Lesson 6.7 Error Effecting Codes In Communication

Improved Essays
Text Data
Computers represent information using bits. A bit string is a sequence of zero or more bits. This information is encoded by the sender and will be transmitted. The receiver then decodes the information.
Data sent may be corrupted along the way because noise may interfere every time an information is transmitted to any channel. A channel is the physical medium through which information is transmitted. Examples of channels include telephone lines, internet cables, fiber optic lines, hard drives, disks, CD-ROMs, DVDs, etc. These channels are subject to noise disturbances. Noise refers to interference caused by sunspots, lightning, meteor showers, poor typing, and poor hearing, among others.
Oftentimes, data are transferred in the form
…show more content…
Lesson 6. 6 Error Detecting Codes
When a message is transmitted, the inevitable noise disturbance usually degrades the quality of communication. Whenever repetition is possible, it is sufficient to detect the occurrence of an error. When an error is detected, we simply retransmit the message, and it may be correct the second time or even possibly the third time.
Error detection is a great aid in high-quality maintenance. Without error detection, a large digital system becomes unmaintainable.
It is not possible to detect an error if every possible symbol, or set of symbols, that can be received is a legitimate message. It is only possible to catch errors if there are some restrictions on what a proper message is. The problem is to keep these restrictions on the possible messages down to ones that are simple. In practice, “simple” means “easily computable.”

Single-Parity Check
…show more content…
Odd

Example 6 – 22. Determine the number of bits transmitted in the bit string 11010011.
Solution. There are 9 bits transmitted. 8 information bits and 1 parity bit. Parity bit is an extra bit that is attached to the data bits. Parity bit is chosen so that the number of 1 bits in the code word is even or odd.
Parity checking is a means of checking if the communication of a sequence of bits has been correctly received. The two types of most commonly used parity checking are simple parity and two-dimensional parity. Simple parity is used to check single-bit errors while two-dimensional parity check is used to check burst errors. Burst errors mean two or more bits in the data has changed.

Single Parity Check
An even parity bit is generated by counting the number of 1s. If the number of 1s is odd, then the even parity bit will have a value of 1, otherwise the parity bit will be 0. In the same manner, an odd parity bit is generated by counting the number of 1s. However, if the number of 1s is even, then the odd parity bit will have a value of 1, otherwise the parity bit will be 0

Example 6 – 23. Generate an even parity bit of the bit string 10101101.
Solution: Since there are 5 1s, then the even parity bit will have a value of

Related Documents

  • Improved Essays

    We use XOR operation to calculate the Parity bit: For the first column of the disks, to the left we have 1, 1 and 0: 1XOR 1 XOR 0 = Parity bit Broken down: 1 XOR 1 = 0 and then 0 XOR 0 = The parity bit is 0.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    12345.67 - Data Type: Double  Use of Double: A Double can be used as decimal numbers with less than 14 significant digits e.g. 12345678.78 - Data Type: Boolean  Use of Boolean: A Boolean can be used for a question with two possible answers that a value to a question e.g. is the car yellow? Yes or No. Other range of value can be true or false. As a code, a Boolean would look like Dim answer as Boolean. Importance of data…

    • 841 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Bsk System

    • 683 Words
    • 3 Pages

    2. QPSK: When a data is transmitted using BPSK technique the channel bandwidth required is 2fb. The QPSK technique reduces that bandwidth to fb. It is a multilevel phase modulation.…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Alejandro Carriegos 9/1/2015 Network Layer The main purpose of the network layer packet is connecting with the destination; it must be familiar with the topology subnet and choose the appropriate paths through it. When the source and destination are on different networks, the network layer (IP), have to deal with these differences. The services provided by the network layer should be independent of the topology subnet.…

    • 423 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Shc 31 3.2

    • 921 Words
    • 4 Pages

    2.2 Describe the factors to consider when promoting effective communication When looking into promoting effective communication, the following needs to be taken into account • Individual needs - everyone is different and everyone learns/expresses themselves in an individual way • environment - each situation requires a different environment. should something sensitive need to be discussed, then you would not want to do this is a busy open area. • Proximity - depending on what the discussion and the individual needs. this would dictate what proximity would be required.…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Memory In Inside Out

    • 788 Words
    • 4 Pages

    The brain is a complex organ made up of many intricate systems that work together simaltaneously to optimize a person’s survival and success in the world. Each system is intelligent and works by using a series of procedures to complete tasks that range from difficult to elementary. Memory is one of the most important structures humans rely on. The Pixar film, Inside Out helps depict the science behind memory and show just how monumentally imperitive it is. Inside Out demonstrates how the three different processes of memory: encoding, storage, and retrieval are vitialy critical to all living things.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Stroop Test

    • 1152 Words
    • 5 Pages

    The one or zero indicated by each boolean light is submitted to a Format into String with the time elapsed in order…

    • 1152 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    I've always had a passion for films and the emotions that this medium is capable of evoking. From as early as I can remember, I have been completely enamored by films: in my bedroom, in the living room, and especially in the theater. It allows one to leave the real world for a little while and explore an entirely new existence, even if it may be a mirror of our own world. That being said, there are bad movies, the kinds of movies that make you want to gouge out your eyes, plug your ears, and lock yourself in a Turkish prison for the remainder of your cold, dead life. When I see an ad for a new movie on television and it doesn't appeal to my pseudo elitist taste, I immediately shut it out completely.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Perfection Is Normal?

    • 270 Words
    • 2 Pages

    Truth number two titled, “Perfection is Normal”, talks about how. In one point of the koan, it talks about how it would be wiser to worry about a meteor crashing on your computer than to worry about a character being wrong in an email because of computer error. I agree that in some aspects of computers, we should not worry about whether if will fail or not and if it does then you compromise and find another way to do it When you send a bit, it detects if there is an error and corrects the error and sends it on its way. If you send a bit to someone, that person will receive an identical copy of your bit without error. I agree that if you send bits to someone that they will receive those bits without error.…

    • 270 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    How To Build A Computer

    • 520 Words
    • 3 Pages

    There are many parts inside of a computer and multiple steps in building a computer. If a problem occurs when building a computer, then it can be from one thing or from many different things. It can be from something as easy as a misplaced part or a bent pin on the CPU socket. I am building a computer at this moment and I have been confronted with errors already. The error I was accosted with was that the computer would not turn and show the error code “55” on the motherboard.…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Controller-Pilot Data Link Communications: Hazardous or Helpful? Communication is the key to everything. Every facet of our lives is determinate on communication. No more is that true than in the world of aviation. The complex web of flights over the world dwarfs in comparison to the volume of communication that the aviation field uses.…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1  Abstract — Information sent and received in wireless communication systems can suffer from data losses due to multipath propagation, further leading to intersymbol interference. These conditions compromise the integrity of the information transmitted. This paper explores the Viterbi algorithm used to combat error bounds in convolutional codes, and develops a MATLAB-based alternative model of the algorithm for continuous time applications that is shown to significantly diminish the effects of intersymbol interference in the wireless transmission of a signal. I. INTRODUCTION Wireless communications is part of everyday life.…

    • 884 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    CODING TECHNIQUES When the digital information in the binary form is transmitted from one point to another point in FSO communication an error may occur. This means a signal corresponding to 0 may change to 1 or vice –versa due to presence of noise. Figure 5. shows the basic coding block diagram of FSO communication system.…

    • 1521 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Before understanding what are the mistakes while interpreting data, we need to understand what data is. Edwards Demming said ““In God we trust. All others must bring data.” In mathematical terms, data can be termed as “facts and statistics collected together for reference or analysis”.…

    • 799 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    from the work of Claude and Warren Weaver. Shannon in 1949; this three-part model was intended to capture radio and television transmission process. The three parts are: source, channel, and receiver. Shannon and Weaver also identify another component that can interfere while listening to a telephone call that is called noise. However, this model was adapted to human communication, and it has some useful parallels to public speaking.…

    • 956 Words
    • 4 Pages
    Improved Essays