SlideShare a Scribd company logo
WEEK 3- 1-2/14 1
EDT 4608
DATA COMMUNICATION & COMPUTER
NETWORKING
Introduction to Data
Communication
WEEK 1- 2/14 2
DATA COMPRESSION
 Storing data in a format that requires less space than usual.
 Disadvantages of Compression
 Loss of image quality
 Possible file incompatibilty with other software
 Time it takes to compress the image takes longer than an uncompressed
image
 Advantages of Compression
 Greatly reduces file size so can be easily transmitted over the web (as an
email attachmemt)
 Many graphic compression types such as GIF, JPEG and PNG are standard
file formats so can be used by many software applications
WEEK 1- 2/14 3
DATA COMPRESSION STANDARDS
There are a variety of data compression techniques, but only a few
have been standardized.
The CCITT has defined a standard data compression technique for
transmitting faxes (Group 3 standard) and a compression standard
for data communications through modems (CCITT V.42bis).
In addition, there are file compression formats, such as ARC and ZIP.
Data compression is also widely used in backup utilities,
spreadsheet applications, and database management systems.
Certain types of data, such as bit-mapped graphics, can be
compressed to a small fraction of their normal size
WEEK 1- 2/14 4
DATA COMPRESSION TECHNIQUE
WEEK 1- 2/14 5
DATA COMPRESSION TECHNIQUE
Lossless Compression:
Lossless Compression packs the data in
such a way that if you were to
decompress you would get the original
file back. So reduction in file siz but no
real reduction in the quality of the file.
Several file formats are associated
with Lossless Compression including GIF,
PNG and Zip.
WEEK 1- 2/14 6
DATA COMPRESSION
TECHNIQUE
Lossy Compression
Lossy Compression is the other form of
data compression. Lossy Compression
reduces the file size but there is usually a
loss in quality that can be noticed. Our
example is a Jpeg image which begins to
gradually show a visible lack of quality
as it is compressed more and more. In
audio files, Lossy compression usually tries
to reduce the file size by removing sounds
that normally are inaudible to the human
ear.
WEEK 1- 2/14 7
DATA ENCRYPTION
encryption is the process of encoding messages (or information) in such
a way that only authorized parties can read it.
Encryption doesn't prevent hacking but it reduces the likelihood that
the hacker will be able to read the data that is encrypted
WEEK 1- 2/14 8
TYPES OF ENCRYPTION
Symmetric-key
 the encryption and decryption keys are the same. Thus communicating parties must
agree on a secret key before they wish to communicate.
Public key encryption (asymmetric encryption)
 In public-key encryption schemes, the encryption key is published for anyone to use
and encrypt messages. However, only the receiving party has access to the decryption
key and is capable of reading the encrypted messages.[4] Public-key encryption is a
relatively recent invention: historically, all encryption schemes have been symmetric-
key (also called private-key) schemes
WEEK 1- 2/14 9
Think of it like this: You create a coded message to send to a friend in which each letter is
substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B"
becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend
gets the message and decodes it. Anyone else who sees the message will see only nonsense.
The same goes for computers, but, of course, the keys are usually much longer. The first major
symmetric algorithm developed for computers in the United States was the Data Encryption
Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key.
Because computers have become increasingly faster since the '70s, security experts no longer
consider DES secure -- although a 56-bit key offers more than 70 quadrillion possible
combinations (70,000,000,000,000,000), an attack of brute force (simply trying every possible
combination in order to find the right key) could easily decipher encrypted data in a short
while. DES has since been replaced by the Advanced Encryption Standard (AES), which uses
128-, 192- or 256-bit keys. Most people believe that AES will be a sufficient encryption
standard for a long time coming: A 128-bit key, for instance, can have more than
300,000,000,000,000,000,000,000,000,000,000,000 key combinations
WEEK 1- 2/14 10
PUBLIC KEY AND PRIVATE KEYS
