Errors in Data Transmission

Embed Size (px)

Citation preview

  • 7/31/2019 Errors in Data Transmission

    1/4

    Data corruption refers to errors incomputerdatathat occur during writing, reading, storage,

    transmission, or processing, which introduce unintended changes to the original data. Computerstorage and transmission systems use a number of measures to providedata integrity, or lack of

    errors.

    In general, when data corruption occurs, thefilecontaining that data may become inaccessible,and the system or the related application will give an error. For example, if a Microsoft Wordfile

    is corrupted, when you try to open that file with MS Word, you will get anerror message, andthe file would not be opened. Some programs can give a suggestion to repair the file

    automatically (after the error), and some programs cannot repair it. It depends on the level of

    corruption, and the in-built functionality of the application to handle the error. There are variouscauses of the corruption.

    Contents

    [hide]

    1 Transmission 2 Storage 3 Countermeasures 4 See also

    o 4.1 Solutions 5 References

    [edit] Transmission

    Data corruption during transmission has a variety of causes. Interruption of data transmission

    causesinformation loss. Environmental conditions can interfere with data transmission,

    especially when dealing with wireless transmission methods. Heavy clouds can block satellitetransmissions. Wireless networks are susceptible to interference from devices such as microwave

    ovens.

    [edit] Storage

    Data lossduring storage has two broad causes: hardware and software failure.Background

    radiation,head crashes, andagingor wear of the storage device fall into the former category,while software failure typically occurs due tobugsin the code.

    Error detection and correction may occur in the hardware, the disk subsystem or adapter, orsoftware which implements error checking and correction (i.e., RAID software such as mdadm

    for Linux).

    There are two types of data loss:

    http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Filehttp://en.wikipedia.org/wiki/Filehttp://en.wikipedia.org/wiki/Filehttp://en.wikipedia.org/wiki/Microsoft_Wordhttp://en.wikipedia.org/wiki/Microsoft_Wordhttp://en.wikipedia.org/wiki/Microsoft_Wordhttp://en.wikipedia.org/wiki/Error_messagehttp://en.wikipedia.org/wiki/Error_messagehttp://en.wikipedia.org/wiki/Error_messagehttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Data_corruption#Transmissionhttp://en.wikipedia.org/wiki/Data_corruption#Transmissionhttp://en.wikipedia.org/wiki/Data_corruption#Storagehttp://en.wikipedia.org/wiki/Data_corruption#Storagehttp://en.wikipedia.org/wiki/Data_corruption#Countermeasureshttp://en.wikipedia.org/wiki/Data_corruption#Countermeasureshttp://en.wikipedia.org/wiki/Data_corruption#See_alsohttp://en.wikipedia.org/wiki/Data_corruption#See_alsohttp://en.wikipedia.org/wiki/Data_corruption#Solutionshttp://en.wikipedia.org/wiki/Data_corruption#Solutionshttp://en.wikipedia.org/wiki/Data_corruption#Referenceshttp://en.wikipedia.org/wiki/Data_corruption#Referenceshttp://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=1http://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=1http://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=2http://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Mean_time_between_failureshttp://en.wikipedia.org/wiki/Mean_time_between_failureshttp://en.wikipedia.org/wiki/Mean_time_between_failureshttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Mean_time_between_failureshttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Background_radiationhttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=2http://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/w/index.php?title=Data_corruption&action=edit&section=1http://en.wikipedia.org/wiki/Data_corruption#Referenceshttp://en.wikipedia.org/wiki/Data_corruption#Solutionshttp://en.wikipedia.org/wiki/Data_corruption#See_alsohttp://en.wikipedia.org/wiki/Data_corruption#Countermeasureshttp://en.wikipedia.org/wiki/Data_corruption#Storagehttp://en.wikipedia.org/wiki/Data_corruption#Transmissionhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Error_messagehttp://en.wikipedia.org/wiki/Microsoft_Wordhttp://en.wikipedia.org/wiki/Filehttp://en.wikipedia.org/wiki/Data_integrityhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Computer
  • 7/31/2019 Errors in Data Transmission

    2/4

  • 7/31/2019 Errors in Data Transmission

    3/4

    Intentional Actiono Intentional deletion of a file or program

    Unintentional Actiono Accidental deletion of a file or programo Misplacement of CDs or Memory stickso

    Administration errorso Inability to read unknown file format

    Failureo Power failure, resulting in data in volatile memory not being saved to permanent

    memory.

    o Hardware failure, such as ahead crashin a hard disk.o A softwarecrashor freeze, resulting in data not being saved.o Software bugs or poorusability, such as not confirming a file delete command.o Business failure (vendor bankruptcy), where data is stored with a software vendor

    usingSoftware-as-a-serviceandSaaS data escrowhas not been provisioned.

    o Data corruption, such as file system corruption or database corruption.

    Disastero Natural disaster,earthquake,flood,tornado, etc.o Fire

    Crimeo Theft, hacking, sabotage, etc.o A malicious act, such as aworm,virus,hackeror theft of physical media.

    Studies have consistently shown hardware failure and human error to be two most common

    causes of data loss, accounting for roughly three quarters of all incidents.[1]

    A commonly

    overlooked cause is a natural disaster. Although the probability is small, the only way to recoverfrom data loss due to a natural disaster is to store backup data in a physically separate location.

