You are on page 1of 11

1.2.

1 Serial and parallel data transmission


Transmission of data
Data transmission, digital transmission, or digital communications is the physical
transfer of data over a point-to-point or point-to-multipoint communication channel.
Examples of such channels are copper wires, optical fibres, wireless communication
channels, storage media and computer buses. The data are represented as an
electromagnetic signal, such as an electrical voltage, radiowave, microwave, or
infrared signal.
While analog transmission is the transfer of a continuously varying analog signal
over an analog channel, digital communications is the transfer of discrete messages
over a digital or an analog channel.

in

Serial Transmission

M
-M

us

ht
a

us

sa

In telecommunication and computer science, serial communication is the process of


sending data one bit at a time, sequentially, over a communication channel or
computer bus. Serial communication is used for all long-haul communication and
most computer networks, where the cost of cable and synchronization difficulties
make parallel communication impractical.

Serial transmission has the advantage of being simple and reliable because other
next it is not transmitted until the current one has been received. However,
because only one bit can be transmitted at a time, the transmission is slow.all
peripheral devices that connect through a universal serial bus(USB) use serial data
transmission.

Contact the teacher: 03215275281

Parallel transmission
If the devices are connected by more than one wire, then more bits can be sent
simultaneously. A sensible number of wires would be eight, because then whole
byte can be sent at the same time.

M
-M

us

ht
a

us

sa

in

Parallel transmission of data is faster than serial transmission because all the bits
are travelling at the same time. It is less reliable as the bits can become muddled
up. The bits might reach out of sequence at the destination. This problem is call
skew. Parallel transmission is suitable for short distances.

Contact the teacher: 03215275281

Error detection and correction


A parity bit, or check bit is a bit added to the end of a string of binary code that
indicates
whether
the
number
of
bits
in
the
string
with
the
value one is even or odd. Parity bits are used as the simplest form of code. There
are two variants of parity bits: even parity bit and odd parity bit. In the case of
even parity, the number of bits whose value is 1 in a given set are counted. If that
total is odd, the parity bit value is set to 1, making the total count of 1's in the set
an even number. If the count of ones in a given set of bits is already even, the
parity bit's value remains 0.

sa

in

In the case of odd parity, the situation is reversed. Instead, if the sum of bits with
a value of 1 is odd, the parity bit's value is set to zero. And if the sum of bits with a
value of 1 is even, the parity bit value is set to 1, making the total count of 1's in
the set an odd number.

7 bits of data (count of 1 bits)

ht
a

1010001

00000000

us

M
-M

0000000

even

us

8 bits including parity

odd

00000001

10100011

10100010

1101001

11010010

11010011

1111111

11111111

11111110

Error detection
If an odd number of bits (including the parity bit) are transmitted incorrectly, the
parity bit will be incorrect, thus indicating that a parity error occurred in the
transmission. The parity bit is only suitable for detecting errors; it
cannot correct any errors, as there is no way to determine which particular bit is
corrupted. The data must be discarded entirely, and re-transmitted from scratch.
On a noisy transmission medium, successful transmission can therefore take a long
time, or even never occur. However, parity has the advantage that it uses only a
single bit and requires only a number of XOR gates to generate.Parity bit checking
is used occasionally for transmitting ASCII characters, which have 7 bits, leaving
the 8th bit as a parity bit.
Contact the teacher: 03215275281

For example, the parity bit can be computed as follows, assuming we are sending
simple 4-bit values 1001.

Type of bit parity

Successful transmission scenario

A wants to transmit: 1001


A computes parity bit value: 1+0+0+1 (mod 2) = 0
A adds parity bit and sends: 10010
Even parity

B receives: 10010
B computes parity: 1+0+0+1+0 (mod 2) = 0

in

B reports correct transmission after observing expected even

sa

result.

us

A wants to transmit: 1001

A computes parity bit value: 1+0+0+1 + 1 (mod 2) = 1

A adds parity bit and sends: 10011


B receives: 10011

ht
a

Odd parity

us

B computes overall parity: 1+0+0+1+1 (mod 2) = 1

M
-M

B reports correct transmission after observing expected result.

Integrated circuits are more expensive when they have more pins. To reduce the

number of pins in a package, many ICs use a serial bus to transfer data when
speed is not important.
As suggested by the name Universal Serial Bus, data transmission in the bus
occurs in a serial form. Bytes of data are broken up and sent along the bus one bit
at a time, with the least significant bit first as illustrated by following figure 3.

