Lesson 6.7 Error Effecting Codes In Communication

Improved Essays
Text Data
Computers represent information using bits. A bit string is a sequence of zero or more bits. This information is encoded by the sender and will be transmitted. The receiver then decodes the information.
Data sent may be corrupted along the way because noise may interfere every time an information is transmitted to any channel. A channel is the physical medium through which information is transmitted. Examples of channels include telephone lines, internet cables, fiber optic lines, hard drives, disks, CD-ROMs, DVDs, etc. These channels are subject to noise disturbances. Noise refers to interference caused by sunspots, lightning, meteor showers, poor typing, and poor hearing, among others.
Oftentimes, data are transferred in the form
…show more content…
Lesson 6. 6 Error Detecting Codes
When a message is transmitted, the inevitable noise disturbance usually degrades the quality of communication. Whenever repetition is possible, it is sufficient to detect the occurrence of an error. When an error is detected, we simply retransmit the message, and it may be correct the second time or even possibly the third time.
Error detection is a great aid in high-quality maintenance. Without error detection, a large digital system becomes unmaintainable.
It is not possible to detect an error if every possible symbol, or set of symbols, that can be received is a legitimate message. It is only possible to catch errors if there are some restrictions on what a proper message is. The problem is to keep these restrictions on the possible messages down to ones that are simple. In practice, “simple” means “easily computable.”

Single-Parity Check
…show more content…
Odd

Example 6 – 22. Determine the number of bits transmitted in the bit string 11010011.
Solution. There are 9 bits transmitted. 8 information bits and 1 parity bit. Parity bit is an extra bit that is attached to the data bits. Parity bit is chosen so that the number of 1 bits in the code word is even or odd.
Parity checking is a means of checking if the communication of a sequence of bits has been correctly received. The two types of most commonly used parity checking are simple parity and two-dimensional parity. Simple parity is used to check single-bit errors while two-dimensional parity check is used to check burst errors. Burst errors mean two or more bits in the data has changed.

Single Parity Check
An even parity bit is generated by counting the number of 1s. If the number of 1s is odd, then the even parity bit will have a value of 1, otherwise the parity bit will be 0. In the same manner, an odd parity bit is generated by counting the number of 1s. However, if the number of 1s is even, then the odd parity bit will have a value of 1, otherwise the parity bit will be 0

Example 6 – 23. Generate an even parity bit of the bit string 10101101.
Solution: Since there are 5 1s, then the even parity bit will have a value of

Related Documents

  • Decent Essays

    Answers: 1. 135.46.63.10 Using the first 22 bits of it as the network address, we have 135.46.60.0. the bit pattern of 135.46.63.10 is 10000111.00101110.00111111.00001010 at this point when we perform the bit and operation with a 22 leading bit the 1s and 10 bit 0s, this the same and similar of making the ultimate or the last zero. We accept the subsequent network address bit pattern: 10000111.00101110.00111100.00000000.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Bsk System

    • 683 Words
    • 3 Pages

    2. QPSK: When a data is transmitted using BPSK technique the channel bandwidth required is 2fb. The QPSK technique reduces that bandwidth to fb. It is a multilevel phase modulation.…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Shc 31 3.2

    • 921 Words
    • 4 Pages

    2.2 Describe the factors to consider when promoting effective communication When looking into promoting effective communication, the following needs to be taken into account • Individual needs - everyone is different and everyone learns/expresses themselves in an individual way • environment - each situation requires a different environment. should something sensitive need to be discussed, then you would not want to do this is a busy open area. • Proximity - depending on what the discussion and the individual needs. this would dictate what proximity would be required.…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Alejandro Carriegos 9/1/2015 Network Layer The main purpose of the network layer packet is connecting with the destination; it must be familiar with the topology subnet and choose the appropriate paths through it. When the source and destination are on different networks, the network layer (IP), have to deal with these differences. The services provided by the network layer should be independent of the topology subnet.…

    • 423 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The numbers one and zero are very versatile, because one is white and zero is black. This means that the numbers can compliment…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Memory In Inside Out

    • 788 Words
    • 4 Pages

    The brain is a complex organ made up of many intricate systems that work together simaltaneously to optimize a person’s survival and success in the world. Each system is intelligent and works by using a series of procedures to complete tasks that range from difficult to elementary. Memory is one of the most important structures humans rely on. The Pixar film, Inside Out helps depict the science behind memory and show just how monumentally imperitive it is. Inside Out demonstrates how the three different processes of memory: encoding, storage, and retrieval are vitialy critical to all living things.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Double An 8 data type which can hold 14 digits compared to a single data type. • Used for defining big amounts e.g. £65k can be known as £65000 and it shows that not all the data values are within the numerical value of 65k and can show an easier way of writing code to help with memory management. Basically, it is simplifying the code.…

    • 902 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I've always had a passion for films and the emotions that this medium is capable of evoking. From as early as I can remember, I have been completely enamored by films: in my bedroom, in the living room, and especially in the theater. It allows one to leave the real world for a little while and explore an entirely new existence, even if it may be a mirror of our own world. That being said, there are bad movies, the kinds of movies that make you want to gouge out your eyes, plug your ears, and lock yourself in a Turkish prison for the remainder of your cold, dead life. When I see an ad for a new movie on television and it doesn't appeal to my pseudo elitist taste, I immediately shut it out completely.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Perfection Is Normal?

    • 270 Words
    • 2 Pages

    Truth number two titled, “Perfection is Normal”, talks about how. In one point of the koan, it talks about how it would be wiser to worry about a meteor crashing on your computer than to worry about a character being wrong in an email because of computer error. I agree that in some aspects of computers, we should not worry about whether if will fail or not and if it does then you compromise and find another way to do it When you send a bit, it detects if there is an error and corrects the error and sends it on its way. If you send a bit to someone, that person will receive an identical copy of your bit without error. I agree that if you send bits to someone that they will receive those bits without error.…

    • 270 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Controller-Pilot Data Link Communications: Hazardous or Helpful? Communication is the key to everything. Every facet of our lives is determinate on communication. No more is that true than in the world of aviation. The complex web of flights over the world dwarfs in comparison to the volume of communication that the aviation field uses.…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    How To Build A Computer

    • 520 Words
    • 3 Pages

    There are many parts inside of a computer and multiple steps in building a computer. If a problem occurs when building a computer, then it can be from one thing or from many different things. It can be from something as easy as a misplaced part or a bent pin on the CPU socket. I am building a computer at this moment and I have been confronted with errors already. The error I was accosted with was that the computer would not turn and show the error code “55” on the motherboard.…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    1  Abstract — Information sent and received in wireless communication systems can suffer from data losses due to multipath propagation, further leading to intersymbol interference. These conditions compromise the integrity of the information transmitted. This paper explores the Viterbi algorithm used to combat error bounds in convolutional codes, and develops a MATLAB-based alternative model of the algorithm for continuous time applications that is shown to significantly diminish the effects of intersymbol interference in the wireless transmission of a signal. I. INTRODUCTION Wireless communications is part of everyday life.…

    • 884 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Error Correcting Codes can be classified in two categories: (i) block codes, and (ii) convolution codes. (a). Block codes To generate an (n,k) block code, the channel encoder accepts information in successive k-bit blocks; for each block, it adds n-k redundant bits that are algebraically related to the k message bits, thereby producing an overall encoded block of n bits, where n>k. The n-bit block is called block code word, and n is called the block length of the code [16] (b). Convolutional…

    • 1521 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Before understanding what are the mistakes while interpreting data, we need to understand what data is. Edwards Demming said ““In God we trust. All others must bring data.” In mathematical terms, data can be termed as “facts and statistics collected together for reference or analysis”.…

    • 799 Words
    • 4 Pages
    Improved Essays