Chapter 2: Data Transmission – IGCSE/GCE CS Notes (0478/2210)

Based on Cambridge Syllabus 2026-2028


What is Data Transmission?

Data transmission is the process of sending digital data from one device to another using a medium such as copper wire, fibre optic cable, or wireless signals.

Why Data is Broken into Packets

When data is transmitted over a network, it is broken down into smaller pieces called packets. This is done because:

  • Networks can only handle a certain amount of data at once
  • If errors occur, only the affected packet needs to be resent
  • Multiple packets can take different routes, making transmission more efficient
  • Large files would block the network for other users

Packet Structure

Each packet contains three main parts:

┌─────────────────────────────────────┐
│           PACKET HEADER             │
├─────────────────────────────────────┤
│          PAYLOAD (DATA)              │
├─────────────────────────────────────┤
│              TRAILER                 │
└─────────────────────────────────────┘

1. Packet Header

The header contains control information needed for delivery:

ComponentPurpose
Destination AddressIP address of where the packet is going
Source AddressIP address of where the packet came from
Packet NumberThe packet’s position in the sequence (e.g., packet 3 of 10)
Protocol InformationHow the packet should be handled

2. Payload

  • The actual data being transmitted
  • Could be part of a file, email, image, etc.
  • Size varies depending on network protocol

3. Trailer

  • Marks the end of the packet
  • Often contains error checking information (like a checksum)
  • Helps verify the packet arrived correctly

Packet Switching

Packet switching is the method used to transmit packets across a network.

The Process of Packet Switching

  1. Data is divided into packets at the source device
  2. Each packet is labelled with:
  • Destination address
  • Source address
  • Packet number
  1. Packets are sent into the network
  2. Routers direct packets – Each router examines the destination address and decides the best path
  3. Different routes possible – Packets from the same message may take different paths
  4. Packets may arrive out of order – Due to different routes or network congestion
  5. Packets are reordered at the destination using packet numbers
  6. Message is reassembled – The original data is reconstructed

Visual Representation

Source Device
      │
      ▼
[Packet 1] ──────► Router A ──────► Router C ──────┐
[Packet 2] ──────► Router B ──────► Router D ──────► Destination
[Packet 3] ──────► Router A ──────► Router E ──────┘
      │                                            │
      └─────────── Different routes ───────────────┘

Packets arrive: [Packet 2] [Packet 1] [Packet 3]
Reordered:      [Packet 1] [Packet 2] [Packet 3]

Role of Routers

  • Routers are devices that direct packets through a network
  • They examine each packet’s destination address
  • They use routing tables to determine the best path
  • They can adapt to network congestion or failures

Advantages of Packet Switching

  • Efficient use of network resources
  • Fault tolerant – if one route fails, packets can use another
  • Allows multiple devices to share the network
  • Can prioritise different types of data

Methods of Data Transmission

1. Serial vs Parallel Transmission

Serial Transmission

  • How it works: Data is sent one bit at a time over a single wire
  • Use cases: USB, Ethernet, long-distance communication
AdvantagesDisadvantages
Reliable over long distancesSlower than parallel for short distances
Less interferenceRequires conversion at each end
Cheaper cabling
No synchronisation issues

Parallel Transmission

  • How it works: Multiple bits are sent simultaneously over multiple wires
  • Use cases: Internal computer buses (CPU to RAM), printer cables (older)
AdvantagesDisadvantages
Faster over short distancesSignal skew over longer distances
Simple to implementMore expensive cabling
More interference between wires
Limited to short distances

2. Direction of Data Flow

ModeDescriptionExample
SimplexOne-way data flow onlyKeyboard to computer, TV broadcast
Half-DuplexTwo-way, but only one direction at a timeWalkie-talkies, CB radio
Full-DuplexSimultaneous two-way data flowPhone calls, Zoom meetings

Simplex

  • Data flows in only one direction
  • The receiving device cannot send data back
  • Simple and cheap to implement
  • Examples: TV/radio broadcasting, keyboard input

Half-Duplex

  • Both devices can transmit and receive
  • But only one can transmit at a time
  • Requires a turn-taking protocol
  • Examples: Walkie-talkies, some network protocols

Full-Duplex

  • Both devices can transmit simultaneously
  • Requires separate channels or sophisticated timing
  • Most efficient for interactive communication
  • Examples: Telephone calls, most modern network connections

Choosing the Right Method

When selecting a transmission method, consider:

  • Distance – Serial for long distances, parallel for short
  • Speed required – Parallel for high speed over short distances
  • Cost – Serial is cheaper for cabling
  • Direction needed – Simplex, half-duplex, or full-duplex
  • Interference – Serial is less susceptible to interference

USB Interface

What is USB?

