Uganda Christian University
Faculty of Science and
Technology
Information Technology II
Lecture 0
BSIT 1, BES 1
January Semester 2011
Mr. Ronald Ssejjuuko
0781 457 185
rssejjuuko@technology.ucu.ac.ug
BSIT 1: Information Technology II 1
Introduction
The growth and development of Information
Technologies (IT) has led to the ignition and
increase in their economic and social impact;
a cause that has led many to crave and
advance in areas of technology.
This course will enable students be part of
this hi-tech epoch by building on the
principles learnt in Information 1
Technology 1. 2
Introduction cont’d
So the principles and skills learnt from
information technology 1 will highly be
appreciated to underscore the need for
this course.
This will enable the student to
understand the need of information
technology in keeping and manipulating
information or data
BSIT 1: Information Technology II 3
Course description
This course introduces the engineering behind a modern
information infrastructure which is the foundation for the
revolution in Systems that we are currently experiencing
including economic and social systems.
The course prepares students to take advantage of new
information technologies that will as well influence their
prospective careers and enhance their deeper study of
computers and their use.
Students should and will be in position to make changes
in their particular professions based on the continuing
emergence of new information technologies and
associated capabilities.
BSIT 1: Information Technology II 4
Course description
It allows those who provide, interpret, manage and
otherwise use information to make fundamental
changes in what they do and how they do it. These
changes have created a need for a broad
understanding of IT and the ways in which it can be
applied.
►Understanding today’s IT is the basis for learning
tomorrow’s IT and those who have the benefit of a
broad understanding of the field will be better users
of it than those to whom it remains vague and a bit of
a mystery.
BSIT 1: Information Technology II 5
Learning objectives
The course seeks to provide knowledge regarding
such concepts as the nature of information and all
that it may entail, storage media and the fundamental
principles governing information technology.
Exposure to hardware and software tools(advanced
spreadsheets) for information capture, analysis,
conversion, display and management will provide
students with the knowledge needed to bring the
appropriate information related technologies to bear in
their disciplines.
BSIT 1: Information Technology II 6
Grading
3 tests will be administered of which a student has to
do at least 2. (Best 2 tests will be considered)
Course Work (1) will be administered.
Exercises will be done
In order to receive a passing grade for this course, a
student should attain greater than 35% (17.5) of the
entire course work and must receive a passing
grade (greater than 35% [17.5]) in the final exam.
BSIT 1: Information Technology II 7
Grading Cont’d
The basis for the final grade awarded is;
Class attendance, participation & engagement 5%
Tests 30%
Assignments15%
Final Exam 50%
• A student should receive a cumulative grade of greater than
50% marks to receive the normal progress attribute;
implying that a student has to attain a grade greater than 50
as a result of the summation of the grades from both course
work and the final exam.
• Students are expected to attend at least 85% of the total
lectures.
BSIT 1: Information Technology II 8
Scheduled Dates for Tests &
Course Work
Assignment 1 Week 2
Test 1 Week 4
Assignment 2 Presentation Week 5
Test 2 Week 6
Test 3 Week 8
Final Exam Week 13
Dates may change depending on students progress
or due to any other unpredicted events.
Exercises will be appended to students assessment
BSIT 1: Information Technology II 9
Classes Scheduled for:
Day Time Room Course
Friday 4:00-6:00pm K10 BES 1
Wednesday 5:00-7:00pm TP3
Tuesday 8:30-10:30am TP2 BSIT 1
Thursday 8:30-10:30am OV2
Lecturer’s Office Hours:
Wednesday 11:00am - 4:00pm
Thursday 11:00am - 4:00pm
BSIT 1: Information Technology II 10
Referential Material for this Course
1. David Cyganski, John A. Orr with Richard F. Vaz (2001).
Information Technology Inside and Outside. Upper Saddle River,
New Jersey: Prentice Hall.
2. Peter Norton (1999). Introduction to computers. Third Edition:
Glencoe/McGraw-Hill
3. Peter Norton. Computing Fundamentals. Fifth Edition:
Glencoe/McGraw-Hill
4. Introduction to information technology by Turban.Rainer.Potter
5. E.S Waburoko Computers. An introduction to Information
Technology.
6. Beekman, George. Computer Confluence: Exploring Tomorrow's
Technology, Concise Edition. Edition 5.5. Upper Saddle River, NJ:
Prentice Hall, 2003.
Type: Textbook. ISBN: 978-0536-199690
BSIT 1: Information Technology II 11
Faith and Teaching
Everyone should appreciate that God is the
beginning of all wisdoms. Nothing comes to us
without God’s knowledge.
“Study to shew thyself approved unto God….”
(2Tim 2:15)
And that ye study to be quiet, and to do your own
business, and to work with your own hands, as
we commanded you; (1Thes 4:11)
BSIT 1: Information Technology II 12
Faith and Teaching
2Thes3:10-12 For even when we were with
you, we would give you this command: If
anyone is not willing to work, let him not eat.
