Class IX (All Sections) Computer Science 22 October 20224, Tuesday
Class Test 2
Solutions to Questions
Chapter 2 Data Transmission
Answer to Question 1. [5]
a) Parity check b).Checksum c).Echo check
d). Automatic repeat reQuest e).Check digit
Answer to Question 2a). [2]
Two similarities between check digit and checksum are -
1. Error Detection Purpose: Both methods are used to detect errors during data
transmission. They help ensure data integrity by identifying if the transmitted data has
been corrupted or altered.
2. Mathematical Calculation: Both involve the use of mathematical algorithms to
generate a value (check digit or checksum) based on the original data. This value is
then sent along with the data, and upon receipt, the same calculation is performed to
verify that the received data matches the transmitted data.
Answer to Question 2b) i). [1]
Any one from: Parity check / Echo check / Automatic repeat reQuest
Answer to Question 2b) ii). [4]
Any one error detection method from below.
PARITY CHECK
An extra bit (parity bit) added to a string of binary code to ensure the number of 1-bits are
either even or odd, depending upon the parity check system used.
Method
1. The sending and receiving computers agree the protocol to be used (even or odd)
2. The sending computer adds the correct parity bit to the binary data (either an extra
1 or 0)
3. The sending computer sends the binary data, including the parity bit
4. The receiving computer checks to make sure the overall parity of the data received
is as agreed (an even or odd number of 1 bits)
5. If the parity of the data is incorrect, the receiving computer will request that the
data is transmitted again
AUTOMATIC REPEAT REQUESTS (ARQ)
This form of error detection uses a system of acknowledgements and timeouts.
Automatic Repeat ReQuests are often used to ensure reliable transmissions over an
unreliable service.
Acknowledgements are messages sent from a receiving device back to the original
sending device.
The acknowledgement can be negative or positive.
A positive acknowledgement means that the data was received and it passed an error
check.
A negative acknowledgement means that the data was received but it cannot be used as
it failed an error check. It needs to be sent again.
The timeout is a predetermined period of time that the sending device will wait to get
some form of acknowledgement for the data it sent.
If no acknowledgement is received after the timeout, the device will send the data
again. This continues automatically until an acknowledgement is received, or the
maximum number of re-sends occur.
Method
1. The sending computer transmits a block of data
2. The sending computer waits a period of time to see if the receiving computer
acknowledges receipt of the data
3. After no acknowledgement for a set period of time, a timeout occurs which triggers
the data to be automatically resent by the sending computer
4. This will continue until the receiving computer acknowledges the data has been
received, or a max number of re-sends occurs
ECHO CHECK
With an echo check, the receiving computer sends a copy of the data immediately back
to the sending computer for comparison.
The sending computer compares the two sets of data to check if any errors occurred
during the transmission process.
If an error has occurred, the data will be transmitted again.
Drawback of echo checks
• If the two sets of data are different you will have no way of knowing whether the
error occurred when originally sent, or when it was sent back
• Echo checks require a lot of extra data to be transmitted
Answer to Question 3a). [3]
Three Benefits of Universal Serial Bus are –
1. Devices plugged into the computer are automatically detected and device drivers are
automatically loaded up.
2. Connections can only fit one way preventing incorrect connections being made.
3. It can support different data transmission rates from 1.5 Mbps to 5 Gbps.
Answer to Question 3b). [1]
Serial Data Transmission
Answer to Question 4 a). [1]
iv – parity
Answer to Question 4 b). [1]
Data Packet
Answer to Question 4c). [4]
In symmetric encryption, data is encrypted using a single, shared secret key that both the
sender and receiver must have access to. Here's how the process works:
1. Key Generation
• A secret key (a string of bits or characters) is generated. This key will be used for
both encryption and decryption.
• The key must be kept secure and shared only between the sender and the
receiver.
2. Encryption Process
• The sender takes the plaintext (the original, unencrypted data) and uses an
encryption algorithm (e.g., AES, DES) to convert it into ciphertext.
• This process involves applying the secret key to the plaintext according to the
chosen encryption algorithm. The encryption algorithm scrambles the plaintext into
a form that is unreadable without the key.
• The output is the ciphertext, which is sent over the communication channel to the
recipient.
3. Decryption Process
• Upon receiving the ciphertext, the recipient applies the same encryption algorithm,
but in reverse, using the same shared secret key to decrypt the ciphertext back
into plaintext.
• The decryption process reverses the scrambling done by the encryption algorithm,
restoring the original data.
4. Key Sharing
• The key must be securely shared between the sender and receiver before
communication begins. This is one of the main challenges of symmetric encryption.
If the key is intercepted by a third party, they can decrypt the message.
Example:
If Alice wants to send Bob a secure message, she encrypts it using a secret key. Bob,
who knows the same key, decrypts it when he receives the encrypted message.
Advantages of Symmetric Encryption -
Fast and Efficient: Symmetric encryption algorithms are computationally less intensive
and faster than asymmetric encryption, making them suitable for encrypting large
amounts of data.
Disadvantages of Symmetric Encryption -
Key Distribution Problem: The need to securely distribute and manage the shared key
can be challenging, especially in large or distributed systems.
In summary, symmetric encryption uses the same secret key for both encryption and
decryption, requiring secure key exchange to maintain confidentiality.
Answer to Question 4d). [1]
The purpose of encryption is to help keep the data secure by making the data
meaningless.
Answer to Question 5a). [1]
One reason an error may occur is due to interference of wire used during the data
transmission or crosstalk (it relates to telecommunication or telephony, is when there is
leakage from a separate conversation from a nearby circuit into the phone conversation
of someone else nearby. The crosstalk issue can be extremely disruptive, particularly in
a business setting.
Answer to Question 5b). [1]
iii – Echo Check
Answer to Question 5c). [4]
An Automatic repeat reQuest operates using a positive acknowledgement method by the
following stages -
1. Timer is started when sending device transmits a data packet to receiver
2. Receiving device checks the data packet for errors
3. Once the receiving device knows the packet is error free it sends an
acknowledgement back to the sending device and the next packet is sent
4. If the sending device does not receive an acknowledgement before the timer ends,
a timeout occurs.
5. The data packet is resent until acknowledgement received and until maximum
number of attempts are reached.
Answer to Question 6. [2]
Any two from:
Destination/receivers (IP) address
Packet number
Originator’s/senders (IP) address