The Public and Private key pair comprise of two uniquely related
cryptographic keys (basically long random numbers). Below is an example
of a Public Key:
3048 0241 00C9 18FA CF8D EB2D EFD5 FD37 89B9 E069 EA97 FC20
5E35 F577 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B F01B
2F40 C744 2654 C0DD 2881 D673 CA2B 4003 C266 E2CD CB02
0301 0001
The Public Key is what its name suggests - Public. It is made available to
everyone via a publicly accessible repository or directory. On the other
hand, the Private Key must remain confidential to its respective owner.
Because the key pair is mathematically related, whatever is encrypted
with a Public Key may only be decrypted by its corresponding Private Key
and vice versa
WEEK 1- 2/14 11
DIGITAL SIGNATURE
WEEK 1- 2/14 12
DATA ENCRYPTION STANDARDS (DES)
symmetric-key algorithm
Developed in the early 1970s at IBM
72 quadrillion possible keys of a 56-bit DES
1997 - The DESCHALL Project breaks a message encrypted with DES for the
first time in public.
 With the software that was used, a single 200 MHz Pentium system was able to test
approximately 1 million keys/second if it was doing nothing else. At this rate it would take
around 2,285 years to search the entire key-space. The number of computers being used rose
rapidly and in the end, a total of 78,000 different IP addresses had been recorded, with a
maximum of 14,000 unique hosts in a 24 hour period. By the time the key was found, they had
searched about a quarter of the key-space and were searching about 7 billion keys per second,
but the number of participants was still increasing rapidly.
1999 – Triple DES
2002 – Advanced Encryption Standards (AES)
WEEK 1- 2/14 13
HACKING ENCRYPTED DATA
Brute Force Attack
 trying every possible key in turn. The length of the key determines the number of
possible keys, and hence the feasibility of this approach
Backdoor
 is a method of bypassing normal authentication
WEEK 1- 2/14 14
ERROR DETECTION AND
CORRECTION
 techniques that enable reliable delivery of digital data over
unreliable communication channels.
 Many communication channels are subject to channel noise, and
thus errors may be introduced during transmission from the source
to a receiver.
 Error detection techniques allow detecting such errors, while error
correction enables reconstruction of the original data.
WEEK 1- 2/14 15
THREE TYPES OF ERRORS:
 Single Bit Error
 Multiple bits error
 Bursts Error
WEEK 1- 2/14 16
ERROR DETECTION
Errors in the received frames are detected by means of
 Parity Check and
 CRC (Cyclic Redundancy Check).
In both scenario, few extra bits are sent along with actual data to
confirm that bits received at other end are same as they were sent. If
the checks at receiver’s end fails, the bits are corrupted.
WEEK 1- 2/14 17
PARITY CHECK
One extra bit is sent along with the original bits to make number of 1s
either even, in case of even parity or odd, in case of odd parity.
The sender while creating a frame counts the number of 1s in it, for
example, if even parity is used and number of 1s is even then one bit
with value 0 is added. This way number of 1s remain even. Or if the
number of 1s is odd, to make it even a bit with value 1 is added.
WEEK 1- 2/14 18
CYCLIC REDUNDANCY CHECK
CRC is a different approach to
detect if the frame received
contains valid data. This
technique involves binary division
of the data bits being sent. The
divisor is generated using
polynomials. The sender performs
a division operation on the bits
being sent and calculates the
remainder. Before sending the
actual bits, the sender adds the
remainder at the end of the
actual bits. Actual data bits plus
the remainder is called a
codeword. The sender transmits
data bits as codewords.
WEEK 1- 2/14 19
ERROR CORRECTION
In Digital world, error correction can be done in two ways:
 Backward Error Correction: When the receiver detects an error in the data received,
it requests back the sender to retransmit the data unit.
 Forward Error Correction: When the receiver detects some error in the data
received, it uses an error-correcting code, which helps it to auto-recover and correct
some kinds of errors.
WEEK 1- 2/14 20
CONNECTOR INTERFACES
Gender – Male / Female
RJ45 – LAN Connector
RJ11 – Modem Connector
WEEK 1- 2/14 21
CONNECTOR INTERFACES

