0% found this document useful (0 votes)
36 views8 pages

Computer Science O Level Chapters 1-4 and 7-9

The document contains solutions to questions from a Class IX Computer Science test on Data Transmission. It covers various error detection methods such as parity check, checksum, echo check, and automatic repeat request, along with their processes and advantages. Additionally, it discusses symmetric encryption, its benefits and challenges, and the purpose of encryption in data security.

Uploaded by

yiyadok303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views8 pages

Computer Science O Level Chapters 1-4 and 7-9

The document contains solutions to questions from a Class IX Computer Science test on Data Transmission. It covers various error detection methods such as parity check, checksum, echo check, and automatic repeat request, along with their processes and advantages. Additionally, it discusses symmetric encryption, its benefits and challenges, and the purpose of encryption in data security.

Uploaded by

yiyadok303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Class IX (All Sections) Computer Science 22 October 20224, Tuesday

Class Test 2

Solutions to Questions

Chapter 2 Data Transmission

Answer to Question 1. [5]

a) Parity check b).Checksum c).Echo check

d). Automatic repeat reQuest e).Check digit

Answer to Question 2a). [2]

Two similarities between check digit and checksum are -

1. Error Detection Purpose: Both methods are used to detect errors during data

transmission. They help ensure data integrity by identifying if the transmitted data has

been corrupted or altered.

2. Mathematical Calculation: Both involve the use of mathematical algorithms to

generate a value (check digit or checksum) based on the original data. This value is

then sent along with the data, and upon receipt, the same calculation is performed to

verify that the received data matches the transmitted data.

Answer to Question 2b) i). [1]

Any one from: Parity check / Echo check / Automatic repeat reQuest

Answer to Question 2b) ii). [4]

Any one error detection method from below.

PARITY CHECK

An extra bit (parity bit) added to a string of binary code to ensure the number of 1-bits are

either even or odd, depending upon the parity check system used.
Method

1. The sending and receiving computers agree the protocol to be used (even or odd)

2. The sending computer adds the correct parity bit to the binary data (either an extra

1 or 0)

3. The sending computer sends the binary data, including the parity bit

4. The receiving computer checks to make sure the overall parity of the data received

is as agreed (an even or odd number of 1 bits)

5. If the parity of the data is incorrect, the receiving computer will request that the

data is transmitted again

AUTOMATIC REPEAT REQUESTS (ARQ)

This form of error detection uses a system of acknowledgements and timeouts.

Automatic Repeat ReQuests are often used to ensure reliable transmissions over an

unreliable service.

Acknowledgements are messages sent from a receiving device back to the original

sending device.

The acknowledgement can be negative or positive.

A positive acknowledgement means that the data was received and it passed an error

check.

A negative acknowledgement means that the data was received but it cannot be used as

it failed an error check. It needs to be sent again.

The timeout is a predetermined period of time that the sending device will wait to get

some form of acknowledgement for the data it sent.


If no acknowledgement is received after the timeout, the device will send the data

again. This continues automatically until an acknowledgement is received, or the

maximum number of re-sends occur.

Method

1. The sending computer transmits a block of data

2. The sending computer waits a period of time to see if the receiving computer

acknowledges receipt of the data

3. After no acknowledgement for a set period of time, a timeout occurs which triggers

the data to be automatically resent by the sending computer

4. This will continue until the receiving computer acknowledges the data has been

received, or a max number of re-sends occurs


ECHO CHECK

With an echo check, the receiving computer sends a copy of the data immediately back

to the sending computer for comparison.

The sending computer compares the two sets of data to check if any errors occurred

during the transmission process.

If an error has occurred, the data will be transmitted again.

Drawback of echo checks

• If the two sets of data are different you will have no way of knowing whether the

error occurred when originally sent, or when it was sent back

• Echo checks require a lot of extra data to be transmitted

Answer to Question 3a). [3]

Three Benefits of Universal Serial Bus are –

1. Devices plugged into the computer are automatically detected and device drivers are

automatically loaded up.

2. Connections can only fit one way preventing incorrect connections being made.
3. It can support different data transmission rates from 1.5 Mbps to 5 Gbps.

Answer to Question 3b). [1]

Serial Data Transmission

Answer to Question 4 a). [1]

iv – parity

Answer to Question 4 b). [1]

Data Packet

Answer to Question 4c). [4]

In symmetric encryption, data is encrypted using a single, shared secret key that both the

sender and receiver must have access to. Here's how the process works:

1. Key Generation

• A secret key (a string of bits or characters) is generated. This key will be used for

both encryption and decryption.

• The key must be kept secure and shared only between the sender and the

receiver.

2. Encryption Process

• The sender takes the plaintext (the original, unencrypted data) and uses an

encryption algorithm (e.g., AES, DES) to convert it into ciphertext.

• This process involves applying the secret key to the plaintext according to the

chosen encryption algorithm. The encryption algorithm scrambles the plaintext into

a form that is unreadable without the key.

• The output is the ciphertext, which is sent over the communication channel to the

recipient.
3. Decryption Process

• Upon receiving the ciphertext, the recipient applies the same encryption algorithm,

but in reverse, using the same shared secret key to decrypt the ciphertext back

into plaintext.

• The decryption process reverses the scrambling done by the encryption algorithm,

restoring the original data.

4. Key Sharing

• The key must be securely shared between the sender and receiver before

communication begins. This is one of the main challenges of symmetric encryption.

If the key is intercepted by a third party, they can decrypt the message.

Example:

If Alice wants to send Bob a secure message, she encrypts it using a secret key. Bob,

who knows the same key, decrypts it when he receives the encrypted message.

Advantages of Symmetric Encryption -

Fast and Efficient: Symmetric encryption algorithms are computationally less intensive

and faster than asymmetric encryption, making them suitable for encrypting large

amounts of data.

Disadvantages of Symmetric Encryption -

Key Distribution Problem: The need to securely distribute and manage the shared key

can be challenging, especially in large or distributed systems.

In summary, symmetric encryption uses the same secret key for both encryption and

decryption, requiring secure key exchange to maintain confidentiality.


Answer to Question 4d). [1]

The purpose of encryption is to help keep the data secure by making the data

meaningless.

Answer to Question 5a). [1]

One reason an error may occur is due to interference of wire used during the data

transmission or crosstalk (it relates to telecommunication or telephony, is when there is

leakage from a separate conversation from a nearby circuit into the phone conversation

of someone else nearby. The crosstalk issue can be extremely disruptive, particularly in

a business setting.

Answer to Question 5b). [1]

iii – Echo Check

Answer to Question 5c). [4]

An Automatic repeat reQuest operates using a positive acknowledgement method by the

following stages -
1. Timer is started when sending device transmits a data packet to receiver

2. Receiving device checks the data packet for errors

3. Once the receiving device knows the packet is error free it sends an

acknowledgement back to the sending device and the next packet is sent

4. If the sending device does not receive an acknowledgement before the timer ends,

a timeout occurs.

5. The data packet is resent until acknowledgement received and until maximum

number of attempts are reached.

Answer to Question 6. [2]

Any two from:

Destination/receivers (IP) address

Packet number

Originator’s/senders (IP) address

You might also like