)
*Each error-checking method is asked for no more than 4 marks in an exam. The examiner can
either give a specific error-checking method alone for 4 marks or ask you to write any one of your
choice. If methods are combined then examiner can ask in following ways:
Q2. There are various methods used to detect errors that can occur during data transmission
and storage.
Describe each of the following error detection methods: [8]
1) Parity check
2) Check digit
3) Checksum
4) Automatic Repeat request (ARQ)
*Since 4 methods are asked and 8 marks are assigned, each method will be answered for no more
than 2 marks so (2 x 4 = 8).
Q3. Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred. [9]
*Since 3 methods are asked and 9 marks are assigned, each method will be answered for no more
than 3 marks so (3 x 3 = 9).
1
Questions and other conceptual explanations of (i) check digit and (ii) parity checking:
i) Check digit:
Q1.
1
Q2.
1
Answer:
Q1.
Q2.
1) Systems that use EVEN PARITY have an even number of 1- bits; systems that use ODD
PARITY have an odd number of 1-bits.
2) If it is given in a question that even parity is used and an incomplete register like below is
given, you need to count the number of 1’s to see if they are even or odd. If they are even
already, then simply add 0’s in the blank space. If 1’s are odd, then you need to balance and
write 1’s until the total number of 1’s become even.
1
3) Similarly, if it is given in a question that odd parity is used and an incomplete register is given,
you need to count the number of 1’s to see if they are even or odd. If they are odd already, then
simply add 0’s in the blank space. If 1’s are even, then you need to balance and write 1’s until
the total number of 1’s become odd.
4) If the examiner gives you a complete register filled with 8 bits, and tells you that even parity
is used, asking you to identify if the data was transmitted correctly. You simply need to count
the number of 1’s in the register and check if they are even. If they are even then data was
transmitted correctly and if they are odd then it was corrupted during transmission.
5) Similarly, if the examiner gives you a complete register filled with 8 bits, and tells you that
odd parity is used, asking you to identify if the data was transmitted correctly. You simply
need to count the number of 1’s in the register and check if they are odd. If they are odd then
data was transmitted correctly and if they are even then it was corrupted during transmission.
11001000
01111100
01101001
10110100
01101101
10000001
1
Q3.
Q4.
Q5.
1
Q6.
1
1) First we need to see what type of parity is used.
2) According to the even/odd parity used, we need to count 1’s in all columns and check which of
the column does not follow the even/odd parity used.
3) Then we need to count 1’s in all bytes (rows) and check which of the column does not follow the
even/odd parity used.
4) The intersection point of the column and byte gives the corrupted bit.
6) If the examiner asks to circle the corrupted bit then simply encircle the bit at the intersection
point.
5) If the examiner asks to write byte number and column number, we simply write in the answer
the byte number with wrong parity and the column number with wrong parity.
7
6
ii) How did you arrive to your answer in part (i)? (2) The corrupted bit has been encircled
as well for you to understand
Column 6 has odd number of 1’s (7 ones).
(though it is not the requirement of
Byte 7 has odd number of 1’s (3 ones).
this question)
1
Exam Style Questions:
Q1.
Answer:
1
Q2.
Answer:
1
Q3.
Answer:
Register C
Count the number of 1 bits in each byte/register.
Two registers have an odd number of 1 bits (odd parity).
Odd parity must be the parity used.
One register has an even number of 1 bits (even parity).
One with an even number of one bits is incorrect.
Register C should have odd parity.
1
Q4.
Answer:
Register Y
Count the number of 1 bits in each byte/register.
Two registers have an odd number of 1 bits (odd parity).
Even parity must be the parity used.
One register has an even number of 1 bits (even parity).
The two registers with an odd number of one bits is incorrect.
Register X and Z should have even parity.