Download presentation
Presentation is loading. Please wait.
Published byBlaise Price Modified over 9 years ago
1
CS 101 – Nov. 20 Communication, continued (Ch. 15) Cryptography –examples Error detection Local Area Networks –Different ways to hook up machines
2
Encryption examples Caesar cipher √ Cryptogram One-time Pad & Japanese Naval Codes –Dictionary table –Additive table –Destroy each page as you use it
3
Breaking codes Like solving a cryptogram Distribution of letters (‘e’ versus ‘q’) Digraphs, trigraphs Common words Eric Nave’s “Betrayal at Pearl Harbor”
4
Errors in transmission Random flipping of bits Prepare by using parity bit –Add 9 th bit to each byte –Goal is that each byte has even # of 1’s –Receiver checks each byte –Doesn’t solve every error!
5
Local Area Networks Sharing resources in a lab –File server –Printer Communication based on topology –point-to-point –star –bus (like speaking at dinner table) –ring (need token to send message)
6
Bus topology All machines share the same channel All continuously listening “Ethernet” protocol (dinner table) –don’t talk when someone else is talking –collisions Amplify signal with repeaters
7
Token ring Fast messaging over larger distances Logically arranged in loop Messaging: Token passed around the ring. –Am I busy? –From –To –message
8
Token action When you receive token: Is the message for me? –If so, read and change to ack. –If not, just pass token. Do I need token? –Wait until it comes back as not “busy”
9
Example 4 machines: A, B, C, D. A has message for C. –When A gets token, writes message for C. –B passes token. –C receives msg, sends ack message to A. –D passes token. –A receives ack, clears token. …
10
Example #2 We have 4 machines A, B, C, D. What happens when… –Token starts at D. –A has a message for C. –C has a message for A. –B has a message for D. …………………………………………
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.