250 likes | 591 Views
Chapter 7. Data Coding. Agenda. Coding Code efficiency and conversion Compression/compaction Code encryption/decryption. Coding. Definition A predetermined set of symbols having specific meanings Types Human code Morse code (dot and dash for telegraph) Machine code Binary states
E N D
Chapter 7 Data Coding
Agenda • Coding • Code efficiency and conversion • Compression/compaction • Code encryption/decryption
Coding • Definition • A predetermined set of symbols having specific meanings • Types • Human code • Morse code (dot and dash for telegraph) • Machine code • Binary states • Binary digit (bit)
Machine Codes - I • Characteristics • Two-state code • Same number of bits • Perfectly formed • Same transmission duration • Character Assignment: unique sequence of bits
Machine Codes - II • Types of characters • Alphanumeric • Format effector for terminal screen or paper • Control (device & transmission)
Parity checking • Parity bit • Even or odd
Escape mechanisms • Escape or ESC Character • Pro: • Increase codes • Con: • Code and decode the data
Specific Codes • Baudot code • American Standard Code for Information Interchange (ASCII) • Extended Binary Coded Decimal Interchange Code (EBCDIC) • Unicode • Binary Coded Decimal • N-out-of-M code
Baudot Code • 5 bits (32 code points) • ESC mechanism • Figure shift (uppercase) • Letter shift (lowercase) • Teletypewriters before 1965 • No error checking
American Standard Code for Information Interchange (ASCII) • By American National Standards Institute (ANSI) • 7654321 (7-bit or 128 characters) • Pros: • Easy sorting by computers • Used by microcomputers
Extended binary Coded Decimal Interchange Code (EBCDIC) • 8-bit code or 256 characters • IBM mainframe computers • 01234567
Unicode • 16-bit or 65,536 characters • By Unicode Consortium for international languages • Used by Windows NT
Other Codes • Binary Coded Decimal • 6-bit code Hollerith code • No standard • N-Out-Of-M Codes • M bits to transmit each character, n must be 1s • Error Detection • IBM’s 4-out-of-8
Control Characters • Transmission control characters • SOH, STX, ETX, EOT, ACK, NAK, NUL • Device control characters • BEL, DC1 (X-ON), DC3 (X-OFF) • Format effect control characters • CR, LF, HT, VT
Code Efficiency • Types of bits in a character • Information bits • Noninformation bits (parity bit) • Definition: No. of information bits divided by the total no. of bits in a character
Code Conversion • Harder from larger no. of bits code to smaller no. of bits code • Use ESC mechanism
Data Compression/Compaction • Types • Character compression/Huffman coding or adaptive Huffman coding (bits assignment) • Run length coding (repetitive characters) • Character stripping (heading & trailing characters) • Combination of the above three • Consideration • throughput • Storage and transmission cost • Hardware cost & software cost
Code Encryption • Voice • Scramble and descramble • Data • Symmetric key • Data encryption standard (DES) by National Institute of Standard and Technology (2 to 56) • Triple DES (2 to 112) • Key security • Asymmetric key or RSA encryption • Public key & private key • Consideration • Hardware and/or software cost • Time delay • Security management cost
Example of Encryption - I • Divide text into groups of 8 characters. Pad with blank at end as necessary • Select an 8-characters key • Rearrange text by interchanging adjacent characters • Translate each character into an ordinal number with blank as 0, A as 1, B as 2… • Add the ordinal number of the key to the results • Divide the total by 27 and retain the remainder • Translate the remainder back into a character to yield the cipher text
Example of Encryption - II • Message: DATA COM • Key: PROTOCOL • A D A T C M O • 01 04 01 20 03 00 13 15 • 01 04 01 20 03 00 13 15 • 16 18 15 20 15 03 15 12 • 17 22 16 40 18 03 28 27 • 17 22 16 13 18 03 01 00 • Q V P M R C A SPACE
Example of Decryption - I • Divide cipher text into groups of eight characters. Pad with blanks at end as necessary • Translate each cipher text alphabetic character and the encryption key into an ordinal number • For each group, subtract the ordinal number of the key value from the ordinal number of the cipher text • Add 27 to any negative number • Translate the number back to alphabetic equivalents • Rearrange the text by interchanging adjacent characters
Example of Decryption - II • Q V P M R C A SPACE • 17 22 16 13 18 03 01 00 • 17 22 16 13 18 03 01 00 • 16 18 15 20 15 03 15 12 • 01 04 01 -7 01 00 -14 -12 • plus 27 27 27 27 • 01 04 01 20 01 00 13 15 • A D A T C M O • D A T A C O M
Points to Remember • Coding • Code efficiency and conversion • Compression/compaction • Code encryption/decryption
Discussion • Design the efficient and secure coding system for an international company
Assignment • Review chapters 1-7 • Read chapters 8-9