For we hear that some among you walk in
idleness, not busy at work, but busy bodies.
Now such persons we command and
encourage in the Lord Jesus Christ to do their
work quietly and to earn their own living.
Faith and Teaching
God gives you as much as you ask. Therefore ask
for more insight in whatever you learn so that you
can be blessed with much knowledge.
Misuse of knowledge is abuse of God’s power
-which not ethical in the Christian perspective.
Christians should view information technology as a
tool to do God’s work, not for ungodly gains.
BSIT 1: Information Technology II 14
Faith and Teaching
Ethics:
While more than just a list of “do’s” and “don’ts,” the
Bible does give us detailed instructions on how to
live as a Christian should. The Bible is all we need to
know about how to live that Christian life. However,
the Bible does not explicitly cover every single
situation we will face in our lives. How then is it
sufficient? That is where Christian Ethics comes in.
BSIT 1: Information Technology II 15
Faith and Teaching
Science defines ethics as “a set of moral principles, the
study of morality.” Therefore, Christian Ethics would be the
principles, derived from the Christian faith, by which we act.
God’s Word cover every situation we face throughout our
lives, its principles give us the standards by which we must
carry ourselves in those situations where there are no
explicit instructions.
For example, the Bible does not say anything explicitly about
the spreading pornographic contents, yet based on the
principles we learn through Scripture, we can know that it is
wrong.
BSIT 1: Information Technology II 16
Faith and Teaching
For one thing, the Bible tells us that the body is a temple of
the Holy Spirit and that we should honor God with it (1
Corinthians 6:19-20). Knowing what these materials do to our
bodies—the harm they cause to minds—we know that by
viewing them we would be destroying the temple of the Holy
Spirit. That is certainly not honoring to God.
The Bible also tells us that we are to follow the authorities
that God Himself has put into place (Romans 13:1). Given the
illegal nature of pornography, by spreading them we are not
submitting to the authorities, but rather, rebelling against
them.
BSIT 1: Information Technology II 17
By using the principles we find in Scripture, Christians can
determine their course for any given situation. In some cases
it will be simple, like the rules for Christian living we find in
Colossians, chapter 3. In other cases, however, we need to
do a little digging. The absolute best way to do that is to pray
over God’s Word.
We need to rely on God. We must pray over His Word and
open ourselves to His Spirit. The Spirit will teach us and
guide us through the Bible to find the principle we need to
stand on so we may walk and live as a Christian should.
BSIT 1: Information Technology II 18
•Everyone should appreciate that God is the beginning of all wisdoms. Nothing comes to us without God’s knowledge.
•God gives you as much as you ask. Therefore ask for more insight in whatever you learn so that you can be blessed with much knowledge.
•Misuse of knowledge is abuse of God’s power -which not ethical in the Christian perspective.
•Christians should view database system as a tool to do God’s work, not for unGodly gains.
Remember:
Work hard; success is a ladder
you can not climb with your
hands in your pockets!
You are not running the race alone
otherwise you may crash
BSIT 1: Information Technology II 19
Remember
And lastly; obstacles don’t have to stop you. If you run
into a wall, don’t turn around and give up. Figure out how
to climb it, go through it or walk around it. You don’t
drown by falling in water. You drown by staying there. So
please be encouraged to press on no matter what, for you
know your goal. You may get weary, tired and knocked
out, but get back up again and determinedly move on for
what is ahead of you is surely a fortune. Let your friends
into your circle for they will or may provide the strength
needed for you to carry on.
All the best.
BSIT 1: Information Technology II 20
Course outline
This course will be administered in four main modules:
Module 1- Introduction
Information Revolution( A review on Information
Technology 1
Representing information in Bits
The need and basis for data protocols
Large Capacity Storage
BSIT 1: Information Technology II 21
Course outline
Module 2- Fundamentals of Spreadsheets(advanced
• Importing and Exporting Data, Import from other applications
• Create, using, editing Templates
• What is a workspace? Using , Saving a workspace
• Link workbooks
• Formatting Numbers, conditional formatting
• Auditing a Worksheet, Printing Workbooks
• Use the Report Manager
• Working with Named Ranges
• Using Macros
BSIT 1: Information Technology II 22
Course outline cont’d
Module 3- Graphics and visual information
From the real world to Images and Video
Computer Graphics and Virtual Reality
Module 4- Data compression
Compressing Information
Image Compression
Digital Video
BSIT 1: Information Technology II 23
Lecture 1
Module I- Introduction
• Information Revolution( A review on Information
Technology 1
• Representing information in Bits
• The need and basis for data protocols
• Large Capacity Storage
BSIT 1: Information Technology II 24
Module I: What is the Information in
the Information Revolution?