Contact the teacher: 03215275281

1.2.2 Security aspects


Internet security

Internet use poses security challenges from spyware, as well as hacking and
malware. Spyware is malware that secretly collects various types of personal
information from a users computer. Users are also vulnerable to Internet-based
deception (or computer-based social engineering) Such as:

sa

Hacking and other computer crime

in

Phishing
Pharming
Advance fee fraud.
Some other Internet security problems include:
Spam
Browser cookie files
Adware

M
-M

us

ht
a

us

Threats to security and measures to combat them include:


The crime of gaining unauthorized access to computer data, known as hacking
Other forms of computer crime including:
Data theft
Identity (ID) data theft, including phishing and Pharming
Fraudulent trading
Banking fraud
Espionage
Infringement of the copyright of software or music
Distributing or acquiring child pornography
Harassment (cyberstalking)
Child grooming
Distribution of malware
Denial-of-service attacks
Malware (which can be detected and removed by anti-virus software) including:
Virus
Worm
Trojan horse
Scareware
Spyware
Crimeware

Contact the teacher: 03215275281

Computer Security
Firewall
A firewall is a utility program (or it can also be a hardware device) that filters the
information coming through the Internet connection into your personal computer or
into a company's network. Its main aim is to try to stop any attempts by intruders
to enter your system through the internet connection.
It is set up to allow mainly one way access, i.e. you can go out onto the Internet
and access pages, but it checks every data packet that either enters or leaves the
computer against a set of rules. If the data coming back is from an unauthorized
source then it is blocked. More.

in

You may have heard people saying, 'I can't get on that site at school because it's
been blocked'; that is the firewall in action.

sa

All networks and indeed all home PCs should have an active firewall.

us

Spyware protection

Spyware is a software program that once installed on your computer can monitor
and collect personal information about your web surfing habits and the web pages
that you visit.

M
-M

us

ht
a

You are usually unaware that your machine has been infected by spyware and it
can sit in the background, collecting information about you and then transmitting it
back to the author of the spyware - often advertisers who want to know what you
are interested in and what adverts you click on.
Spyware may be installed without your knowledge by downloading some shareware
or other software that seems to do something useful e.g. a free game or utility.
Whilst spyware is normally harmless, it can interfere with your control of the
computer in other ways. It can install additional software which redirects the web
browser to sites that it wants you to visit. It can also change the computer settings
which can result in slow connect speeds and it can prevent you from accessing
secure internet services.
Key loggers are another form of spyware, but they are not so harmless. The

purpose of a key logger is to monitor and store a record of every keystroke made
on the computer. This data may then be sent to a remote server without your
knowledge. It is specifically looking for user names and passwords used for things
such as bank accounts, credit card numbers etc.
Computer security software normally includes an anti-spyware section to help
detect these malicious programs. You need regularly scan your system for spyware
and key loggers and remove them if they are found.

Contact the teacher: 03215275281

Anti-virus
A computer virus is a software program that is designed to copy itself over and over
again and to attach itself to other programs.
Viruses do not damage the computer hardware. They affect the data and programs
stored on the computer.
They can cause an immense amount of time wasting and financial loss for people
and businesses. For example, the "Melissa" virus was so effective in spreading itself
that many huge corporations had to shut down their email systems until the virus
could be contained.
The operating system tries to make sure that data is not corrupted by viruses. In
order to do this, antivirus software is used.

sa

in

There are a number of anti-virus programs available for wiping out viruses for
example Norton, McAfee, Sophos and AVG.

us

The anti-virus software contains a database of known viruses. Every time a file is
opened, the anti-virus utility checks the content, looking for hidden viruses against
its database.

ht
a

When the utility recognises a virus pattern, it will alert the user, and ask them
whether they want to remove the virus and clean the system, or whether they
simply want to 'quarantine' the virus.

M
-M

us

New and more damaging viruses are being written all the time and so to keep up
with these new threats, the anti-virus companies provide constant updates to their
software. Normally, you log on to the internet and the software will update itself
either automatically or after a certain period set by you.
There is usually a small annual fee involved for this service, but it is a small price to
pay for peace of mind.

Contact the teacher: 03215275281

1.2.3 Internet principles of operations


Web browser and internet server

us

sa

in

The most common use of the Internet is to view web pages on the World Wide Web
and for this you need a software application called a 'web browser'.
A web browser will take in all the data coming down from the web site and convert
it into a format you can see (or listen to). After all, a web page is made up of many
pieces of data - text, images, video, and sound. The job of the browser is to
'render' the page into the correct format.
As a client/server model, the browser is the client run on a computer that contacts
the Web server and requests information. The Web server sends the information
back to the Web browser which displays the results on the computer or other
Internet-enabled device that supports a browser.
An information resource is identified by a Uniform Resource Identifier (URI/URL)
which may be a web page, image, video or other piece of content. Hyperlinks
present in resources enable users easily to navigate their browsers to related
resources.

us

ht
a

Web servers are computers that deliver (serves up) Web pages. Every Web server
has an IP address and possibly a domain name. For example, if you enter the URL
http://www.maxpapers.com/index.html in your browser, this sends a request to the
Web server whose domain name is maxpapers.com. The server then fetches the
page named index.html and sends it to your browser. Any computer can be turned
into a Web server by installing server software and connecting the machine to the
Internet.

