CNIT 176 LAB 3 - Data representation

pdf

School

Purdue University *

*We aren’t endorsed by this school

Course

176

Subject

Computer Science

Date

Feb 20, 2024

Type

pdf

Pages

2

Uploaded by HighnessPartridge943

Report
CNIT 17600 - Intro Computer Architecture - Data Format Lab Data Format Lab a. Decode the following binary code in the Taronite’s alphabet to determine the message that was sent. 00100,10101,01101,11111011,00001,11001,11111110,01110,00010,10101 b. This code does not delimit between characters. On Earth, we use different delimiters such as commas in comma separated values (CSV) files, or spaces in between words. How does the Bobatea code get delimited in the absence of these special characters? In other words, how do you (or a computer) know when one-character ends and the code for the next character begins? - A computer utilizes the encoding scheme given for the text to determine where one- character stops and the next character begins while reading a series of characters. c. Imagine that the code above was the intended message, but the code below is sent instead: 0100,10101,01101,11111011,00001,11101,11111110,01110,00010,10101. Notice that the first bit has been dropped, and another bit in the message has been flipped. Attempt to decode the message given this binary code. Be sure to show the result of your attempt to decode. Consider how to represent a decoding failure. - The decoding failure is represented by missing alphabets. d. In human computing systems, we have methods for determining that a message is missing necessary information. These include adding a bit (called a parity bit) to the end of a message or character to show whether the sum of the other bits is even or odd; by finding a sum of all the characters (called a checksum); or methods that involve division of binary numbers (CRC). Based on what you know about the Taronite encoding, suggest a method for determining that there is an error in a Taronite message, such with the message in part c. Be sure that your potential error decoding method works in more than one case. - Use of a checksum in the Taronite encoding is one potential way to find message problems. A checksum is a number that is added at the end of a message and is calculated depending on its contents. When the message is received, the receiver can compute its checksum and contrast it with the checksum that was attached to the message. The message was most likely sent properly if the checksums match. The receiver can ask the sender to resend the message if the checksums do not match, which indicates that there was probably a transmission issue. - Using a redundancy check, such as a cyclic redundancy check, is another way to find flaws in the Taronite encoding (CRC). A CRC is a number that is computed using a predetermined polynomial and the contents of a communication. The receiver computes the same CRC on the message it has received and compares it to the CRC it has sent. It
is probable that the message was sent successfully if the CRC values match. If the CRC values do not line up, a transmission error most likely took place. Submission: I cropped and copied the alphabets and pasted them on the document as I decoded.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help