More Related Content

PPTX
Cryptography and Network Security
PPTX
cryptography ppt.pptx this ppt consists of cryptography basics
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
CNIT 123 12: Cryptography
PPT
Data security in data communication
PPT
Cryptography Lecture by Sam Bowne
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
PDF
Introduction to Cryptography
Cryptography and Network Security
cryptography ppt.pptx this ppt consists of cryptography basics
Ch12 Cryptography it-slideshares.blogspot.com
CNIT 123 12: Cryptography
Data security in data communication
Cryptography Lecture by Sam Bowne
NS UNIT 1 Advanced Encryption Standard& RSA
Introduction to Cryptography

Similar to EDT 4608 - PART 2 - DATA COMMUNICATION AND COMPUTER NETWORKING (20)

PDF
Ch 12: Cryptography
PPTX
Cryptography
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PPTX
Encryption algorithms
PPTX
Cryptography notes for undergraduate kud
PPTX
big data and Iot , its security part ,hoe yoy help this
PPT
Jaimin chp-8 - network security-new -use this - 2011 batch
PPT
unit 1 kshvxkgsuxhcsliucxhucducudccccckjh,kj,
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
PDF
Chapter 8 cryptography lanjutan
PPTX
Security - ch3.pptx
PPT
Ch08-CryptoConcepts.ppt
PPT
Network security
PPT
network security
PDF
Evolution of Network, Internet, Security and Public cryptography
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPT
Stallings Kurose and Ross
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Security - ch3.pptx
PPT
Lecture1111111111111111111111111111111111111111111111111111111
Ch 12: Cryptography
Cryptography
CISSP Prep: Ch 4. Security Engineering (Part 2)
Encryption algorithms
Cryptography notes for undergraduate kud
big data and Iot , its security part ,hoe yoy help this
Jaimin chp-8 - network security-new -use this - 2011 batch
unit 1 kshvxkgsuxhcsliucxhucducudccccckjh,kj,
CNIT 125 Ch 4. Security Engineering (Part 2)
Chapter 8 cryptography lanjutan
Security - ch3.pptx
Ch08-CryptoConcepts.ppt
Network security
network security
Evolution of Network, Internet, Security and Public cryptography
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Stallings Kurose and Ross
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Security - ch3.pptx
Lecture1111111111111111111111111111111111111111111111111111111
Ad

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Classroom Observation Tools for Teachers
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Structure & Organelles in detailed.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
STATICS OF THE RIGID BODIES Hibbelers.pdf
A systematic review of self-coping strategies used by university students to ...
Classroom Observation Tools for Teachers
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pharma ospi slides which help in ospi learning
Cell Structure & Organelles in detailed.
O5-L3 Freight Transport Ops (International) V1.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
Ad