    [edit] Cost of data loss

    The cost of a data loss eventis directly related to the value of the data and the length of time that

    it is needed, but unavailable. Consider:

    The cost of continuing without the data The cost of recreating the data The cost of notifying users in the event of a compromise

    [edit] Organizational responsibility

    Recent statistics show the number of publicized data loss events involving sensitive data is on

    the rise,[2]

    in part due to recent legislation, including the landmark CaliforniaSB 1386, requiring

    the notification of data loss. This and other legislation has forced organizations to notify victimsthat their identity has potentially been compromised.

    [edit] Prevention

    http://en.wikipedia.org/wiki/Power_failurehttp://en.wikipedia.org/wiki/Power_failurehttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Usabilityhttp://en.wikipedia.org/wiki/Usabilityhttp://en.wikipedia.org/wiki/Usabilityhttp://en.wikipedia.org/wiki/Software-as-a-servicehttp://en.wikipedia.org/wiki/Software-as-a-servicehttp://en.wikipedia.org/wiki/Software-as-a-servicehttp://en.wikipedia.org/wiki/SaaS_data_escrowhttp://en.wikipedia.org/wiki/SaaS_data_escrowhttp://en.wikipedia.org/wiki/SaaS_data_escrowhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/Natural_disasterhttp://en.wikipedia.org/wiki/Natural_disasterhttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Floodhttp://en.wikipedia.org/wiki/Floodhttp://en.wikipedia.org/wiki/Floodhttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Firehttp://en.wikipedia.org/wiki/Firehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Hacker_%28computer_security%29http://en.wikipedia.org/wiki/Hacker_%28computer_security%29http://en.wikipedia.org/wiki/Hacker_%28computer_security%29http://en.wikipedia.org/wiki/Data_loss#cite_note-0http://en.wikipedia.org/wiki/Data_loss#cite_note-0http://en.wikipedia.org/wiki/Data_loss#cite_note-0http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=3http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=3http://en.wikipedia.org/wiki/Data_loss#cite_note-1http://en.wikipedia.org/wiki/Data_loss#cite_note-1http://en.wikipedia.org/wiki/Data_loss#cite_note-1http://en.wikipedia.org/wiki/SB_1386http://en.wikipedia.org/wiki/SB_1386http://en.wikipedia.org/wiki/SB_1386http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=4http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=4http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=4http://en.wikipedia.org/wiki/SB_1386http://en.wikipedia.org/wiki/Data_loss#cite_note-1http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=3http://en.wikipedia.org/w/index.php?title=Data_loss&action=edit&section=2http://en.wikipedia.org/wiki/Data_loss#cite_note-0http://en.wikipedia.org/wiki/Hacker_%28computer_security%29http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Firehttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Floodhttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Natural_disasterhttp://en.wikipedia.org/wiki/Data_corruptionhttp://en.wikipedia.org/wiki/SaaS_data_escrowhttp://en.wikipedia.org/wiki/Software-as-a-servicehttp://en.wikipedia.org/wiki/Usabilityhttp://en.wikipedia.org/wiki/Crash_%28computing%29http://en.wikipedia.org/wiki/Head_crashhttp://en.wikipedia.org/wiki/Power_failure
  • 7/31/2019 Errors in Data Transmission

    4/4

    Data loss preventioncan rarely be guaranteed. However, the frequency of data loss and the

    impact can be greatly mitigated by taking proper precautions. The different types of data lossdemand different types of precautions. For example, multiple power circuits withbattery backup

    and a generator will only protect against power failures. Similarly, using ajournaling file system

    andRAIDstorage will only protect against certain types of software and hardware failure.

    Regular databackupsare an important asset to have when trying to recover after a data lossevent, but they don't do much to prevent user errors or system failures.

    A well rounded approach to data protection has the best chance of avoiding data loss events.

    Such an approach will also include such mundane tasks as maintainingantivirusprotection and

    networkfirewalls, as well as staying up to date with all published security fixes and systempatches. User education is probably the most important, and most difficult, aspect of preventing

    data loss. Nothing else will prevent users from making mistakes that jeopardizedata security.

    http://en.wikipedia.org/wiki/Data_loss_preventionhttp://en.wikipedia.org/wiki/Data_loss_preventionhttp://en.wikipedia.org/wiki/Battery_backuphttp://en.wikipedia.org/wiki/Battery_backuphttp://en.wikipedia.org/wiki/Battery_backuphttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Redundant_array_of_independent_diskshttp://en.wikipedia.org/wiki/Redundant_array_of_independent_diskshttp://en.wikipedia.org/wiki/Redundant_array_of_independent_diskshttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/Antivirushttp://en.wikipedia.org/wiki/Antivirushttp://en.wikipedia.org/wiki/Antivirushttp://en.wikipedia.org/wiki/Firewall_%28networking%29http://en.wikipedia.org/wiki/Firewall_%28networking%29http://en.wikipedia.org/wiki/Firewall_%28networking%29http://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Firewall_%28networking%29http://en.wikipedia.org/wiki/Antivirushttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/Redundant_array_of_independent_diskshttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Battery_backuphttp://en.wikipedia.org/wiki/Data_loss_prevention