Data transmission Flashcards

(42 cards)

1
Q

What is serial data transmission?

A

Serial data transmission sends data one bit at a time over a single wire or channel. It’s used for long-distance communication because it reduces interference and cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is parallel data transmission?

A

Parallel data transmission sends multiple bits simultaneously using multiple wires. It is used for short distances, like inside a computer, because it is faster but more prone to interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is simplex transmission?

A

Simplex transmission is one-way communication where data flows in only one direction (e.g., a keyboard sending data to a computer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is half-duplex transmission?

A

Half-duplex transmission allows data to be sent in both directions but not at the same time (e.g., walkie-talkies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is full-duplex transmission?

A

Full-duplex transmission allows data to be sent and received simultaneously in both directions (e.g., phone calls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a data packet?

A

A data packet is a unit of data formatted for transmission over a network. It includes the header, payload, and trailer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is included in the header of a data packet?

A

The header contains control information such as source address, destination address, packet number, and protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the payload in a data packet?

A

The payload is the actual data being transmitted (e.g., a part of an email or file).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the trailer in a data packet?

A

The trailer contains error-checking information like checksums or cyclic redundancy checks (CRC) to detect errors during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is packet switching?

A

Packet switching splits data into packets that travel independently through the best available route on the network. It is efficient and robust but can cause delays or packet reordering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is circuit switching?

A

Circuit switching creates a dedicated communication path between two devices. It guarantees order and constant data rate but is less efficient for large networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is error detection in data transmission?

A

Error detection involves methods like checksums, parity checks, and CRC to identify errors in transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do errors occur in data transmission?

A

Due to interference like wire degradation, electromagnetic signals, bad weather, or physical barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three results of interference during transmission?

A

Data loss, data gain, and data change (flipped bits).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is error checking necessary?

A

Computers expect data in specific formats; errors can make data unreadable or misleading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a parity check?

A

It determines if data has been corrupted by checking the number of 1s (odd/even parity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the rule for even parity?

A

Total number of 1s in a byte (including parity bit) must be even.

18
Q

What is a limitation of simple parity checks?

A

They can’t detect bit swaps that don’t change the number of 1s.

19
Q

What is a parity byte?

A

A row of parity bits calculated vertically from each column in a block of data.

20
Q

What is the purpose of a parity block?

A

It allows errors to be detected and pinpointed by checking both rows and columns.

21
Q

What happens if an error is found using parity block?

A

It can be automatically fixed or a retransmission request is sent.

22
Q

What is a checksum?

A

A value calculated from the data and sent with it to detect corruption.

23
Q

How is a checksum used?

A

Receiver recalculates it and compares it to the original. A mismatch means an error occurred.

24
Q

What is an echo check?

A

Receiver sends data back to the sender for comparison.

25
Why is echo check unreliable?
Errors could occur in either direction of transmission.
26
What is a check digit?
A digit added to the end of a number to verify its accuracy using an algorithm.
27
Where are check digits used?
ISBNs, barcodes, and similar numeric codes.
28
What errors can check digits detect?
Incorrect digits, extra or missing digits, and phonetic errors.
29
What is ARQ?
A protocol that requests retransmission if data is incorrect or not acknowledged
30
What happens if the sender doesn’t receive an acknowledgment?
It waits for a timeout, then resends the data.
31
What are the two types of ARQ acknowledgments?
Positive (no error) and negative (error detected).
32
What is encryption?
A method of scrambling data to make it meaningless to unauthorized users during transmission.
33
What is plaintext?
Data in its original, readable form before encryption.
34
What is ciphertext?
Data after it has been encrypted; it appears scrambled and unreadable.
35
What is a key in encryption?
A binary string used with an algorithm to encrypt or decrypt data.
36
Why is encryption especially important for wireless networks?
Wireless data travels via radio waves and is easier to intercept.
37
What is symmetric encryption?
An encryption method where the same secret key is used to encrypt and decrypt data.
38
What is a major risk of symmetric encryption?
If the key is intercepted or stolen, the data can be decrypted.
39
What is asymmetric encryption?
An encryption method using a public key for encryption and a private key for decryption.
40
Who knows the public key and private key in asymmetric encryption?
Public key is known to everyone; private key is known only to the receiver.
41
Why is asymmetric encryption considered more secure?
The private key is never transmitted, so it’s harder for attackers to intercept and decrypt messages.
42
What encryption protocol is commonly used in wireless networks?
WPA2 (Wi-Fi Protected Access 2).