Skip to content

E1 · Data Transmission

Spec reference: Section E1 - How Data is Transmitted Key idea: Understand how data is transmitted between systems including transmission types, protocols, encryption and compression.


Communication channel types

TypeDescriptionExample
SimplexData flows in one direction onlyTV broadcast, keyboard to computer
Half-duplexData flows both ways, but only one direction at a timeWalkie-talkie
Full-duplexData flows both ways simultaneouslyPhone call, most internet connections
Point-to-pointDirect connection between exactly two devicesEthernet cable between two computers
Multi-dropMultiple devices share a single communication lineOlder bus network topologies

Asynchronous vs synchronous transmission

FeatureAsynchronousSynchronous
TimingNo shared clock; each byte is wrapped in start/stop bitsShared clock signal synchronises sender and receiver
OverheadHigher (extra bits per byte)Lower (no start/stop bits)
UseSerial ports, older modems, simple devicesHigh-speed data links, networks
ExampleUSB keyboards, serial communicationHDMI, RAM data bus

Parallel vs serial transmission

FeatureParallelSerial
Bits sentMultiple bits sent simultaneously on separate wiresOne bit at a time on a single wire
SpeedFast over short distancesSlower per wire but more practical
DistanceShort distances only (signal skew at longer distances)Long distances
CostMore wires, more expensive connectorsCheaper, fewer wires
ExamplesOld printer ports, internal memory busUSB, SATA, Ethernet

Note

Despite parallel seeming faster, modern high-speed connections (USB, SATA) use serial because at high frequencies, the timing differences between parallel wires cause errors.


Packet switching

Data is broken into packets for transmission across a network.

Contents of a data packet

FieldPurpose
Source IP addressWhere the packet came from
Destination IP addressWhere the packet is going
Sequence numberAllows packets to be reassembled in the right order
Payload (data)The actual data being transmitted
Checksum/error checkAllows the receiver to detect corruption
TTL (Time To Live)Prevents packets looping forever on the network

How packet switching works

  1. Data is split into packets at the source.
  2. Each packet is routed independently across the network.
  3. Packets may take different routes and arrive out of order.
  4. The receiver reassembles packets in the correct order using sequence numbers.
  5. If a packet is lost or corrupt, only that packet is resent.

Benefits: Efficient use of network bandwidth; resilient to node failures.


Protocols

A protocol is a set of rules governing how data is transmitted between systems. Both sender and receiver must use the same protocol.

ProtocolPurpose
HTTP/HTTPSTransferring web pages and data
TCPReliable, ordered delivery of packets (connection-oriented)
UDPFast, unreliable delivery (no guarantee of order or arrival)
IPRouting packets across networks using IP addresses
FTPTransferring files between systems
SMTP/IMAP/POP3Sending and receiving email
DNSTranslating domain names to IP addresses

Encryption

Encryption scrambles data so it can only be read by someone with the correct key.

Simple ciphers

CipherHow it worksWeakness
Caesar cipherEach letter is shifted by a fixed number (e.g. A becomes D with shift 3)Only 25 possible shifts, easily broken
Vigenere cipherUses a keyword to apply different shifts to each letterMore complex but still breakable by frequency analysis

Modern encryption in computer systems

TypeHow it worksUse
Symmetric key encryptionSame key used to encrypt and decrypt. Fast.Encrypting stored data, VPNs
Public key encryption (asymmetric)Two keys: a public key (shared openly) for encryption, a private key (kept secret) for decryptionHTTPS, digital signatures, email

How HTTPS works

  1. Server sends its public key to the browser.
  2. Browser encrypts a session key using the public key.
  3. Server decrypts it using its private key.
  4. Both now share a symmetric session key for fast encrypted communication.

Compression

Compression reduces file or data size to save storage space or speed up transmission.

TypeDescriptionCan restore original?Use
LosslessRemoves redundant data without losing any informationYesZIP files, PNG images, text files
LossyPermanently removes some data for much greater compressionNoJPEG images, MP3 audio, MP4 video

Applications of compression:

  • Streaming video: lossy compression allows HD video over limited bandwidth.
  • Email attachments: lossless ZIP reduces file size for sending.
  • Web images: lossy JPEG keeps page load times low.

Summary

TermMeaning
SimplexOne-way data transmission
Full-duplexSimultaneous two-way communication
Packet switchingBreaking data into packets sent independently across a network
TCPReliable, ordered protocol ensuring all packets arrive correctly
Symmetric encryptionSame key for encrypting and decrypting
Public key encryptionPublic key encrypts, private key decrypts
Lossless compressionReduces size with no quality loss

Test Yourself

Ad

PassMaven - revision made simple.