Professional Documents
Culture Documents
Data transmission
technologies
teachcomputerscience.com
1.
Revision notes
teachcomputerscience.com
Introduction
Data transmission technologies allow users to transmit data from one
point to other. Data transmission can be over short distances, for
example, from a CPU to a monitor for displaying information. Data is
also transmitted over long distances, for example, from a satellite
back to Earth. For error-free transmission of data between the sender
and receiver, three factors are to be considered: Direction of
transmission, method of transmission and method of
synchronization.
Classification of transmission
Transmissions are classified as shown in the following table:
teachcomputerscience.com
• Simplex, half-duplex and full-duplex transmission
In simplex transmission, data is transferred in one direction only. For
example, data is sent from a CPU to a monitor, broadcasting radio
programmes, etc.
In half-duplex transmissions, data can be transferred in both
directions but one at a time. For example, a walkie-talkie.
In full-duplex transmissions, data can be transferred in both
directions simultaneously. For example, mobile phone
communication in which both parties can send and hear at the same
time.
teachcomputerscience.com
Start Stop
1 0 1 1 1 0 1 0 1 1 1 1 0 1 0 0
bit bit
teachcomputerscience.com
When a USB device is connected to the computer:
Step 1: The device is detected by the computer due to the small
change in voltage in the data lines.
Step 2: The speed of the device is determined by the computer. The
type of device and its configuration are also determined.
Step 3: Once the device is identified by the computer, the computer
loads the appropriate driver to communicate with the device
effectively.
Step 4: In cases where the device driver is not available, the computer
prompts the user to install the required driver.
The benefits of USB data transmission are:
• Once the device is plugged in, the device drivers are installed
automatically. A USB interface is self-configuring.
• The connectors can be connected in a particular manner only.
This property makes sure that the user does not connect it in an
incorrect manner.
• Several data transmission rates are supported.
• Newer USB connectors are compatible with the older USB
standards.
• USB connectors are widely used for charging the batteries of
portable devices.
Error-checking methods
When data is transmitted through a channel, it could get corrupted or
changed. Hence, it’s very important to implement error-checking
methods in computer technology. These methods are used to detect
and correct errors. These methods are discussed in detail below.
• Parity checking
Parity checking uses a parity bit in each byte of data. This bit is
allocated before transmission. An even parity has an even number of
bit 1s in a byte. An odd parity has an odd number of bit 1s in a byte.
Systems may use even or odd parity.
teachcomputerscience.com
The sender and receiver make an agreement prior to the
transmission about the type of parity.
Even parity 1
1 0 1 0 1 1 1
Odd parity 0
In the above data, there are 5 bits of 1. Hence, to make the number of
1 bits even, parity bit is assigned bit 1. The number of bits is odd and
hence, the parity bit in odd parity is 0.
Let us consider the following byte of data, which uses even parity,
received by a receiver.
1 0 1 0 1 1 1 0
teachcomputerscience.com
Consider the following block of data with even parity received at the
receiver side.
teachcomputerscience.com
• Checksum
A value called a checksum is attached to the end of the block of data.
This value can indicate transmission errors.
The following method describes the checksum of a block of data:
Checksum = the sum of all digits, if the sum of all digits ≤ 255.
If the sum of all digits > 255, the checksum is found according to the
following algorithm:
i. Divide the sum X by 256.
ii. Round down to the nearest whole number, Y.
iii. Multiply Y by 256 and denote this number by Z.
iv. The difference (X-Z) is the checksum generated.
For example:
Let us calculate the checksum of a number with a byte sum 905.
v. Rounding down,
vi. Checksum=137
The sender transmits the block of data with checksum. When
received at the receiver end, the checksum of the block of data is
calculated. If the calculated checksum is equal to the checksum
transmitted by sender, then there are no transmission errors. If both
the checksums are not equal, the sender is request to resend the
data.
• Echo check
In this method, the data is sent from the sender to the receiver and
the data received is sent back to the sender. The sender compares
the two sets of data for transmission errors. This method is not very
reliable because it cannot be decided in which transmission the data
was corrupted. An error-free echo check would prove that no data
has changed or been corrupted.
teachcomputerscience.com
2.
Activities
teachcomputerscience.com
Activity-1
Duration: 10 minutes
teachcomputerscience.com
Activity-2
Duration: 10 minutes
teachcomputerscience.com
3.
End of topic
questions
teachcomputerscience.com
End of topic questions
1. Based on what factors is data transmission classified?
2. What are the differences between serial and parallel data
transmission?
3. How do the sender and receiver notify each other in
asynchronous data transmission?
4. How do the sender and receiver notify each other in synchronous
data transmission?
5. What are the functions of pins in the USB port?
6. What happens when a USB device is plugged into the computer?
Write down the various steps.
7. How does the echo check method ensure that the data received
is error free?
teachcomputerscience.com