Chap 2.2 / 3 - Data transmission (error checking, encryption) Flashcards

1
Q

types of error checking

A

-Cyclic Redundancy Checks (CRC)
-Check digit (ISBN-13 / Modulo 11)
-Checksum
-Echo check
-Parity Checks
-Automatic Repeat Request (ARQs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which error checking check following transmission

A

-parity checks
-echo checks
-checksum
-ARQs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define CRC

A

-type of error checking where the no. of 1’s are counted and put as a Hex value in the trailer to be sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does CRC work

A

-count no. 1’s
-put value as Hex in the trailer
-receiving comp counts no. 1’s & CRC
-if match = no error; no match = error & packet resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why do you need to check for errors

A

-risk that data may be tampered with during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Errors can occur due to:

A

-interference = all cables can suffer from electrical interference
-problems during packet switching
-skewing of data = in parallel transmission, bits arrive out of sync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define parity checking

A

-type of error checking where a parity bit is added based on the chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

define parity bit

A

-extra bit added based on the chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does Parity Check work

A

-choose even or odd
even:
-count no. 1’s
-if even, parity bit = 0; if odd, parity bit = 1
odd:
-count no. 1’s
-if odd, parity bit = 0; if even, parity bit = 1

-receiving comp checks if no. 1’s matched chosen parity system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to find faulty bit in parity check

A

-Criss cross method
-count no. 1’s in each column & row (parity bit & byte), find one that doesn’t match chosen parity system
-find intersection point
-can determine which digital stream was changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define checksum

A

-type of error checking where a checksum is calculated form the data using and agreed algorithm & transmitted with the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how does checksum work

A

-calculate checksum from agreed algorithm
-checksum is sent with data
-receiving comp recalculates checksum & compares them
-if match = no error; no match = error & resend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define Echo check

A

-type of error checking where sent data is sent back to sender to check if any error occurred during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does echo check work

A

(don’t know if error happened at 1 / 2 transmission)
-data is sent
-copy of data is sent back to sender
-returned & og data are compared
-no diff = no error, yes diff = yes error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define check digit

A

-final digit in code calculated from all other digits in the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

types of check digit

A

-ISBN-13
-Modulo 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what can check digits identify

A

-incorrect digit entered
-transposition error occurred
-omitted or extra digits
-phonetic errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how is check digit used

A

-check digit is calculated by human & added to code
-human types numerical code
-comp. calculate check digit based on numerical code & compare with human check digit
-no match = human made an error
-asked to re-enter code

19
Q

ISBN 13 algorithm

A

1)from left to right, first digit is odd
2)-add all no.s in odd index sequence
2)-add all no.s in even index sequence x 3
3)- 1) + 2) / 10
4)- if remainder = 0, use
5)- else 10- remainder
6) do same for recalculation, 0 = corret transmission

20
Q

Modulo-11 algorithm (generation)

A

1)-each digit has weighting starting from 2 from right
2)-each digit x their weighting and add all
3)-total / 11
4)-if remainder = 10, check digit = X
5)-else 11- remainder

21
Q

Modulo-11 algorithm (recalculation)

A

1)-each digit has weighting starting from 1 from right to end
2)-each digit x their weighting and add all
3)-total / 11
4)-if remainder = 0, no. is correct

22
Q

diff btw Checksum & check digit

A

checksum:
-calculated from block of data
-sent with block of data
-recalculated at receiving
-if diff = error occurred
-used to check errors flowing data transmission
check digit:
-final digit in code
-calculated form other digits in code
-used to check errors during data entry
-detects, incorrect digit entered, transposition error occurred, omitted or extra digits, phonetic errors

23
Q

define ARQs

A

-type of error checking where an ( - )/( + ) acknowledgment is sent within the timeout before the data is resent

24
Q

how does ARQs work

A

-data is sent to receiver with an error detection code
-no error = ( + ) acknowledgment, no resend
-yes error = ( - ) acknowledgment, yes resend
-no acknowledgment within timeout = yes resend

25
define acknowledgement in ARQS
-message sent to sender indicated if data had errors during transmission
26
define timeouts in ARQS
time interval allowed to elapse before an acknowledgment is received
27
define plain text
-og messge
28
define cipher text
-texts following and encryption algorithm
29
why is encryption used
-to make data transmission safe -no interception guaranteed but data will make no sense
30
types of encryption
-symmetric -asymmetric
31
define pub. key
-key known to all users
32
define pvt. key
-key used to decrypt for asymmetric encryption
33
define shared secret
-key used to encrypt & decrypt for symmetric encryption
34
how does symmetric encryption work
-public key is used to encrypt & decrypt plain & cipher texts btw Alice & bob -2 pub keys
35
how does asymmetric encryption work
-Alice gives out pub. key to Bob to encrypt plain text -cipher text is decrypted using Alice's pvt. key -only Alice has pvt. key -pub, & pvt, keys are mathematically linked tgt -pub & pvt key
36
how does end-to-end encryption work
-Alice & Bod each have pub. & pvt. keys -they send pub. keys cipher text send to each other can be decrypted by their own pvt. key
37
describe a situation where parity check wouldn't identify which bit has been transmitted incorrectly
-even/ odd no. errors so if (parity type) retained eg, 2 bits have changed
38
how does encryption improve security
-encrypted text is meaningless -need a key to decrypt
39
how to make encryption more secure
-add more bits to the key so less chance of decryption by brute force
40
3 differences between symmetric & asymmetric encryption
-sym uses the same keys for encryption and decryption but asym uses 2 different keys for encryption and decryption -asym has a pvt key but sym does not -asym is used for secure key exchange but sym is used for bulk data transmission
41
how does a data logger calculate the parity bit
-count the number of 1's in the first 7 bits -add a 0 or 1 depending on the parity type
42
role of parity byte in error detection
It provides a means to check for errors by ensuring that the total number of 1s in the byte is even or odd
43
disadvantage of symmetric encryption
security problem when transmitting encryption key
44
define symmetric encryption key
-sender & receiver use same key to encrypt & decrypt message