chapter 7 data coding. agenda coding code efficiency and conversion compression/compaction code...
TRANSCRIPT
Chapter 7
Data Coding
Agenda
• Coding
• Code efficiency and conversion
• Compression/compaction
• Code encryption/decryption
Coding
• Definition– A predetermined set of symbols having specific
meanings
• Types– Human code
• Morse code (dot and dash for telegraph)
– Machine code• Binary states• Binary digit (bit)
Machine Codes - I
• Characteristics– Two-state code– Same number of bits– Perfectly formed– Same transmission duration
• Character Assignment: unique sequence of bits
Machine Codes - II
• Types of characters– Alphanumeric– Format effector for terminal screen or paper – Control (device & transmission)
Parity checking
• Parity bit
• Even or odd
Escape mechanisms
• Escape or ESC Character
• Pro:– Increase codes
• Con:– Code and decode the data
Specific Codes
• Baudot code
• American Standard Code for Information Interchange (ASCII)
• Extended Binary Coded Decimal Interchange Code (EBCDIC)
• Unicode
• Binary Coded Decimal
• N-out-of-M code
Baudot Code
• 5 bits (32 code points)
• ESC mechanism– Figure shift (uppercase)– Letter shift (lowercase)
• Teletypewriters before 1965
• No error checking
American Standard Code for Information Interchange (ASCII)
• By American National Standards Institute (ANSI)
• 7654321 (7-bit or 128 characters)
• Pros:– Easy sorting by computers – Used by microcomputers
Extended binary Coded Decimal Interchange Code (EBCDIC)
• 8-bit code or 256 characters
• IBM mainframe computers
• 01234567
Unicode
• 16-bit or 65,536 characters
• By Unicode Consortium for international languages
• Used by Windows NT
Other Codes
• Binary Coded Decimal– 6-bit code Hollerith code– No standard
• N-Out-Of-M Codes– M bits to transmit each character, n must be 1s– Error Detection– IBM’s 4-out-of-8
Control Characters
• Transmission control characters– SOH, STX, ETX, EOT, ACK, NAK, NUL
• Device control characters– BEL, DC1 (X-ON), DC3 (X-OFF)
• Format effect control characters– CR, LF, HT, VT
Code Efficiency
• Types of bits in a character– Information bits– Noninformation bits (parity bit)
• Definition: No. of information bits divided by the total no. of bits in a character
Code Conversion
• Harder from larger no. of bits code to smaller no. of bits code
• Use ESC mechanism
Data Compression/Compaction
• Types– Character compression/Huffman coding or adaptive
Huffman coding (bits assignment)
– Run length coding (repetitive characters)
– Character stripping (heading & trailing characters)
– Combination of the above three
• Consideration– throughput
– Storage and transmission cost
– Hardware cost & software cost
Code Encryption• Voice
– Scramble and descramble
• Data– Symmetric key
• Data encryption standard (DES) by National Institute of Standard and Technology (2 to 56)
• Triple DES (2 to 112)• Key security
– Asymmetric key or RSA encryption– Public key & private key
• Consideration– Hardware and/or software cost– Time delay– Security management cost
Example of Encryption - I
• Divide text into groups of 8 characters. Pad with blank at end as necessary
• Select an 8-characters key• Rearrange text by interchanging adjacent
characters• Translate each character into an ordinal number
with blank as 0, A as 1, B as 2…• Add the ordinal number of the key to the results• Divide the total by 27 and retain the remainder• Translate the remainder back into a character to
yield the cipher text
Example of Encryption - II
• Message: DATA COM
• Key: PROTOCOL
• A D A T C M O
• 01 04 01 20 03 00 13 15
• 01 04 01 20 03 00 13 15
• 16 18 15 20 15 03 15 12
• 17 22 16 40 18 03 28 27
• 17 22 16 13 18 03 01 00
• Q V P M R C A SPACE
Example of Decryption - I
• Divide cipher text into groups of eight characters. Pad with blanks at end as necessary
• Translate each cipher text alphabetic character and the encryption key into an ordinal number
• For each group, subtract the ordinal number of the key value from the ordinal number of the cipher text
• Add 27 to any negative number• Translate the number back to alphabetic
equivalents• Rearrange the text by interchanging adjacent
characters
Example of Decryption - II
• Q V P M R C A SPACE
• 17 22 16 13 18 03 01 00
• 17 22 16 13 18 03 01 00
• 16 18 15 20 15 03 15 12
• 01 04 01 -7 01 00 -14 -12
• plus 27 27 27 27
• 01 04 01 20 01 00 13 15
• A D A T C M O
• D A T A C O M
Points to Remember
• Coding
• Code efficiency and conversion
• Compression/compaction
• Code encryption/decryption
Discussion
• Design the efficient and secure coding system for an international company
Assignment
• Review chapters 1-7
• Read chapters 8-9