Unit 2:
Methods of Data Transmission
Methods of Data Transmission
Key Take aways:
in order for datagrams to be transmitted between computer devices, the data must be 'chopped up' into small pieces known as data packets
in order for the packets to not get lost or muddled up or go to the wrong destination, each packet must be constructed in a spacific way according to the protocols being used to transmit it.
Generally, each packet will consist of a header, a payload and a trailer
Header - stores information about sender and destination as well as info about the packet itself (how many other packets there are, which number order, checksum ....)
payload refers to the data that is to be transferred - ie the message
a trailer indicates the end of a block of data that iis being sent - it can also hold error checking information
Packet switching refers to a method of transmitting data accross a network, each packet traveling independently across the network using the fastest available route.
Once all packets have been received they are then reconstucted and translated by the software on the destination device
Data can travel across parallel wires simultaneously or they can travel 1 bit at a time down a single wire (serial)
simplex is when data can only travel down a wire in one direction - only good over very short distances
full-duplex is when data can travel 1 bit at a time down a wire in both direction (like a phone)
half-duplex is when data can travel 1 bit at a time down a wire in both direction but only one drection at a time (like a walkie talkie)
bits of data can be lost or transposed during transfer - it is important to check and maintain the accuracy of data
It is also important to encrypt data to secure it as it travels and whilst it is stored.
If a password isnt transmitted accurately, a person would not gain access to their account ...
If a persons address isnt transmitted accurately, a person would not get their emails ...
If a persons details arent transmitted accurately, a person may not receive the good they have ordered ....
Data is valuable! And when it is being transmitted it becomes vulnerable, not only to errors but also to theft.
A way to secure data is through encryption. By encrypting plaintext, we can make it unreadable to those without permission to access the data.
Those with permission, will have the necessary keys to encrypt and decrypt the data and return it to readable plaintext format.
This process may not stop data being stollen but it can make it unreadable to to those who have stolen it.
Symmetric-key algorithms are algorithms that use the same keys for both the encryption of plaintext and the decryption of ciphertext. - rather like Caesar Cypher uses the same key to encrypt and then decrypt.
Asymmetric Encryption uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption.
As implied in the name, the Private Key is intended to be private so that only the authenticated recipient can decrypt the message.
Can you name the 3 sections of a data packet?
What information does the packet header contain?
Which part of the data packet stores the main file data?
Why does data need to be broken down into packets to be transmitted?
What method of data transmission sends data down a single wire?
Which method of data transmission sends data multiple bits at a time?
If a data transmission connection sends data 1 bit at a time in both directions but not at the same time - what kind of data transmission method is being used?
What does USB stand for?
What type of data transmission method does a USB interface use?
What are 2 advantages of USB interfaces?
What length is a USB cable limited to? Can you think why it is limited to this length?
Does encryption stop data being stolen by a hacker? Why / Why not?
Why is asymmetric encryption a more secure method of encryption than symentric?