Example on hamming error correcting code, Computer Engineering

Assignment Help:

Q. Example on hamming error correcting code?

For illustration a 4-bit matching word can stand for 24=16 values that range from 0 to 15 as:

0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111

1000, 1001, 1010, 1011, 1100, 1101, 1110, 1111

Value 0000 or 0 represent no error while other values that are 2i-1 (for 4 bits 24- 1=15 which is from 1 to 15) signify an error condition. Every one of these 2i - 1(or 15 for 4 bits) values can be used to signify an error of an individual bit. Because error can take place at the time of transmission of 'N' bit data and 'i' bit error correction code hence we need to have as a minimum 'N+i' error values to signify them. Thus number of error correction bits must be found from subsequent equation:

2i - 1     >= N+i

If we are presuming 8-bit word then we need to have

2i - 1     >= 8+i

Say at

i=3                     LHS = 23 -1 = 7; RHS = 8+3 = 11 

           i=4                      2i-1 = 24 - 1 = 15; RHS = 8+4 = 12  

Thus for an eight-bit word we need to have as a minimum four-bit error correction code for detecting and correcting errors in a single bit at the time of transmission.

In the same way for 16 bit word we require i = 5

25 -1 = 31 and 16+i = 16+5 = 21

For 16-bit word we require five error correcting bits.

Let's explain this with help of an illustration:

Let's presume 4 bit data as 1010

The logic is displayed in subsequent table:

Source:

This complete information that is (data and P1

1665_Example on hamming error correcting code.png

to P4) is transmitted.  

Presuming one bit error in data.

1140_Example on hamming error correcting code1.png

So  P1  - D1, P3 - D3, P4  -D4 pair are different so, as per Figure b1 is in error, so correct it by completing b1 to get correct data 1010.

Case 2:   Data Received as 1000  (Error in b2)

So   P1 - D1, P2 - D2,   P4 - D4 pair are different so as per figure bit b2 is in error.  So correct it by complementing it to get correct data 1010.

727_Example on hamming error correcting code2.png

Case 3:  

Now let's take a case when data received is correct however on receipt one of parity bit let's say P4 become 0.  Please note in this matter because data is 1010 destination parity bits would be D1=0, D2=1, D3=0, D4=1.  So P1- D1, P2 - D2, P3 - D3 would be same however P4 -D4 are different. This doesn't belong to any of combinations in Figure above. So we conclude P4 received is wrong.


Related Discussions:- Example on hamming error correcting code

How to execute an instruction, Execution: Now instruction is ready for exec...

Execution: Now instruction is ready for execution. A different opcode will need different sequence of steps for execution. Hence let's discuss a few illustrations of execution of s

Sites are useful to the target audience members, Normal 0 false...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 Select a range of a

Pruning and sorting, Pruning and Sorting: This means we can test where...

Pruning and Sorting: This means we can test where each hypothesis explains as entails a common example that we can associate to a hypothesis a set of positive elements in whic

Arrow keys - input commands, When the user is inputting commands into your...

When the user is inputting commands into your shell, it should identify the left, right , up and down arrow keys. To implement this, you will need to use the termios.h library to

What is a symbolic constant, What is a symbolic constant? How it is defined...

What is a symbolic constant? How it is defined ? Symbolic constants are constants of any type declared by using the #define compiler directive. It is a preprocessor directive.

Pruning - artificial intelligence, Pruning - Artificial intelligence Re...

Pruning - Artificial intelligence Remember that pruning a search space means deciding that particular branches should not be explored. If an agent  surly  knows that exploring

What is smtp, SMTP is a Protocol used for transferring message among en...

SMTP is a Protocol used for transferring message among end user & Mail Server.

Explain a full subtractor using half subtractors, Draw the logic diagram of...

Draw the logic diagram of a full subtractor using half subtractors and explain its working with the help of a truth table Ans: Full Subtractor: It has to take care of repe

What are escape sequences characters, What are escape sequences characters?...

What are escape sequences characters? List any six of them.  The characters which when used with output functions like printf( ),putc(),put() etc. helps in formatting the outpu

Write a program for comparing two strings, Q. Write a program for comparing...

Q. Write a program for comparing two strings? Let's write a program for comparing two strings. Determine the following piece of code that has been written in C to compare two s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd