SlideShare a Scribd company logo
1 of 8
Download to read offline
 Paper Name : Computer Network
 Paper Code : OE-EE 702C
 Student Name : AASHISH AGARWAL
 University Roll No. : 13001620124
 Semester : Seventh
 Department : Electrical ( EE-C )
Registration No. : 201300101610050 of 2020-21
.
DATA : collection of discrete or continuous values that convey information, describing the quantity,
quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be
further interpreted formally.
Data Representation refers to the form in which data is stored, processed, and transmitted.
Forms of data representation :
 Numbers
 Text
 Images
 Audio
 Video
All data inside a computer is transmitted as a series of electrical signals that are either on or off. To
process any data, including text, images and sound, they must be converted into binary form.
 If the data is not converted into binary, the computer will simply not understand it or be able to
process it.
.
TO UNDERSTAND HOW DATA IS REPRESENTED IN
COMPUTER NETWORKS AND RELATED DEVICES.
TO LEARN THE NUMBER AND TEXT DATA
CONVERSION INTO THE MACHINE LEVEL LANGUAGE.
TO GET IN DEPTH KNOWLEDGE OF THE VARIOUS
SYSTEMS USED FOR THE DATA REPRESENTATION AND
HOW IS SIZE OF A FILE ESTIMATED IN A DEVICE.
.
Represented by bit patterns.
 Directly converted into binary representation to specify
mathematical operations.
 The 0s and 1s used to represent digital data.
 Number system normally used by human is in base 10.
Number File Formats –
Integer, Fixed point, Date, Boolean, Decimal, etc.
Example :
.
.
 Represented as bit pattern or sequence of bits (such as 0001 0111).
Various types of bits assigned to represent text symbols.
ASCII code : each number represents a character to be used to convert text into binary. It
takes each character on the keyboard and assigns it a binary number.
 ASCII code covers special characters including punctuation, the return key and
control characters as well as the number keys, capital letters and lower case letters.
ASCII code can only store 128 characters, enough for most words in English.
 Text File Formats –
.doc,.docx, .pdf, .rtf, .txt, etc.
 Example :
the letter ‘B’ has the binary number 0100 0010
Character Character code
in denary
Character code
in binary
a 97 0110 0001
b 98 0110 0010
c 99 0110 0011
.
Characters are as follows :
• Letters ( upper and lower case letters have separate codes )
• Punctuation ( ?/|£$ )
• Numbers ( 0–9 )
• Non-printing commands ( Enter, Delete, F1 )
ASCII : 'American Standard Code for Information Interchange’, started by using 7 bits to represent
characters, which allowed for a maximum of 128 characters to be represented.
. 6
Widespread use of the www made it more important to have a universal
international coding system, as the range of platforms and programs has
increased dramatically,with more developers from around the world using a
much wider range of characters.
The character set, Unicode can be encoded on a computer with three
different encoding standards – UTF-8, UTF-16, UTF-32
.
 In ASCII, each character uses 8 bits of storage equivalent to 1 byte.When
calculating the file size of a text file that uses ASCII, we have to find the total
number of characters and multiply it by 1 byte.
 Example :
A text file contains
 Thus, to conclude, we can say that understanding the number and text
conversion to data representation is a vital aspect in order to communicate
with computer and other networking devices.
Number of
characters
File size in bits File size in
bytes
1 8 bits 1 byte
20 20 × 8 = 160 bits 20 × 1 byte
= 20 bytes
.
https://www.geeksforgeeks.org
https://www.bbc.co.uk/bitesize/guides
https://www.geeksforgeeks.org/
https://en.wikipedia.org/
Data Communications and Networking – A. Forouzan,TMH 2004
Images and other related content from google.com

More Related Content

Similar to Computer Network Data Representation

Data-Communication-Concept, DCE and DTE
Data-Communication-Concept,  DCE and DTEData-Communication-Concept,  DCE and DTE
Data-Communication-Concept, DCE and DTEmysthicrious
 
Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals SamiHsDU
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Computer data representation (integers, floating-point numbers, text, images,...
Computer data representation (integers, floating-point numbers, text, images,...Computer data representation (integers, floating-point numbers, text, images,...
Computer data representation (integers, floating-point numbers, text, images,...ArtemKovera
 
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJChapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJIMPERIALXGAMING
 
TLE – ICT 8 Digital Mensuration II.pptx
TLE – ICT 8 Digital Mensuration II.pptxTLE – ICT 8 Digital Mensuration II.pptx
TLE – ICT 8 Digital Mensuration II.pptxjudechristopher3
 
Organising- Power Point
Organising- Power PointOrganising- Power Point
Organising- Power Pointwalnut25
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardwarefiza1975
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxBhawaniShankarSahu1
 
What the f*ck is the internet? - vol. 1
What the f*ck is the internet? - vol. 1What the f*ck is the internet? - vol. 1
What the f*ck is the internet? - vol. 1Alex Viana
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersGufranAhmadJU
 