Universal Serial Bus (USB) is an industry standard for connecting peripherals to computers. It uses serial transmission to communicate.

How USB Transmits Data

  1. Connection: Device plugs into USB port
  2. Enumeration: Computer identifies the device
  3. Data transfer: Data is sent in packets using serial transmission
  4. Power delivery: USB also provides power to devices

USB Features

FeatureDescription
Hot-swappableDevices can be connected/disconnected while powered on
Plug and PlayAutomatic driver installation
Power deliveryCan charge devices (up to 100W with USB-C)
Daisy-chainingSome versions allow multiple devices
Backward compatibleNewer versions work with older devices

Benefits of USB

  • Universal – One connector for many devices
  • Easy to use – No need to restart computer
  • Fast – High data transfer rates
  • Power – Charges devices while transferring data
  • Cost-effective – Inexpensive to manufacture

Drawbacks of USB

  • Cable length limits – Maximum 5 metres without powered hub
  • Version confusion – Different speeds (USB 2.0, 3.0, 3.1, etc.)
  • Power limitations – Some devices need external power
  • Single point of failure – If USB controller fails, all ports may fail

USB Versions

VersionSpeedYear
USB 1.112 Mbps1998
USB 2.0480 Mbps2000
USB 3.05 Gbps2008
USB 3.110 Gbps2013
USB 3.220 Gbps2017
USB440 Gbps2019

Error Detection Methods

Why Errors Occur During Transmission

Errors can happen during data transmission due to:

CauseDescription
InterferenceElectromagnetic interference from other devices
NoiseElectrical noise in the transmission medium
Signal degradationWeakening of signal over long distances
Data lossSome bits never arrive
Data gainExtra bits are added
Data changeBits are flipped (1 becomes 0 or vice versa)

The Need for Error Detection

  • Data integrity must be maintained
  • Corrupted data could cause incorrect results
  • Financial transactions must be accurate
  • Medical data must be precise
  • Communications must be reliable

1. Parity Check

How Parity Works

A parity bit is an extra bit added to a byte of data to make the total number of 1s either even or odd.

Even Parity

  • Count the number of 1s in the data
  • Add a parity bit to make the total number of 1s even

Odd Parity

  • Count the number of 1s in the data
  • Add a parity bit to make the total number of 1s odd

Example: Even Parity

Data: 1011001 (four 1s - already even)
Parity bit: 0
Transmitted: 0 1011001

Data: 1011011 (five 1s - odd)
Parity bit: 1 (to make it even)
Transmitted: 1 1011011

Parity Byte and Parity Block

For multiple bytes, a parity byte can be created by applying parity to each bit position across all bytes.

Limitations of Parity

  • Can only detect single-bit errors
  • Cannot detect which bit is wrong
  • If two bits flip, parity may appear correct

2. Checksum

How Checksum Works

  1. All data bytes are added together
  2. The sum is stored (often as a 16-bit value)
  3. This checksum is transmitted with the data
  4. Receiver recalculates the sum and compares

Example

Data: 45, 32, 78, 91
Sum = 45 + 32 + 78 + 91 = 246
Checksum = 246 (or a modified version)

Receiver recalculates: 45 + 32 + 78 + 91 = 246
If matches → data likely correct
If different → error detected

Advantages

  • Can detect multiple errors
  • Simple to implement
  • Used in TCP/IP protocols

3. Echo Check

How Echo Check Works

  1. Sender transmits data to receiver
  2. Receiver sends the data back to sender
  3. Sender compares original with returned data
  4. If they match, transmission was successful
  5. If not, sender retransmits

Example

Sender sends: "HELLO"
Receiver echoes: "HELLO"
Sender compares: MATCH ✓

Sender sends: "WORLD"
Receiver echoes: "WORLD"
Sender compares: MATCH ✓

Advantages

  • Very simple to understand
  • Confirms both transmission and reception

Disadvantages

  • Doubles transmission time
  • Only detects errors on the forward path
  • Cannot detect errors on the return path

Check Digits

What is a Check Digit?

A check digit is an extra digit added to a number to verify its accuracy during data entry. It is calculated from the other digits using a specific algorithm.