Objectives:
Definition and explanation of what information
is and the important distinction among the
terms information, message and signal
Components that make up an information
System and their arrangement
Distinctions between analog and digital
information and the rationale behind the quick
replacement of analog systems by digital
systems
BSIT 1: Information Technology II 25
In this module we will discuss what information is and the
systems that surround us that store, manipulate and
transmit this information. We will discuss some of the
different forms that information can take - forms that are
of much interest to artists, musicians, historians
architects, salespersons, managers and public officials as
they are to the scientists and engineers usually
associated with Information Technology.
Information- Knowledge communicated or received
concerning some fact or circumstance; news
The world is full of facts, some discovered, some
remaining to be discovered. When used in some way,
these facts become information.
BSIT 1: Information Technology II 26
Information, Messages and
Signals
Signal-This is actual entity (electrical, optical, mechanical etc)
that is transmitted from sender to receiver e.g. Human vocal
cords send out audible signals such as speech. Animals like
birds send out mating signals which are specific sound patterns
they create. Similarly human vocal cords send out audible
signals such as speech
Message- The knowledge that is transmitted e.g. in the case of
birds might be “Its mating season, I’m available”. Whereas the
signal is a specific sequence of sound waves, the message is
the meaning conveyed by that sequence.
Another example are the kingdom drums that were used to
communicate
BSIT 1: Information Technology II 27
Information
A message received and understood knowledge
acquired through study or experience or
instruction formal accusation of a crime data: a
collection of facts from which conclusions may
be drawn; "statistical data" (communication
theory) a numerical measure of the uncertainty
of an outcome; "the signal contained thousands
of bits of information"
BSIT 1: Information Technology II 28
Process of Information generation
Conversion
Manipulation Data
Storage
Capture
Transmission Information
Utilisation
BSIT 1: Information Technology II 29
Evolution
Oral
Paintings
Symbols
Writings
Printing
Non Electronic Computation
Telegraphy
Telephone
Radio
TV BSIT 1: Information Technology II 30
Forms of Data
Audio
Graphics
Text
Audio-Visual
Multimedia
BSIT 1: Information Technology II 31
Information Systems
Examples:
The phonograph
The telephone
The camera and other digital recording devices
Some Systems like the telephone System are
transitioning from analog electronics to
computer like electronics that are digital. (The
meaning of analog and digital will be described
in the subsequent sections)
BSIT 1: Information Technology II 32
Components of any
communications system
Generic Communication System
Input Transmitting Out put
Transmitter Receiver
Transducer Channel Transducer
Input Transducer: Device that converts a physical signal
from the source to an electrical, electromagnetic or
mechanical signal more suitable for communication
Transmitter: Device that sends that transduced signal
BSIT 1: Information Technology II 33
Transmission Channel: Physical medium on
which the signal is carried
Receiver: Device that recovers the transmitted
signal from the channel
Output Transducer: Device that converts the
received signal back into a useful physical
quantity
BSIT 1: Information Technology II 34
This type of representation is known as a block
diagram that provides a model for many
different communication systems and is a very
useful tool for representing complex systems.
Each block represents a subsystem which
performs some function: the specific function
determines the relationship between the signal
entering the block and the signal leaving the
block. (Signals are represented by arrows)
BSIT 1: Information Technology II 35
Representation and Quantifying
Information.
The fidelity and Information Content of Signals
Fidelity- A measure of the difference between the original and
reproduced forms of the information. E.g., does the received
voice sound the same as it would if the person were standing in
the room? Probably not. Is the person recognizable? Quite
possibly. Answering these questions may be quite different
from determining the information content of the message.
Starts with encoding ( Codes)
Characteristics of Codes
o Uniqueness
o Standardization
o Compatibility
BSIT 1: Information Technology II 36
Representation and Quantifying
Information.
NB: Faulting in any of the above leads to
Fidelity
The coding system determines the
Scheme
For example the message “You have passed”.
Most of the information content is contained in
the distinction between “passed” and “not
passed”. As long as you have received that
correctly, you do not care whether the
message was high fidelity or not.
BSIT 1: Information Technology II 37
Analog and Digital Information
Analog - Comes from the word analogy referring to the
relation that one thing has to another. It is used to refer to
the natural world where time is continuous and most
parameters like light and sound intensity, temperature,
position etc can vary smoothly and continuously over
some range, taking on an infinite number of possible
values.
On the other hand, there are some parameters that
change only in discrete steps e.g. days of the month,
games won or lost and the squares on a check board.
BSIT 1: Information Technology II 38
The term digital is used to refer to information
representation for which both time and the value
being measured move in discrete steps, that is when
there are a finite number of possible values.
Most modern communications and storage systems
are built around the digital computer. Most of the
information we deal with is analog, however it is
possible to convert back and forth between analog
and digital.
