Comprehensive Guide to Data Handling, Transfer Methods, and Network Communication
Data compression reduces file size by re-encoding data to use fewer bits. The primary goals are to save storage space and reduce transmission time.
Definition: Reduces file size WITHOUT losing any original data
Key Principle: Eliminates statistical redundancy
Perfect Reconstruction: Original data can be fully restored
Compression Ratio: Typically 2:1 to 3:1
Use Cases: Text files, program code, databases, ZIP files, PNG images
Definition: Permanently discards some data to achieve higher compression
Key Principle: Removes perceptually less important information
Approximate Reconstruction: Output is similar but not identical to input
Compression Ratio: 10:1 to 100:1+
Use Cases: Photos, music, video streaming, web media
| Aspect | Lossless | Lossy |
|---|---|---|
| Data Integrity | Perfect | Imperfect |
| File Size Reduction | Moderate | Significant |
| Reversibility | Fully reversible | Not reversible |
| Quality | No loss | Quality degradation |
| Best For | Text, code, archives | Media files |
Data transmission involves sending digital data from one device to another over communication channels.
Bits sent one after another on a single channel
Examples: USB, Ethernet, SATA
Multiple bits sent simultaneously on multiple channels
Examples: Internal computer buses, printer ports
One-direction only
Example: Keyboard to computer, printer
Both directions, but not simultaneously
Example: Walkie-talkies
Both directions simultaneously
Example: Telephone, broadband internet
Type: Serial, both half/full-duplex
Packet switching is a method of grouping data that is transmitted over a digital network into packets.
A data packet consists of three main parts:
Original Data → Split into Packets → Individual Routing → Reassembly → Original Data
↓
Different paths possible
↓
Routers direct each packet
Odd/even bit counting to detect errors
Algorithmic value verification
Data sent back for comparison
ACK for successful reception
NACK for error detection
Resend if no response
Single key for encryption/decryption
Public/private key pairs