M
-M

What is hypertext transfer protocol (http)?

HTTP (Hypertext Transfer Protocol)


is the set of rules for transferring
files (text, graphic, images, sound,
video, and other multimedia files
on the World Wide Web
That's why all Web site addresses
begin with "http://". Whenever you
type a URL into your browser and
hit Enter, your computer sends an
HTTP request to the appropriate
Web server. The Web server, which
is designed to handle HTTP
requests, then sends to you the
requested HTML page.

Contact the teacher: 03215275281

HTML (hypertext markup language)

in

HTML or HyperText Markup Language is the standard markup language used to


create web pages. It is written in the form of HTML elements consisting of tags
enclosed in angle brackets (like <html>). HTML tags most commonly come in pairs
like <h1> and </h1>, although some tags represent empty elements and so are
unpaired, for example <img>. The first tag in a pair is the start tag, and the second
tag is the end tag (they are also called opening tags and closing tags).
Web browsers can read HTML files and compose them into visible or audible web
pages. Browsers do not display the HTML tags and scripts, but use them to
interpret the content of the page. HTML elements form the building blocks of all
websites. HTML allows images and objects to be embedded and can be used to
create interactive forms.

M
-M

us

ht
a

us

sa

HTML Structure

HTML structure Vs Presentation

Understanding the difference between structure and presentation can be


difficult at first, especially if youre used to not thinking about the semantic
structure of a document. However, its very important to understand this,
since controlling the presentation of a document with CSS becomes much
easier if structure and presentation are separated.
Structure consists of the mandatory parts of an HTML document plus the

semantic and structured markup of its contents.

Contact the teacher: 03215275281

Presentation is the style you give the content. In most cases presentation is about
the way a document looks, but it can also affect how a document sounds not
everybody uses a graphical web browser.
Separate structure from presentation as much as possible. Ideally you should end
up with an HTML document which contains the structure and content, and a
separate CSS file which contains everything that controls presentation.

MAC addresses

M
-M

us

ht
a

us

sa

in

A media access control address (MAC address) is a unique identifier assigned to


network interfaces for communications on the physical network segment. MAC
addresses are used as a network address for most IEEE 802 network technologies,
including Ethernet and WiFi. Logically, MAC addresses are used in the media access
control protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface
controller (NIC) and are stored in its hardware, such as the card's read-only
memory or some other firmware mechanism. If assigned by the manufacturer, a
MAC address usually encodes the manufacturer's registered identification number
and may be referred to as the burned-in address (BIA). It may also be known as an
Ethernet hardware address (EHA), hardware address or physical address.A network
node may have multiple NICs and each NIC must have a unique MAC address.

Contact the teacher: 03215275281

IP address
An Internet Protocol address (IP address) is a numerical label assigned to
each device (e.g., computer, printer) participating in a computer
network that uses the Internet Protocol for communication. An IP address
serves two principal functions: host or network interface identification and
location addressing. Its role has been characterized as follows:
"A name indicates what we seek. An address indicates where it is. A route
indicates how to get there.
Why was it developed?

Cookies

M
-M

us

ht
a

us

sa

in

If two machines are networked together, then it is pretty obvious that when
you send data from one machine it can only go to the other machine. So no
need for complicated addressing. But as soon as more and more machines
were added to networks, they needed to be identified by a unique address.
So IP addressing was invented. And it looks something like this
198.168.000.001
There are four sets of numbers because it is a 4 byte scheme - 32 bits. The
first three numbers tend to be used to identify the network while the last
number tends to pinpoint a particular computer on that network.
IP addresses are binary numbers, but they are usually stored in text files
and displayed in human-readable notations, such as 172.16.254.1 (for Pv4),
and 2001:db8:0:1234:0:567:8:1 (for IPv6).
An IP address can be static or dynamic. A static IP address will never
change and it is a permanent Internet address. A dynamic IP address is a
temporary address that is assigned each time a computer or device accesses
the Internet.

A cookie is a small text file that is stored on your computer when you visit
some websites. A cookie is used to remember settings from your last visit to
a website. For example Amazon.com uses cookies to help identify you when
you revisit the site. The website reads the cookie and can then look up
details such as you name, address, credit card number from their database.
This saves you from having to re-enter your data every time you visit.
Note: First, and contrary to popular belief, cookies are NOT programs. They dont do anything at all.

They are simple text files which you can read using the Notebook program on your own PC

Contact the teacher: 03215275281

You might also like