Similar to Computer Network Data Representation (20)

Uncdtalk
UncdtalkUncdtalk
Uncdtalk
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Data-Communication-Concept, DCE and DTE
Data-Communication-Concept,  DCE and DTEData-Communication-Concept,  DCE and DTE
Data-Communication-Concept, DCE and DTE
 
Unicode Fundamentals
Unicode Fundamentals Unicode Fundamentals
Unicode Fundamentals
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
La2 computer systems
La2 computer systemsLa2 computer systems
La2 computer systems
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
Computer data representation (integers, floating-point numbers, text, images,...
Computer data representation (integers, floating-point numbers, text, images,...Computer data representation (integers, floating-point numbers, text, images,...
Computer data representation (integers, floating-point numbers, text, images,...
 
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJChapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
 
TLE – ICT 8 Digital Mensuration II.pptx
TLE – ICT 8 Digital Mensuration II.pptxTLE – ICT 8 Digital Mensuration II.pptx
TLE – ICT 8 Digital Mensuration II.pptx
 
Organising- Power Point
Organising- Power PointOrganising- Power Point
Organising- Power Point
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardware
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
 
Strings and encodings
Strings and encodingsStrings and encodings
Strings and encodings
 
What the f*ck is the internet? - vol. 1
What the f*ck is the internet? - vol. 1What the f*ck is the internet? - vol. 1
What the f*ck is the internet? - vol. 1
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Introduction to-computers
Introduction to-computersIntroduction to-computers
Introduction to-computers
 
Understanding Computers - Introduction to Computers
Understanding Computers - Introduction to ComputersUnderstanding Computers - Introduction to Computers
Understanding Computers - Introduction to Computers
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Computer Network Data Representation

  • 1.  Paper Name : Computer Network  Paper Code : OE-EE 702C  Student Name : AASHISH AGARWAL  University Roll No. : 13001620124  Semester : Seventh  Department : Electrical ( EE-C ) Registration No. : 201300101610050 of 2020-21
  • 2. . DATA : collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted formally. Data Representation refers to the form in which data is stored, processed, and transmitted. Forms of data representation :  Numbers  Text  Images  Audio  Video All data inside a computer is transmitted as a series of electrical signals that are either on or off. To process any data, including text, images and sound, they must be converted into binary form.  If the data is not converted into binary, the computer will simply not understand it or be able to process it.
  • 3. . TO UNDERSTAND HOW DATA IS REPRESENTED IN COMPUTER NETWORKS AND RELATED DEVICES. TO LEARN THE NUMBER AND TEXT DATA CONVERSION INTO THE MACHINE LEVEL LANGUAGE. TO GET IN DEPTH KNOWLEDGE OF THE VARIOUS SYSTEMS USED FOR THE DATA REPRESENTATION AND HOW IS SIZE OF A FILE ESTIMATED IN A DEVICE.
  • 4. . Represented by bit patterns.  Directly converted into binary representation to specify mathematical operations.  The 0s and 1s used to represent digital data.  Number system normally used by human is in base 10. Number File Formats – Integer, Fixed point, Date, Boolean, Decimal, etc. Example :
  • 5. . .  Represented as bit pattern or sequence of bits (such as 0001 0111). Various types of bits assigned to represent text symbols. ASCII code : each number represents a character to be used to convert text into binary. It takes each character on the keyboard and assigns it a binary number.  ASCII code covers special characters including punctuation, the return key and control characters as well as the number keys, capital letters and lower case letters. ASCII code can only store 128 characters, enough for most words in English.  Text File Formats – .doc,.docx, .pdf, .rtf, .txt, etc.  Example : the letter ‘B’ has the binary number 0100 0010 Character Character code in denary Character code in binary a 97 0110 0001 b 98 0110 0010 c 99 0110 0011
  • 6. . Characters are as follows : • Letters ( upper and lower case letters have separate codes ) • Punctuation ( ?/|£$ ) • Numbers ( 0–9 ) • Non-printing commands ( Enter, Delete, F1 ) ASCII : 'American Standard Code for Information Interchange’, started by using 7 bits to represent characters, which allowed for a maximum of 128 characters to be represented. . 6 Widespread use of the www made it more important to have a universal international coding system, as the range of platforms and programs has increased dramatically,with more developers from around the world using a much wider range of characters. The character set, Unicode can be encoded on a computer with three different encoding standards – UTF-8, UTF-16, UTF-32
  • 7. .  In ASCII, each character uses 8 bits of storage equivalent to 1 byte.When calculating the file size of a text file that uses ASCII, we have to find the total number of characters and multiply it by 1 byte.  Example : A text file contains  Thus, to conclude, we can say that understanding the number and text conversion to data representation is a vital aspect in order to communicate with computer and other networking devices. Number of characters File size in bits File size in bytes 1 8 bits 1 byte 20 20 × 8 = 160 bits 20 × 1 byte = 20 bytes