BSIT 1: Information Technology II 39
The Move toward digital
Information Technology
Classical information transmission and storage systems
developed over a period of decades or even longer. In
contrast, some new Information Systems have sprung up
and achieved widespread usage almost overnight. E.g.
the phonograph invented in 1877 by Thomas Edison
remained unchanged in principle until the CD was
introduced in 1983. The phonographs which had been
the sound recording norm for 100yrs essentially
disappeared. How did this happen? Such fundamental
changes happen as a result of two conditions:
BSIT 1: Information Technology II 40
1. The new System either enables some totally new
capacity or is much better than the one it replaces
2. The cost of the new system is reasonably low
compared to people’s willingness to pay.
The CD meets both criteria.
Quality of the reproduction (as well as convenience of
use) is better
Costs are low (manufacturing costs are very cheap)
Digital electronics integrate small mechanical
components making them cheap and that is why analog
systems that are large mechanical devices are tending
to digital.
BSIT 1: Information Technology II 41
All other types of Information Systems in use (telephone,
camera) have converted to and are in the process of
converting to digital versions. (Telephone-VOIP,
Cameras-Digital Cameras)
Digital information systems almost without exception have
proven to be more reliable and less expensive than the
analog systems they have replaced. This combination of
better performance and lower cost devices further
facilitated by the seemingly unending development of
faster smaller and cheaper digital electronics has
revolutionized the way in which we communicate and
manage information.
BSIT 1: Information Technology II 42
Module I questions:
Read about the following communication systems and
identify the five components shown in the block diagram
(Input transducer, transmitter, the transmission channel,
the receiver and the output transducer)
A doorbell
Telephone System
Cable TV
Broadcast Radio
For each of the above systems, identify the signal,
message and information that may be carried in the
message.
BSIT 1: Information Technology II 43
Module I questions:
List as many information systems as you
can that are found in your vicinity and
identify as best as you can whether
these systems are analog, digital or both.
Briefly explain the analog and or digital
aspects
BSIT 1: Information Technology II 44
Lecture 2
Fundamentals of Binary Representation
BSIT 1: Information Technology II 45
Fundamentals of Binary
Representation
Objectives:
The concept of a code for information
Binary numbering system and the means by
which all information can be represented by
codes containing only zeroes and ones
Representation of numeric and text data with
binary digits
Properties of signals that vary with time
Means by which errors in stored or transmitted
information may be detected and corrected
BSIT 1: Information Technology II 46
The only reason that we can use the internet as a conduit
for text, pictures, telephone conversations today and
some day our regular TV viewing is that we can convert
all these forms of information into the same form: Binary
bits.
By the end of this module, you should have an
understanding of how and why we use binary digits
(binary digits)
its to represent information regardless of its
original form. You should also have a grasp on the idea of
protocols and become familiar with the details of a few
simple binary protocols.
You will also become familiar with some of the terms and
quantities used to refer to binary information.
BSIT 1: Information Technology II 47
Information and its
Representation
Can be traced back from cave drawings and stone
tablets, through scrolls and Gutenberg's revolutionary
printing press into our current age of electronic
Information Technology.
Before storing, manipulating or transmitting information
we must first capture it and convert it into some
representation that will facilitate our tasks.
Useful information and interesting data however appears
to us in many different forms.
• Numeric
• Voice messages
• Pieces of Music
• Photographs
• Video
BSIT 1: Information Technology II 48
To carry out the above mentioned tasks
(storing, manipulating or transmitting ) we
require a process of encoding the information.
The result of encoding will be a pattern or code
representing the original information. We also
require a process of decoding to convert the
information back into its original form.
The encoding and decoding processes should
be unique, each code must represent one
thing so that information can be represented
unambiguously and recreated correctly.
BSIT 1: Information Technology II 49
Whatever form we convert our information into
must be well suited to the development of
inexpensive and reliable equipment for
handling it.
The technique for representing information
must have the following requirements:
• Unique- Uniquely represent information to recreate it
in its original form.
• Standardized so that it can be used for many different
applications
• Compatible with inexpensive and reliable technology
for handling information
BSIT 1: Information Technology II 50
The search for and appropriate
code - Why binary Code?
In our search for an appropriate code for
representing information, we will start by
restricting ourselves to codes with a finite
number of elements called an alphabet.
Such codes have a limited number of different
symbols that can be used to represent
information. This as we will see, leads to
reliable means for storage and transmission.
But how many different symbols should the
code have? We can gain some insight by
looking at some familiar codes.
BSIT 1: Information Technology II 51
A look at written alphabets
The alphabet used for the English language is
commonly thought to contain about 96
elements (26 lower case characters, 26 upper
case characters, 10 numbers and 32 special
characters such as space, the dollar sign-$,
the ampersand-& etc)
We use this code daily to represent information
for storage in books, and other documents;
and transmission in form of letters and e-mail.
BSIT 1: Information Technology II 52
A more complex code is that used by the Chinese
that has a total of as many as 40,000 characters.
One complex character can convey an entire concept
to the skilled reader. Because there are many
different symbols, each one conveys much
information, therefore fewer characters are needed to
communicate a set of ideas than if we were to use
the letters of written English.
BSIT 1: Information Technology II 53
This form of Chinese is thought of as one of
the most difficult languages. There are so
many characters, some quite similar to others,
the task of distinguishing one from another is
very challenging. On the other hand it is a
relatively simple task to distinguish the few
symbols of the English language from each
other, making them less likely to cause
misinterpretation.
BSIT 1: Information Technology II 54
The Need for a Robust Scheme
We must consider the question of which is more
important:
• That each symbol of code conveys a lot of information or
that
• We should be able to readily distinguish the symbols from
each other
Remember an information code must be unique,
compatible and standardized.
Reliable manipulation of information depends upon
tolerance to errors. Because we must encode, store,
manipulate, transmit and decode information using real
equipment operating in the physical world, we will be
subject to the laws of nature. Our equipment will not
operate perfectly and will be subject to unpredictable
disturbances.
BSIT 1: Information Technology II 55
The code therefore must represent information in a way
that is robust or tolerant to errors or error resistant and in
an unambiguous fashion. For this to take root, it would
appear that we want as few different symbols as possible.
Remember the fewer symbols the code has, the easier it
is to distinguish these symbols from each other and the
more robust the code will be.
A code with just one symbol however would convey no
useful information; only one character would be available
and there would be no unique way to encode and decode
information using this code.
BSIT 1: Information Technology II 56
A code with just two symbols called binary
code might at first seem to be almost as
useless. Certainly it should be a simple task to
distinguish between only 2 characters; but it
would seem as if each symbol would not be
able to convey much information.
What good is a code that can only convey one
of two symbols at any time?? The answer to
this question will more or less extended over
the rest of what we shall cover.
BSIT 1: Information Technology II 57
Bits as Building Blocks of
Information
Binary code uses the first two integers 0 and 1.
Another way of representing these is by “T” &
“F” short for “True” and “False” respectively.
Because these are binary digits,
its (that can only
take on one of two values), they are known as
bits.
What happens when we begin to string
together collections of these bits into longer
structures or words?
BSIT 1: Information Technology II 58
A two bit word can be arranged in four patterns.
00, 01,10,11
We could therefore (by prior agreement between the
transmitter and receiver) use a pattern of two bits to
represent any one of the four directions.
00-North
01-South
10-East
11-West
We could transmit the bit pattern “10” to represent the
direction “East” if we wanted to send someone into that
direction.
BSIT 1: Information Technology II 59
Note that the recipient of this message would need
to know how the message was encoded so that it
could be decoded from “10” to “East”.
Adding a third bit increases the representational
power to eight patterns
000 100
001 101
010 110
011 111
BSIT 1: Information Technology II 60
Every time we add a bit, we double the number of
possible combinations and so we double the number of
different things these multi-bit codes or code words could
be used to represent. This can be seen from the fact that
each existing codeword can be changed into two new
code words by adding another bit. Either a 0 or a 1 to the
end of it.
In how many patterns can 4 bits be assembled?
• Answer:
• 2*2*2*2=16
In how many patterns can 8 bits be assembled?
BSIT 1: Information Technology II 61
In general, given n bits in a code word; there are 2n different
code words which can represent one of 2n different messages.
Convert these decimal integers to binary:
• 16
• 56
• 100
From binary convert these back to decimal
Convert the following binary numbers to decimal.
• 1011
• 1001001
• 100
BSIT 1: Information Technology II 62
BCD Representation
An alternative representation of integers is simply to
represent the individual numbers that comprise them. For
example the number 218 can be represented as three
numerals.
2 representing 200
1 representing 10
8 representing 8
218 can then be converted to binary form by converting
each of the numerals, one at a time into binary code.
This scheme is referred to as the binary coded decimal
form (BCD).
BSIT 1: Information Technology II 63
BCD Representation
In computing and electronic systems, binary-
coded decimal (BCD) (sometimes called
natural binary-coded decimal, NBCD) is an
encoding for decimal numbers in which each
digit is represented by its own binary
sequence. Its main virtue is that it allows easy
conversion to decimal digits for printing or
display, and allows faster decimal calculations.
BSIT 1: Information Technology II 64
BCD Representation
Its drawbacks are a small increase in the
complexity of circuits needed to implement
mathematical operations. Uncompressed BCD is
also a relatively inefficient encoding—it occupies
more space than a purely binary representation.
In BCD, a digit is usually represented by four bits
which, in general, represent the
values/digits/characters 0–9. Other bit
combinations are sometimes used for a sign or
other indications.
BSIT 1: Information Technology II 65
BCD codes commonly used to represent
numerals:
Numeral BCD Representation ►We can represent any
0 0000 integer by a string of
1 0001 binary digits. E.g..