How Check Digits Work

  1. The original number is processed using a formula
  2. A check digit is calculated
  3. The check digit is added to the end
  4. When entered, the formula is reapplied
  5. If the calculated check digit matches, the number is likely correct

Common Uses of Check Digits

ApplicationExample
ISBN (International Standard Book Number)978-0-13-110362-7
BarcodesProduct codes on items
Credit Cards16-digit numbers
Bank Account NumbersSort codes and account numbers

ISBN-13 Check Digit Example

ISBN-13 uses a modulus 10 algorithm:

  1. Multiply each digit alternately by 1 and 3
  2. Add all results
  3. Find the remainder when divided by 10
  4. Subtract from 10 to get check digit

Example: 978-0-13-149505-?

Position123456789101112
Digit978013149505
Weight131313131313
Result9218019112915015

Sum = 9 + 21 + 8 + 0 + 1 + 9 + 1 + 12 + 9 + 15 + 0 + 15 = 100
100 ÷ 10 = 10 remainder 0
Check digit = 0 (since remainder is 0)

Complete ISBN: 978-0-13-149505-0

Benefits of Check Digits

  • Detects common data entry errors:
  • Single digit errors (e.g., 1234 → 1235)
  • Transposition errors (e.g., 1234 → 1243)
  • Omitted digits
  • Extra digits
  • Simple to implement
  • Fast to verify

Automatic Repeat Query (ARQ)

What is ARQ?

Automatic Repeat Query (ARQ) is an error control method that automatically requests retransmission of data when errors are detected.

How ARQ Works

  1. Sender transmits data with error detection information
  2. Receiver checks for errors using parity, checksum, etc.
  3. Receiver sends acknowledgement:
  • ACK (Positive Acknowledgement) if data is correct
  • NAK (Negative Acknowledgement) if errors detected
  1. Sender acts on response:
  • If ACK received, sends next data
  • If NAK received, retransmits the data
  1. Timeout mechanism: If no acknowledgement received within a set time, sender automatically retransmits

Visual Representation

Sender                    Receiver
  │                          │
  ├────── Data Packet ──────►│
  │                          │ (checks for errors)
  │                          │
  │◄────── ACK/NAK ──────────┤
  │                          │
  │ (if NAK or timeout)      │
  ├────── Retransmit ───────►│
  │                          │

Components of ARQ

ComponentPurpose
ACKPositive acknowledgement – “Data received correctly”
NAKNegative acknowledgement – “Error detected, send again”
TimeoutIf no response after set time, assume data lost and retransmit

Advantages of ARQ

  • Reliable – ensures data is received correctly
  • Adaptive – only retransmits when needed
  • Widely used – in TCP, email, file transfers

Disadvantages of ARQ

  • Requires two-way communication
  • Adds overhead (ACK/NAK packets)
  • Can be slow if many errors occur
  • Not suitable for real-time applications (streaming)

Encryption

Why Encryption is Needed

When data is transmitted over networks, it can be intercepted by unauthorised people. Encryption protects data by making it unreadable to anyone without the correct key.

What is Encryption?

Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key.

Plaintext:  "Hello World"
      │
      ▼
[Encryption Algorithm + Key]
      │
      ▼
Ciphertext: "Uryyb Jbeyq"
      │
      ▼
[Decryption Algorithm + Key]
      │
      ▼
Plaintext:  "Hello World"

Types of Encryption

There are two main types of encryption: symmetric and asymmetric.

1. Symmetric Encryption

How It Works

  • The same key is used for both encryption and decryption
  • Both sender and receiver must have the same key
  • The key must be kept secret
Sender                          Receiver
  │                                │
  │   [Secret Key K]               │   [Secret Key K]
  │        │                        │        │
  │   Encrypt with K                │   Decrypt with K
  │        │                        │        │
  ├──────Ciphertext────────────────►│

Advantages

  • Faster than asymmetric encryption
  • Simpler to implement
  • Good for large amounts of data

Disadvantages

  • Key distribution problem – how to share the key securely?
  • If key is intercepted, all data is compromised
  • Many keys needed for many users

Examples

  • AES (Advanced Encryption Standard)
  • DES (Data Encryption Standard)
  • Blowfish

2. Asymmetric Encryption

How It Works

  • Uses two different keys: a public key and a private key
  • Public key can be shared with anyone
  • Private key is kept secret by the owner
  • Data encrypted with public key can only be decrypted with private key
  • Data encrypted with private key can only be decrypted with public key
Sender                          Receiver
  │                                │
  │   [Receiver's Public Key]      │   [Receiver's Private Key]
  │        │                        │        │
  │   Encrypt with Public Key       │   Decrypt with Private Key
  │        │                        │        │
  ├──────Ciphertext────────────────►│

