Professional Documents
Culture Documents
Data Transmission
Data Transmission
Packets
Before a file is sent across the internet it must be broken down and split into a series of packets
Structure: Header, payload, trailer
Header: Contains info that allows the packet to reach its destination - key pieces of info:
- IP address of recipient
- IP address of sender
- Number of packets being sent
- Packet sequence number
Payload: Section of the packet that holds the actual data from the file segment that is being
transmitted
Trailer: Footer identifies end of packet
Advantages Disadvantages
Parallel transmission
● Single bits are sent simultaneously over a number of parallel wires
Advantages Disadvantages
Better for short distance communication For longer ranges wire has to be thicker
USB
● Universal Serial Bus
● Type of cable and connector commonly used for half-duplex or full-duplex serial data
transmission between a computer and attached devices.
● A USB cable consists of a shielded casing containing four wires.
● Two wires are used for power and earth, and the other two wires are used for data
transmission.
● Typical cables can reach up to 5 metres.
● Automatic Detection: When a USB is plugged in it is automatically detected by the
computer
● Automatic Recognition and Setup: When plugged in computer will automatically
determine what type of device it is and load correct driver software
Advantages Disadvantages
Drivers automatically searched for and loaded Transmission rate is less than 500 mb/sec
Parity Checking
● Used to check wether data has been changed or corrupted following transmission from
one device to another
● A byte of data is allocated a parity bit
● Even parity - even no. of 1 bits
● Odd parity - odd no. of 1 bits
● If different parity after transmission then error detected
Checksum
● Data sent in blocks and an additional value sent at the end of the block
● Value is calculated from the data and sent with the data - no of bytes in piece of data
● Receiving computer recalculates sum of data received and compares with checksum
received e.g. credit cards
Check Digits
● An additional digit that is added to then end of a string of numbers
● The check digit is calculated by processing each number in the string through an
algorithm, the result is then simply added to the end
● Multiplication, Add all the numbers, find the remainder when divided by 10, subtract
result from 10
Echo Check
1) The sender will send the data to the recipient
2) The data received by the recipient is automatically sent back to the sender
3) The sender will compare the data that they sent with the data that was returned to them
4) If the two sets of data do not match than an error in transmission has been identified.
● Not reliable - If an error is detected, the sender will not know if the error occurred during
the original transmission or if it occurred during the transmission of the returned copy.
Encryption
● Encryption is the conversion of data (plain text) into a form that is unreadable
(ciphertext)
● Encryption allows us to protect data during transmission and make it meaningless if
hacked from a server.
● The process of encryption involves secret encryption/decryption keys and an encryption
algorithm.
● The longer the key, the harder it is to figure out, e.g. a 256 bit key is more secure than a
128 bit key.
Symmetric Encryption
● Symmetric encryption uses the same secret key to encrypt and decrypt the data.
● Plain text is the name of data before it is encrypted
● Ciphertext is name for data after encrypted
● However:
● Using the same key to encrypt and decrypt creates a problem known as the key
distribution problem.
● In order to decrypt your ciphertext data, the receiver will need a copy of your secret key.
● Sending the secret key over the internet causes a serious security risk since a hacker
could intercept the key and decrypt the ciphertext data too
● Symmetric encryption keys r shorter than asymmetric encryption keys so data is faster to
encrypt/decrypt
● Shorter key also = smaller file size
Asymmetric Encryption
● One key used to encrypt a message and another key is used to decrypt it
Public key: Provided by the recipient - It can be given to anyone who wishes to send encrypted
data to the recipient - Safe to share as all it can do is encrypt data
Private key: Remains private on the computer, never sent or shared - Only this key can decrypt
the data encrypted using the public key
Example process:
● A symmetric key is encrypted by the sending computer using the public key sent by the
receiving computer (usually via SSL certificate)
● The encrypted symmetric key is sent to the receiving computer (unreadable if
intercepted)
● Using the stored private key, the receiving computer decrypts the symmetric key
● Now, both computers have the same symmetric key ready for secure encrypted data
transmission