2 0010
3 0011 ► We can represent 328
as:
4 0100
5 0101 0011 0010 1000
6 0110
7 0111 ► Space is inserted for
8 1000 convenience
9 1001
BSIT 1: Information Technology II 66
Lecture 3
Representing Text with Bits
BSIT 1: Information Technology II 67
Representing Text with Bits
In the previous slides, we saw how binary codes can be used to
represent the numerals 0-9. A similar approach called ASCII
(Pronounced “ask-key” ) is commonly employed to represent
text.
ASCII is an acronym for American Standard Code for Information
Interchange.
It is used to encode text and in particular is useful for
representing information which is entered via a computer
keyboard. Therefore ASCII must be able to represent:
• Numerals
• Letters in both upper and lower case
• Special printing symbols like @, $, *, &, %, (, ) etc
• And commands that are commonly used by computers to represent
carriage returns, line feeds and other text-formatting directives.
BSIT 1: Information Technology II 68
Representing Text with Bits
The commands being talked about here are referred to a
control characters, that can be generated from a
keyboard by invoking functions like “backspace”, or
“enter” or they can be created by special-purpose keys,
such as “control”, “escape”, or numbered “function” keys.
The need for a code to represent all of these
components of text motivated the development of ASCII
and other similar codes.
When this code was developed, a decision was made
that 128 different characters would suffice for
representation of text (27=128), meaning that each text
character or command is represented by a 7-bit word.
BSIT 1: Information Technology II 69
E.g.; the following piece of text consists of 16 letters,
three spaces and an exclamation mark.
You are good students!
1011001 1101111 1110101 0100000 1100001 1110010
1100101 0100000 1100111 1101111 1101111 1100100
0100000 1110011 1110100 1110101 1100100 1100101
1101110 1110100 1110011 0100001
How would this text be represented in ASCII code? (Refer
to the list appended to this set of notes)
You & I,
BSIT 1: Information Technology II 70
Convenient Forms for Binary
Codes
For binary words - strings of ones and zeroes - often used to
represent numbers, text characters and other quantities; to be
conveniently and efficiently stored and manipulated by computers,
they a typically used in sizes of 8, 16, 32 and 64 bits long.
Bits, bytes and Beyond.
Because the above sizes are all multiples of 8, a binary word of 8
bits,
bits known as a byte is a convenient measure of a binary word
size in a computer. The amount of memory space-the number of
binary digits that a computer can store is measured in bytes, each
of which in turn represents 8 bits of storage. Because the
architecture of computers makes it more practical for memory and
other forms of information storage to be in sizes that are powers of
2, it is common to encounter memory sizes such as “64KB” and
“8MB”.
BSIT 1: Information Technology II 71
Octal and Hexadecimal
Representation
Octal (Base eight system)
Uses 8 numerals: 0-7
The first 20 numbers in this system are:
0,1,2,3,4,5,6,7,10,11,12,13,14,15,16,17,20,21,22,23
From 23, What are the next 10 numbers in this system?
Each number can only take on one of 8 values and
because 8 is a power of two (23), we can use and octal
numeral to represent a grouping of bits. Specifically we
can use an octal numeral to represent 3 bits:
BSIT 1: Information Technology II 72
Because there are 8 numerals
and also 8 Patterns that can
be formed by three bits, we
Octal Numeral Bit Pattern can use this table to
•0 000 represent groups of three bits
by a single octal numeral.
•1 001 Thus if the following 12-bit
•2 010 pattern is stored in a
computers memory:
•3 011
•4 100 0101100111012 (base two)-binary
•5 101
•6 110
We can represent these bits
in octal form as
•7 111
26358 (base eight) - Octal
BSIT 1: Information Technology II 73
Octal and Hexadecimal
Representation
Hexadecimal (Base sixteen system )
“Hex”-Uses 16 numerals
But how? There are only 10 Arabic numerals?
The letters A through F are used to fill out a set of 16
different numerals i.e.:
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
The first 20 numbers are therefore:
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F,10,11,12,13
BSIT 1: Information Technology II 74
Because each numeral can take one of 16
values and because 16 is also a power of 2
(24), we can use a hex numeral to represent a
grouping of four bits.
The table in the next slide shows the possible
4-bit patterns, along with their decimal, octal
and hexadecimal representations.
BSIT 1: Information Technology II 75
Decimal Octal Hex Numeral Bit Pattern
• 0 0 0 0000
• 1 1 1 0001
• 2 2 2 0010
• 3 3 3 0011
• 4 4 4 0100 There are 16 hex
• 5 5 5 0101 numerals and
• 6 6 6 0110 also 16 patterns
• 7 7 7 0111 that can be
• 8 10 8 1000 formed from four
• 9 11 9 1001 bits.
• 10 12 A 1010
• 11 13 B 1011
• 12 14 C 1100
• 13 15 D 1101
• 14 16 E 1110
• 15 17 F 1111
BSIT 1: Information Technology II 76
Introduction to Error Detection
and Correction
Information once in binary form can be stored, transmitted
and retrieved with a great degree of convenience and
reliability. However in any physical situation it is inevitable
that problems might occur. In particular when binary
information is sent across some physical channel- wires,
coaxial cable, optical fiber or the airwaves; there always
exists the possibility that some bits will be received in
error due to interference and other unpredictable events.
