0% found this document useful (0 votes)
11 views

Class 8 Chapter 2

Chapter 2 covers data representation, focusing on methods of data transmission, error detection, and encryption. It discusses packet switching, its benefits and drawbacks, and various transmission modes, alongside error-checking techniques like parity checks and checksums. Additionally, it explains encryption types and their importance in securing data during transmission.

Uploaded by

justmutasim09
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Class 8 Chapter 2

Chapter 2 covers data representation, focusing on methods of data transmission, error detection, and encryption. It discusses packet switching, its benefits and drawbacks, and various transmission modes, alongside error-checking techniques like parity checks and checksums. Additionally, it explains encryption types and their importance in securing data during transmission.

Uploaded by

justmutasim09
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

Data Representation

Chapter 2
TABLE OF CONTENTS

2.1 2.2
Types and Method of Error Detection
Data Transmission

2.3
Encryption
2.1
Method of
transfers
Data Packets
Long distance transmission of long data is
segmented into smaller part about 64 kib.
This segmented parts are easier to transmit
and control over array of routers. This
Packet structure
Segmented parts of data is called packets
-
Header Payload Trailer
When all packets are received by the
destination machine they have to be all
reassemble in order to make sense of the
original information. Packet structure has
some attributes to help us assemble.
Header Payload Trailer

All information
for sender,
receiver and
packet itself.
The actual information that
is being transferred
Tells the end of
packet and error
checking
In Micro Level

Header Payload Trailer

Sequence
IP Size of The actual Bits that
IP of
of
of packet
packet in Error
source Or packet segmented Data in shows end of
destination bytes checking bits
number the packet packet
In Macro Level

R R

R R R

R R R R
R R
R
R R
Glossary

Router - A network device that receives and sends


information on it own to another network device

Nodes - Stages in a network that has the capability of


receiving and sending out data. Example - Router, hub,
broadband provider

Routes - The path of Nodes used by packet to arrive at


the destination router from the source

Hop Number - The number of nodes changed to arrive


at the destination.
Packet Switching
It refers to the whole process of segmenting message to small
packets, sending them to destination node over a collection of
independent nodes and packet are resemble in order in the
destination node.

Points to remember :
➔ Each packets will follow its own path
➔ Routers decides what routes to take for each packets (Keeping
in mind how many packets are in waiting to be transmitted)
➔ The shortest path is taken (keeping in mind which router is busy
in that instant)
➔ Packets can arrive in different order at destination but easily
reassemble with the header information from a packet
Benefits of Packet Switching
➔ No line of communication is reserved in the transferring of the
packets
➔ If there is fault or loss packet rerouting can be done to send
another packet from source
➔ Easily expandable
➔ High data transmission rate

Drawbacks of Packet Switching


➔ Prone to lose packets
➔ Prone to do error in real time streaming like TV broadcasting
➔ There is a delay when packet reorder when one packet is lost

Why do we lose packet in transmission ?


Why is Hop number Introduced ? (page 48)
Parameter of Data transmission
➔ Length of distance
➔ How many bits will be sent at a time
➔ How to make sure the receive data is correct order

Transmission mode
➔ Simplex
➔ Half - duplex
➔ full - duplex
Parameter of Data transmission
➔ Length of distance
➔ How many bits will be sent at a time
➔ How to make sure the receive data is correct order

Transmission modeType of
➔ Simplex
➔ Half - duplex Transmission
➔ full - duplex ➔ Serial
➔ Parallel
Type of transmission Serial Parallel

Rate of Transfer

Bits transfer

Distance of transmission

Synchronization

Reliability

Cost

Port or wire or channels


Universal Serial Bus
➔ Does half and full duplex transmission
Transmissi
➔ When connected changes voltage in machine
pow on
to be recognize by the system er

➔ Needs appropriate drivers for USB peripheral


device to work properly

➔ If driver not found it will ask permission to


download the driver from websites
Pros and Cons of USB
2.2
Error detection
Error
Here, error is referring the loss, gain or corruption of data
while transmission.

