2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530

Slides:



Advertisements
Similar presentations
Introduction to Information Technologies
Advertisements

22C:19 Discrete Structures Integers and Modular Arithmetic
ENGIN112 L4: Number Codes and Registers ENGIN 112 Intro to Electrical and Computer Engineering Lecture 4 Number Codes and Registers.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economic to transfer all bits of a long message simultaneously.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
CS 151 Digital Systems Design Lecture 4 Number Codes and Registers.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Module 4 Hash Functions Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Chapter 2 Error-Detecting Codes. Outline 2.1 Why Error-Detecting Codes? 2.2 Simple Parity Checks 2.3 Error-Detecting Codes 2.4 Independent Errors: White.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
File authentication. Just as people need authentication, so, too, do the files that are so freely distributed through the Internet. The Web works on a.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
Lecture 6 Topics Character codes Error Detection and Correction
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
Error Detection and Correction
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Data and Computer Communications
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Practical Session 10 Error Detecting and Correcting Codes.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1. Error Detection Techniques:
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Chapter 7 - Packets, Frames and Error Detection 1. Concepts of Packets 2. Motivation for Packet Switching 3. Framing 4. Frame Formats 5. Transmission Errors.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
DIGITAL COMMUNICATIONS Linear Block Codes
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
Longitudinal redundancy check
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Error Coding Overview (§3.2)
1 Kyung Hee University Error Detection and Correction.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
MD5 & Hash Encryption By Alex Buzak. Overview Purpose of MD5 and Hash Encryptions Examples MD5 Algorithm Explanation of Possible Security Risks Practical.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
Practical Session 10 Computer Architecture and Assembly Language.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Data Transmission and Networks Transmission error checking & correcting.
1 University of Calgary CS 441 Part 3 The Data Link Layer 3.1 Framing & Error Control 3.2 Error & Flow Control.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
ERROR CORRECTING CODES
Character coding schemes
OCR AS Level F451: Data transmission
Data Link Layer.
Dhanushiya. R I YEAR BSc COMPUTER TECHNOLOGY.  Error is a condition when the output information does not match with the input information. During transmission,
Chapter 7 Error Detection and Correction
DATA COMMUNICATION Lecture-35.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Reliability and Channel Coding
Error Detection and Correction
Hashing Hash are the auxiliary values that are used in cryptography.
Error Detection and Correction
Data Link Layer. Position of the data-link layer.
Presentation transcript:

2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO

Error Detection & Correction In computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels.

Why? Many communication channels are subject to channel noise, and thus errors may be introduced during transmission from the source to a receiver. Error detection techniques allow detecting such errors, Error correction enables reconstruction of the original data.

Purpose: Detecting Transmission Errors Parity Check: Parity bit Checksums The most common approach when any error is detected is retransmission.

Parity Bit-Pattern When will the parity bit be set? This is known as the Even parity bit This is known as the Even parity bit Purpose: To make the total number of ‘ON’ bits even Example: 7 data bits + 1 parity bit

Parity Bit-Pattern Work out the Even parity bit?

Parity Bit-Pattern When will the parity bit be set? This is known as the ODD parity bit This is known as the ODD parity bit Purpose: To make the total number of ‘ON’ bits ODD

Parity Bit-Pattern Work out the Odd parity bit?

Odd Parity Sent Data Parity Bit-Pattern Received with Parity ‘1’ when it should be ‘0’ … => Data received with errors, detected How does it work? Odd Parity Received Data Parity Bit-Pattern

Odd Parity Sent Data Parity Bit-Pattern data bits altered but parity bits reflects that it is correct. => Data received with errors but not detected Loop holes: Odd Parity Received Data Parity Bit-Pattern

Check digit Similar to the concept of check digit for bank account numbers Check digit Approach take the weighted sum of the digits, modulo 10, with different weights for each number position Weights: 5, 3, 2, 7 Number to be coded: ×4 + 3×8 + 2×7 + 7×1 = modulo 10 Check digit would be 5 Result:

Check digit Similar to the concept of check digit for bank account numbers Check digit Approach take the weighted sum of the digits, modulo 10, with different weights for each number position Weights: 1, 2, 7, 8 Number to be coded: 7898

Check digit Similar to the concept of check digit for bank account numbers Check digit Approach take the weighted sum of the digits, modulo 10, with different weights for each number position Weights: 1, 2, 7, 8 Number to be coded: ×1 + 8×2 + 9×7 + 8×8 = modulo 10 Check digit would be 0 Result:

Checksum : Hash Function

Checksums Checksum is a fixed-size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. How to check for errors? Re-computing the checksum and comparing it with the stored one Plain text Hash Function cipher text

MD5 What is MD5 checksum? Uses of MD5 Checksum Checking the MD5

MD5 Checksum

MD5 Checksum A hash function to check if a file is legit. In Hexadecimal, 128 bits, 32 Characters If the checksum matches the given than its legit else there is a possibility it is altered. The checksum will be different for different file. There are programs/utilities to calculate/compare MD5 Checksum. MD5 Checksum are available for check. Other Checksums: SHA-1, SHA-2 (Secure Hash Algorithm)

Disadvantage of any hash function Hash Collision 2 input value hash to the same result