Topic 3 Data Efficiency and Security
Topic 3 Data Efficiency and Security
Topic 3 Data Efficiency and Security
DEPARTMENT
OF
ELECTRICAL
ENGINEERING
EP601 DATA
COMMUNICATION
TOPIC 3 :
At the end of this learning session, student must be able to;
b. Multiplexer
a. FDM
b. TDM
c. STDM
a. Caesar Cipher
b. Mapping
c. Data Encryptions Standard (DES)
d. Rivest-Shamir-Adelman (RSA)
2
Data efficiency
devices
a. Front End Processor (FEP)
b. Multiplexer
FEP
Polling:
Polling refers to the process of a host computer
asking an intelligent terminal if it has any
data to send to the host computer. This task is
typically accomplished by a front-end processor
(FEP),
which
handles
all
the
routine
communications procedures for the host computer.
Selecting:
Selecting occurs when a host computer or a
FEP sends data to a terminal after the terminal
indicates that it is ready to accept data.
8
Incoming
and outgoing
jobs
Job 1
Job 2
Job 3
Main
system
Front-end
processor
Job 4
Communications
link
Multiplexor
Front-end
processor
Host
computer
10
MULTIPLEXING
11
MULTIPLEXING
cont
FIGURE : MULTIPLEXING
13
15
16
Example of FDM
17
FREQUENCY DIVISION
MULTIPLEXING
18
FDM Transmitter
FDM Receiver
19
FDM Multiplexer
Multiple signals are each used to modulate a
separate carrier.
Each carrier is on a different frequency.
The modulated carriers are then added together
to form single complex signal which is
transmitted over the single channel.
This signal is then used to modulate a radio
transmitter.
FDM demultiplexer
The
demultiplexer uses a series of filters to
a.decompose
Frequency
Multiplexing
theDivision
multiplexed
signal into its
component signals.
(FDM)
cont
The individual signals are then passed to the
demodulator that separates them from their
carriers and pass them to the waiting receiver.
20
21
Digital multiplexing technique for combining several lowrate channels into one high-rate channel.
Each signal occupy the entire bandwidth of the channel.
However, each signal is transmitted for only a brief
period of time.
The multiple signals take turns transmitting over a
single channel.
TDM may be used with both digital and analog signals.
The transmission between nodes must be digital and is
formatted into serial data words.
TDM assigns each terminal a dedicated time slot.
22
23
TDM
(cont..)
TDM
(cont..)
b)Statistical TDM
Addressing
Slot Size
No Synchronization Bit
Bandwidth
25
c. STDM
(cont)
Each input unit becomes one output unit and occupies one
output time slot.
However , the duration of output TS is n times shorter than the
duration of input TS.
If input TS is Ts, then the output TS is T/n s. Where n is the
number of connection. (unit in the output connection has a
shorter duration means travel faster)
As in the figure, n is 3 , the rate of the output link must be 3
times the data rate of a connection
27
29
Data Compression
30
Data Compression
Lossless methods:
Run length encoding (RLE)
Lempel-Ziv_Welch (LZW )
Huffman coding.
31
32
Example of RLE
12W1B12W3B24W1B14W
37
38
Example
39
40
Input string is
"^WED<256>E<260><261><257>B<260>T".
42
Huffman coding
43
Huffman coding
(cont)
Application
44
Huffman coding
(cont)
Huffman coding
(cont)
Example:
Letter Frequency
A
12
A
A
4
B
B
4
C
5
D
6
E
12
46
sho/polisas
Huffman coding
(cont)
B
4
C
5
D
6
E
12
47
Huffman coding
(cont)
A
4
B
4
11
C
5
D
6
E
12
Repeat
48
Huffman coding
(cont)
19
Repeat
A
4
B
4
11
C
5
D
6
E
12
49
Huffman coding
(cont)
11
8
A
4
B
4
C
5
D
6
E
12
50
Huffman coding
(cont)
0
A
A
4
1
B
B
4
C
C
5
D
D
6
E
E
12
Left branch is 0
Right branch is 1
Letter Code
A
000
B
001
C
010
D
011
E
1
51
Huffman coding
(cont)
Letter Code
A
000
001
010
011
A savings of 24 bits.
Longer text would mean more savings
52
Exercise 1:
53
54
55
56
A savings of bits.
57
58
60
Huffman Decoding
Figure b below shows how decoding takes place.
61
62
63
64
ENCRYPTION AND
DECRYPTION
Encryption
refers
to
the
coding
of
information in order to keep it secret.
Encryption is a process of converting a
plaintext into enciphered text or ciphertext,
also called cryptogram.
Decryption
is a deciphering process or
reversing the encrypting process to recover
the original information, which is to convert
ciphertext back to its original form of
plaintext.
65
ENCRYPTION AND
DECRYPTION TECHNIQUES
a. Caesar Cipher
b. Mapping
c. Data Encryptions Standard
(DES)
d. Rivest-Shamir-Adelman
(RSA)
66
CAESAR CIPHERS
What is cipher ? - put (a message) into secret
writing or encode the message.
Caesar Ciphers is a substitution cipher, in which
each character in the plaintext is substituted
by another character in the ciphertext.
The Caesar Cipher replaces each letter by the
letter that appears k positions later to the
right in the alphabet. k, is known as a key.
Also known as shift cipher.
Is named after Julius Caesar, who used it in his
private correspondence.
67
68
assalamualaikum
mddmwmxfmwmuvfx
Ciphertext :
Plain:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: MNOPQRSTUVWXYZABCDEFGHIJKL
69
70
cont
71
EXAMPLE:
Ali needs to send the message Enemy attacks to
night to Lina.
The key used for encryption and decryption is a key
using a block of five characters :
Solution :
First remove the spaces in the message, then divide
the text into blocks of five characters. Then add a
bogus (palsu) character z at the end of the fourth
block.
enemy attac kston ightz
72
MAPPING CIPHER
cont..
73
76
cont
78
cont
79
cont
80
cont
Example :
Find the output of the initial permutation box when the input is
given in hexadecimal as:
cont
82
The round-key
generator creates
sixteen 48-bit
keys out of a 56bit cipher key.
83
84
85
RSA (Rivest-Shamir-Adelman)
87
RSA Algorithm
1.
2.
3.
4.
5.
6.
7.
C=Me mod n
M=Cd mod n
89
Modular Arithmetic
a = b mod (m) means that when a is
divided by m the remainder is b.
Examples
11 = 1 mod (5)
20 = 2 mod (6)
91
RSA Example 1
1.
2.
3.
4.
5.
?
is 1)
6.
Kpub= {e,n] ={3,33}
7.
Kpvt={d,n} = { 7,33}
C = Ped (mod n)
P = C (mod n)
; cyphertext
; plaintext
92
93
RSA Example
94
RSA Example 2
1.
2.
3.
4.
5.
6.
7.
decryption:
M = 1123 mod 187 = 88
96
RSA Example 3
1.
2.
3.
4.
5.
6.
7.
P = C37 mod 77
plaintext
98
REFERENCES:
Main:
Forouzan,
B.A.
(2012).
Data
Communications
and
Networking
(5th
edision). Mc Graw Hill. (ISBN: 978-0-07131586-9)
Additional:
William
Stallings.
(2011).
Data
And
Computer Communication (9th edition).
Prentice Hall. (ISBN-10: 0131392050)
99