Cause of error
1. Electrical interferences can influence data to be lost or
corrupted
2. Data loss or gain due to the problems of packet
switching
3. Skewing of data due to different arrival of bits at
destination (out of synchronization )

Types of error checking we will see:


4. Parity checks
5. Checksum
Parity check

Even parity refers to “ 1 ” s bit to be even numbered


Odd parity refers to “ 1 ” s bit to be odd numbered

A sender- receiver decides beforehand what parity


protocol they will maintain. If the receiver get a
different parity byte (even parity instead of odd or
vice versa) it request for retransmission.

MSB - most significant bit is referred to the most left


bit.
Parity bit is the MSB reserved for parity checking

Let see some examples


Parity
bit
Problem in Parity check

Solution is parity block


Parity block
It lets us check data over a block of byte horizontally and
vertically by using the parity bit for horizontally checking and a
extra parity byte is given at end for vertical bit checking. This
parity byte also tells us the end of block bytes.
Even Parity Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
parity bit

Byte 1 0 0 1 1 1 1 0 0

Byte 2 1 1 1 1 0 0 0 0

Parity 1 1 0 0 1 0 0 0
byte
Checksum

1. A block of data before sending, a checksum is


calculated by running a algorithm or operation
on the block of data.
2. The checksum is then send with the block of
data
3. At receiver side, same algorithm or operation is
run on the data to check the same checksum
value that matches with the original trailer

If the two checksum are matches then there is no


error in the transmission.
This is not
in syllabus

This just to
give an idea
how
checksum
work

This will not


come exam
or
anywhere
Echo check
Error Scenario

1. The message did not went correct return back is


administered
2. The return back message was wrong the real message
was correct
3. The re-routed repeat message now is again wrong
Automatic Repeats
Requests ACK- Positive
Acknowledgment
See Page 62 for detail NCK- Negative
Acknowledgment
Timeout- wait time before
resending
CRC - cyclic redundancy
check
END OF CLASS TEST 2
SYLLABUS
Check digits

Final digit in a code used for calculation to check on the error


of printing or transmission when scanned ISBN or VIN

It is used to identify the error as follows :


1. Incorrect digits added i.e 5327 instead of 5307
2. Transposition error i.e 5730 instead of 5307
3. Omitted or extra digits i.e 537 instead of 5307
4. Phonetic error i.e 13 instead of 30
There are two check digits techniques
5. ISBN
6. Modulo-11
ISBN
Example 1 - Find the check digit of the following 12 digit ISBN.

978034098382

1. Sum of odd place value numbers


2. Sum of even place number and then multiply by 3
3. Divide by 10 and take the remainder
4. Subtract reminder from 10 that is the check digit
Example 1.1 - use the check digit of the following 13 digit ISBN to
check for error.

9780340983829

1. Sum of odd place value numbers


2. Sum of even place number and then multiply by 3
3. Divide by 10 and the remainder has to be zero
Modulo-11

Example 1 - Find the check digit of the following 7 digit modulo-11.

4156710
Weighting values 8765432

Sum = (4x8)+(1x7)+(5x6)+(7x4)+(1x0)= 130

Division = 130/11 = remainder 9

Subtract = 11-9 =2
Modulo-11

Example 1 - recalculate the check digit of the following 8 digit using


modulo-11.

41567102
Weighting values 87654321

Sum = (4x8)+(1x7)+(5x6)+(7x4)+(1x0)+ (2x1)= 132

Division = 132/11 = remainder 0


2.3
Encryption
Encryption Visual Representation

Man in the middle cannot understand the


cybertext as he does not know how to
decyber it
Key points :

1. Eavesdropper : another name for hacker who intercepts data


being transmission on wired or wireless network
2. Encryption : the process of making data meaningless using
encryption keys: without correct decryption key the data
cannot be decoded back to original text
3. Plaintext : the original text before it is put through an
encryption algorithm
4. Ciphertext : Encrypted data is the result of a puting plaintext
through encryption algorithm
5. Symmetric encryption : same key is used to make decode
and encode plaintext
6. Asymmetric Encryption : Different key to decode and another
key to encode Ciphertext.
7. Public key : key known to all
8. Private key : key that only know to verified party
Encryption
It alter the message in a unreadable form for anyone for whom it is not
intended to.
It prevents us from the risk of eavesdropping.
Encryption of two types
1. Asymmetric encryption (uses different keys to cyber and
decipher)
2. Symmetric Encryption(Uses same key to encrypt and
decrypt)

You might also like