Binary representation of information makes it possible to
perform coding of information to ensure reliable
performance.
BSIT 1: Information Technology II 77
Error Detection Methods
The only way to do error detection and correction
is to send extra data with each message
Two common error detection methods:
• Parity checking
• Simple parity
• Longitudinal parity or Longitudinal Redundancy Check (LRC)
• Polynomial Checking
• Cyclic Redundancy Checksum (CRC)-Read more on this
Coding involves changing the original information (pattern of
bits) into a new encoded pattern that is usually longer but in
some way more desirable.
Decoding involves recreating the original pattern.
One important function of coding is to enable the detection (and
often correction) of errors that can occur in data transmission
across a noisy channel.
This ability to detect and correct errors is one of the primary
advantages of using digital transmission instead of analog.
A fundamental aspect of error control coding is redundancy.
We may not want our information to have redundant
information as this will consequently result in longer messages
and a waste of transmission or storage resources.
BSIT 1: Information Technology II 79
However extra bits that are added to the transmitted
data that repeat some of the previous information can be
of importance in a way that this repetition helps the
receiver detect errors
If an error is detected, the receiver can either request
that the data be retransmitted or can possibly even
correct the data itself.
Error detection is the ability to detect the presence of
errors caused by noise or other impairments during
transmission from the transmitter to the receiver
BSIT 1: Information Technology II 80
8 bits including parity
7 bits of data
(number of 1s)
even odd
0000000 (0) 00000000 10000000
1010001 (3) 11010001 01010001
1101001 (4) 01101001 11101001
1111111 (7) 11111111 01111111
BSIT 1: Information Technology II 81
Even Parity Example
Transmitted Transmitted Transmitted Received Received Do We
Character Information Parity Information Parity Detect an
error?
H 1001000 0 1000000 0 Yes
e 1100101 0 1100101 0 No
l 1101100 0 1101100 0 No
p 1110000 1 1110000 1 No
BSIT 1: Information Technology II 82
Simple Parity
The number of ones in each data block is counted and a
zero or one is appended to that block to make the total
number of ones even (for even parity)
parity or odd (for odd
parity).
By adding this additional bit (called a parity bit), we are
ensuring that every block or coded word leaving the
transmitter is known to have an even number of ones if
even parity coding is used, or an odd number if odd
parity coding us used.
If the number of ones does not match the parity (when
the system is using even parity and a codeword with an
odd number of ones is received), then we know that an
error has occurred.
BSIT 1: Information Technology II 83
Simple Parity
Analyze the table in slide 78. Because of a noisy
channel one character was impaired and hence that
one bit is misinterpreted by the receiver. This
message will therefore be decoded as “@elp”. (@
representing a received bit instead of H
-misinterpretation). In this case, if the information
includes a parity bit, the receiver can detect that the
message contains an error and request a
transmission.
What limitations can you deduce from this scheme?
BSIT 1: Information Technology II 84
Simple Parity
What if the transmitted information was 1001000 and that
received is 1111000?
The parity received will be correct but the bit sequence is
wrong!
If you carefully note, the scheme does not detect which
actual bit has an error
So can we do better than this?
Certainly; in fact, just about every system that uses digital
information employs a coding technique for detecting and
correcting errors that is more complex and performs
much better than the simple parity example we have
seen.
BSIT 1: Information Technology II 85
Simple Parity
As a good example, the information contained on a CD is
carefully encoded to allow the CD player to detect and
correct errors that can occur during playback due to
smudged or scratched discs or misalignment of the
playback mechanism.
These high performance methods for error coding are
based on more sophisticated approaches involving
mathematical theories developed in support of
information theory. These techniques all rely on the
fundamental idea of adding structured redundancy to
information before it is stored of transmitted.
BSIT 1: Information Technology II 86
Simple Parity
This redundancy greatly improves the reliability of digital
information systems by allowing the detection and
correction of errors. The more error-resistant we want our
systems to be, the more redundancy we should add,
while keeping in mind that this redundancy reduces the
rate at which we are transmitting or storing actual
information.
The tradeoff between error detection and correction
capability and the desire to store or transmit as few bits
as possible is one of the key areas of current research in
data communication and must be carefully considered by
system designers in light of the requirements of the
systems they are designing.
BSIT 1: Information Technology II 87
Simple Parity
Occasionally known as vertical redundancy check
Add an additional bit to a string of bits:
• Even parity
• The 0 or 1 added to the string produces an even number of 1s
(including the parity bit)
• Odd parity
• The 0 or 1 added … an odd number of 1s (including the parity bit)
1 Even parity
0 1 0 1 0 1 0
0 Odd parity
Example
Letter 7-bit ASCII Parity bit
D 1 0 0 0 1 0 0 1
A 1 0 0 0 0 0 1 1
T 1 0 1 0 1 0 0 0
A 1 0 0 0 0 0 1 1
Even Parity or Odd Parity?