Advantages

  • Solves key distribution problem
  • More secure for communication
  • Provides authentication (digital signatures)

Disadvantages

  • Much slower than symmetric encryption
  • More computationally intensive
  • Larger key sizes needed

Examples

  • RSA (Rivest-Shamir-Adleman)
  • ECC (Elliptic Curve Cryptography)
  • Diffie-Hellman key exchange

Comparison: Symmetric vs Asymmetric

FeatureSymmetricAsymmetric
KeysOne shared keyPublic + Private keys
SpeedFastSlow
SecurityGoodExcellent
Key distributionProblemNo problem
Use caseBulk data encryptionKey exchange, digital signatures
ExamplesAES, DESRSA, ECC

Real-World Encryption

Most secure systems use both types:

  1. Asymmetric encryption is used to securely exchange a session key
  2. Symmetric encryption is used for the actual data transmission

This combines the security of asymmetric with the speed of symmetric.


Summary & Key Takeaways

Packet Switching

  • Data is broken into packets
  • Each packet has header, payload, trailer
  • Packets can take different routes
  • Routers direct packets
  • Packets are reordered at destination

Transmission Methods

MethodDescription
SerialOne bit at a time – good for long distances
ParallelMultiple bits at once – fast but short distance
SimplexOne-way only
Half-DuplexTwo-way, but one at a time
Full-DuplexTwo-way simultaneously

Error Detection

MethodHow It Works
Parity CheckAdds bit to make number of 1s even/odd
ChecksumAdds sum of all data bytes
Echo CheckReceiver sends data back to sender
Check DigitExtra digit calculated from data
ARQAutomatic retransmission on error

Encryption

TypeDescription
SymmetricSame key for encrypt/decrypt
AsymmetricPublic and private keys

Practice Questions

Section A: Packets and Packet Switching

  1. Explain why data is broken into packets before transmission.
  2. Draw and label the structure of a data packet.
  3. Describe three items found in a packet header.
  4. Explain the role of routers in packet switching.
  5. What happens if packets arrive at the destination out of order?

Section B: Transmission Methods

  1. Compare serial and parallel transmission. Give one advantage and one disadvantage of each.
  2. Explain the difference between simplex, half-duplex, and full-duplex transmission. Give an example of each.
  3. A company needs to connect two buildings 500 metres apart. Would you recommend serial or parallel transmission? Justify your answer.
  4. Why is full-duplex transmission preferred for telephone calls?

Section C: USB Interface

  1. List three benefits of using USB for connecting peripherals.
  2. Explain what “hot-swappable” means in the context of USB.
  3. Give two drawbacks of USB.

Section D: Error Detection

  1. Explain three different causes of errors during data transmission.
  2. Using even parity, what parity bit would be added to the following data:
    a) 1011001
    b) 1101011
    c) 0000000
  3. Describe how a checksum is used to detect errors.
  4. Explain the process of echo checking. What is its main disadvantage?

Section E: Check Digits

  1. What is a check digit and why is it used?
  2. Give three examples of where check digits are commonly used.
  3. Explain what types of errors check digits can detect.

Section F: ARQ

  1. Describe how Automatic Repeat Query (ARQ) works.
  2. Explain the purpose of:
    a) ACK
    b) NAK
    c) Timeout
  3. Give one advantage and one disadvantage of ARQ.

Section G: Encryption

  1. Why is encryption necessary when transmitting data?
  2. Explain the difference between symmetric and asymmetric encryption.
  3. In asymmetric encryption, what is the difference between a public key and a private key?
  4. Give one example of when asymmetric encryption would be used.
  5. Why do many secure systems use both symmetric and asymmetric encryption?

Quick Reference Card

ConceptKey Point
PacketHeader + Payload + Trailer
Packet switchingDifferent routes, reorder at end
SerialOne bit at a time, long distance
ParallelMultiple bits, short distance
SimplexOne-way
Half-duplexTwo-way, one at a time
Full-duplexTwo-way, simultaneous
USBSerial, hot-swappable, plug and play
ParityEven/odd count of 1s
ChecksumSum of data
Echo checkSend back for verification
Check digitExtra calculated digit
ARQACK, NAK, timeout
SymmetricSame key
AsymmetricPublic + Private keys

End of Chapter 2: Data Transmission

Below is a detailed presentation for this presentation that you can download to study from slides

Scroll to Top