EDT 4608 - PART 2 - DATA COMMUNICATION AND COMPUTER NETWORKING

  • 1. WEEK 3- 1-2/14 1 EDT 4608 DATA COMMUNICATION & COMPUTER NETWORKING Introduction to Data Communication
  • 2. WEEK 1- 2/14 2 DATA COMPRESSION  Storing data in a format that requires less space than usual.  Disadvantages of Compression  Loss of image quality  Possible file incompatibilty with other software  Time it takes to compress the image takes longer than an uncompressed image  Advantages of Compression  Greatly reduces file size so can be easily transmitted over the web (as an email attachmemt)  Many graphic compression types such as GIF, JPEG and PNG are standard file formats so can be used by many software applications
  • 3. WEEK 1- 2/14 3 DATA COMPRESSION STANDARDS There are a variety of data compression techniques, but only a few have been standardized. The CCITT has defined a standard data compression technique for transmitting faxes (Group 3 standard) and a compression standard for data communications through modems (CCITT V.42bis). In addition, there are file compression formats, such as ARC and ZIP. Data compression is also widely used in backup utilities, spreadsheet applications, and database management systems. Certain types of data, such as bit-mapped graphics, can be compressed to a small fraction of their normal size
  • 4. WEEK 1- 2/14 4 DATA COMPRESSION TECHNIQUE
  • 5. WEEK 1- 2/14 5 DATA COMPRESSION TECHNIQUE Lossless Compression: Lossless Compression packs the data in such a way that if you were to decompress you would get the original file back. So reduction in file siz but no real reduction in the quality of the file. Several file formats are associated with Lossless Compression including GIF, PNG and Zip.
  • 6. WEEK 1- 2/14 6 DATA COMPRESSION TECHNIQUE Lossy Compression Lossy Compression is the other form of data compression. Lossy Compression reduces the file size but there is usually a loss in quality that can be noticed. Our example is a Jpeg image which begins to gradually show a visible lack of quality as it is compressed more and more. In audio files, Lossy compression usually tries to reduce the file size by removing sounds that normally are inaudible to the human ear.
  • 7. WEEK 1- 2/14 7 DATA ENCRYPTION encryption is the process of encoding messages (or information) in such a way that only authorized parties can read it. Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted
  • 8. WEEK 1- 2/14 8 TYPES OF ENCRYPTION Symmetric-key  the encryption and decryption keys are the same. Thus communicating parties must agree on a secret key before they wish to communicate. Public key encryption (asymmetric encryption)  In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key and is capable of reading the encrypted messages.[4] Public-key encryption is a relatively recent invention: historically, all encryption schemes have been symmetric- key (also called private-key) schemes
  • 9. WEEK 1- 2/14 9 Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense. The same goes for computers, but, of course, the keys are usually much longer. The first major symmetric algorithm developed for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. Because computers have become increasingly faster since the '70s, security experts no longer consider DES secure -- although a 56-bit key offers more than 70 quadrillion possible combinations (70,000,000,000,000,000), an attack of brute force (simply trying every possible combination in order to find the right key) could easily decipher encrypted data in a short while. DES has since been replaced by the Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys. Most people believe that AES will be a sufficient encryption standard for a long time coming: A 128-bit key, for instance, can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations
  • 10. WEEK 1- 2/14 10 PUBLIC KEY AND PRIVATE KEYS The Public and Private key pair comprise of two uniquely related cryptographic keys (basically long random numbers). Below is an example of a Public Key: 3048 0241 00C9 18FA CF8D EB2D EFD5 FD37 89B9 E069 EA97 FC20 5E35 F577 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B F01B 2F40 C744 2654 C0DD 2881 D673 CA2B 4003 C266 E2CD CB02 0301 0001 The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key must remain confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa
  • 11. WEEK 1- 2/14 11 DIGITAL SIGNATURE
  • 12. WEEK 1- 2/14 12 DATA ENCRYPTION STANDARDS (DES) symmetric-key algorithm Developed in the early 1970s at IBM 72 quadrillion possible keys of a 56-bit DES 1997 - The DESCHALL Project breaks a message encrypted with DES for the first time in public.  With the software that was used, a single 200 MHz Pentium system was able to test approximately 1 million keys/second if it was doing nothing else. At this rate it would take around 2,285 years to search the entire key-space. The number of computers being used rose rapidly and in the end, a total of 78,000 different IP addresses had been recorded, with a maximum of 14,000 unique hosts in a 24 hour period. By the time the key was found, they had searched about a quarter of the key-space and were searching about 7 billion keys per second, but the number of participants was still increasing rapidly. 1999 – Triple DES 2002 – Advanced Encryption Standards (AES)
  • 13. WEEK 1- 2/14 13 HACKING ENCRYPTED DATA Brute Force Attack  trying every possible key in turn. The length of the key determines the number of possible keys, and hence the feasibility of this approach Backdoor  is a method of bypassing normal authentication
  • 14. WEEK 1- 2/14 14 ERROR DETECTION AND CORRECTION  techniques that enable reliable delivery of digital data over unreliable communication channels.  Many communication channels are subject to channel noise, and thus errors may be introduced during transmission from the source to a receiver.  Error detection techniques allow detecting such errors, while error correction enables reconstruction of the original data.
  • 15. WEEK 1- 2/14 15 THREE TYPES OF ERRORS:  Single Bit Error  Multiple bits error  Bursts Error
  • 16. WEEK 1- 2/14 16 ERROR DETECTION Errors in the received frames are detected by means of  Parity Check and  CRC (Cyclic Redundancy Check). In both scenario, few extra bits are sent along with actual data to confirm that bits received at other end are same as they were sent. If the checks at receiver’s end fails, the bits are corrupted.
  • 17. WEEK 1- 2/14 17 PARITY CHECK One extra bit is sent along with the original bits to make number of 1s either even, in case of even parity or odd, in case of odd parity. The sender while creating a frame counts the number of 1s in it, for example, if even parity is used and number of 1s is even then one bit with value 0 is added. This way number of 1s remain even. Or if the number of 1s is odd, to make it even a bit with value 1 is added.
  • 18. WEEK 1- 2/14 18 CYCLIC REDUNDANCY CHECK CRC is a different approach to detect if the frame received contains valid data. This technique involves binary division of the data bits being sent. The divisor is generated using polynomials. The sender performs a division operation on the bits being sent and calculates the remainder. Before sending the actual bits, the sender adds the remainder at the end of the actual bits. Actual data bits plus the remainder is called a codeword. The sender transmits data bits as codewords.
  • 19. WEEK 1- 2/14 19 ERROR CORRECTION In Digital world, error correction can be done in two ways:  Backward Error Correction: When the receiver detects an error in the data received, it requests back the sender to retransmit the data unit.  Forward Error Correction: When the receiver detects some error in the data received, it uses an error-correcting code, which helps it to auto-recover and correct some kinds of errors.
  • 20. WEEK 1- 2/14 20 CONNECTOR INTERFACES Gender – Male / Female RJ45 – LAN Connector RJ11 – Modem Connector
  • 21. WEEK 1- 2/14 21 CONNECTOR INTERFACES