Parity Examples - Using
Even Parity
Even Parity of 1’s LRC/VRC
Data VRC
1 0 0 1 1 1 0 0
Data Parity 0 0 1 1 1 0 0 1
1 1 1 0 1 1 1 0
1 0 0 1 1 1 0 0 1 1 1 0 1 1 1 0
0 0 1 1 1 0 0 1
0 0 1 1 1 0 0 1
0 0 1 0 1 0 1 1
1 1 1 0 1 1 1 0 0 0 1 1 1 0 0 1
1 0 0 0 1 1 1 0 LRC
90
Reliability/Efficiency
What happens if the character 10010101 is sent and
the first two 0s accidentally become two 1s?
Thus, the following character is received: 11110101.
Will there be a parity error?
Problem: Simple parity only detects odd numbers of
bits in error
• Isolated single-bit errors occur 50-60% of the time
• Error bursts occur 10-20% of the time
Efficiency: 1:7 (parity:data) w/ mediocre error-
detection
Longitudinal Parity
Sometimes called LRC or Horizontal Parity
Add Block Check Character (BCC) after a block
of characters:
• Perform simple parity checking on each row of bits
• Then create a row of parity bits, or a BCC: each parity bit in this
last row is a parity check for all the bits in the column
0 1 0 1 0 1 0 1
1 0 0 1 1 1 0 0
BCC 1 1 0 0 1 0 0 1
Even Parity or Odd Parity?
Example
Letter 7-bit ASCII Parity bit
D 1 0 0 0 1 0 0 1
A 1 0 0 0 0 0 1 1
T 1 0 1 0 1 0 0 0
A 1 0 0 0 0 0 1 1
BCC 1 1 0 1 1 1 1 1
Even Parity or Odd Parity?
Reliability/Efficiency
Longitudinal parity is better at catching errors
• But requires too many check bits added to a block of data
But still…
Efficiency: (n+8) : 7n (check bits: data) w/ a little bit better than mediocre
error-detection
We need a better error detection method
Polynomial Checking
Adds a character to the end of the data based on a
mathematical algorithm:
• Checksum
• E.g., Sum the data values and divide the sum by 255. The remainder is
the checksum
D 68
A 65 282
= 1 remainder 27
T 84 255
A 65
Checksum 0 0 1 1 0 1 1 1
27
Cyclical Redundancy Check (CRC)
CRC error detection method treats packet of data to be transmitted as
a large polynomial
Transmitter
• Using polynomial arithmetic, divides polynomial by a given
generating polynomial
Quotient is discarded
• Remainder is “attached” to the end of data
Data (with the remainder) is transmitted to the receiver
Receiver divides the (data – remainder) by the same generating
polynomial
If a remainder of zero results no error during transmission
If a remainder not equal to zero results error during transmission
Example: CRC
7 6 5 4 3 2 1 0
0 0 1 1 0 1 1 1
Message polynomial
x5+x4+x2+x1+x0 x5+x4+x2+x+1
Generating polynomial
ATM CRC x8 + x2 + x + 1
CRC-16 x16 + x15 + x2 + 1
Error Control
Once an error is detected, the receiver can:
1. Do nothing
Some newer systems such as frame relay perform this type
of error control
2. Return an error message to the transmitter
Stop-and-wait ARQ (Automatic Repeat reQuest)
Go-back-N ARQ
Selective-reject ARQ
3. Fix the error with no further help from the transmitter
Stop-and-wait ARQ
A transmitter sends
a frame then stops
and waits for an
acknowledgment
If a positive
acknowledgment
(ACK) is received,
the next frame is
sent
If a negative
Sliding Window Protocol
Go-back-N ARQ and Selective-reject are more efficient
protocols
• They assume that multiple frames are in transmission at one time
(sliding window)
A sliding window protocol allows transmitter to send up to
the window size frames before receiving any
acknowledgments
When a receiver does acknowledge receipt, the returned
pack contains the number of the frame expected next
Example of Sliding Window
RR: Receive Ready
Go back-N ARQ
If a frame arrives in error, the
receiver can ask transmitter to
go back to the Nth frame, after
Nth frame is retransmitted,
sender resends all subsequent
frames
Selective-reject ARQ
Most efficient error
control protocol
If a frame is received in
error, the receiver asks
transmitter to resend
ONLY the frame that
was in error
Subsequent frames
following the Nth frame
are not retransmitted
Correct the Error
For a receiver to correct the error with no further help
from the transmitter requires a large amount of
redundant information accompanying original data
This redundant information allows the receiver to
determine the error and make corrections
This type of error control is often called
Forward Error Correction