Preview

Communication Errors

Good Essays
Open Document
Open Document
538 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Communication Errors
Communication Errors
When information is transferred back and forth among the various parts of a computer, or transmitted from the earth to the moon and back, or, for that matter, merely left in storage, a chance exists that the bit pattern ultimately retrieved may not be identical to the original one. Particles of dirt or grease on a magnetic recording surface or a malfunctioning circuit may cause data to be incorrectly recorded or read. Static on a transmission path may corrupt portions of the data. And, in the case of some technologies, normal background radiation can alter patterns stored in a machine’s main memory. To resolve such problems, a variety of encoding techniques have been developed to allow the detection and even the correction of errors. Today, because these techniques are largely built into the internal components of a computer system, they are not apparent to the personnel using the machine. Nonetheless, their presence is important and represents a significant contribution to scientific research. It is fitting, therefore, that we investigate some of these techniques that lie behind the reliability of today’s equipment.

• Parity Bits
A simple method of detecting errors is based on the principle that if each bit pattern being manipulated has an odd number of 1s and a pattern with an even number of 1s is encountered, an error must have occurred. To use this principle, we need an encoding system in which each pattern contains an odd number of 1s. This is easily obtained by first adding an additional bit, called a parity bit, to each pattern in an encoding system already available (perhaps at the high-order end).

In each case, we assign the value 1 or 0 to this new bit so that the entire resulting pattern has an odd number of 1s. Once our encoding system has been modified in this way, a pattern with an even number of 1s indicates that an error has occurred and that the pattern being manipulated is incorrect.

• Error-Correcting Codes

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Following the two scenarios where if one bit is converted and results in the same received pattern +-0+-0-+…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    The first category of faults flips random bits in random instructions of the program text to emulate hardware faults. These faults are easy to inject, and they cause a variety of different crashes. It is difficult to relate a bit flip with a specific error in programming, and most hardware bit flips would be caught by parity on the data or address bus.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Number Conversions

    • 180 Words
    • 2 Pages

    2.Convert your binary result back into decimal to prove your answer is correct. This is also…

    • 180 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The bit pattern 1011 in 1’s complement notation is 7. The result of 7 – 2 using 2’s complement notation is 8. The bit pattern 1110 in 2’s complement notation is 9. The range of numbers that can be represented using the Excess-2N-1 notation is _________.…

    • 4533 Words
    • 19 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using a system of 1's and 0's ______________ is the most common way of encoding data.…

    • 932 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    2. Convert your binary result back into decimal to prove your answer is correct. This is also shown in the following example.…

    • 705 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In March of 1979, the Three Mile Island (TMI) nuclear power plant of Middleton, PA faced near meltdown. People feared an unseen enemy: radiation. B.M. Dunn had some vital information to the possibility of this incident prior to its occurring. Dunn relayed this information to D.F. Hallman. Hallman’s memo and the involvement of those who did or did not receive it have been under a microscope since this historical event.…

    • 1095 Words
    • 5 Pages
    Good Essays
  • Good Essays

    1. List the major obstacles to good communication in the day to day work of a police agency, and detail the major strategies you would use to overcome those obstacles.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hello, my name is Amanda Cummings and I am the director of the Manhattan Regional Emergency Management Office. I am receiving official reports about many people getting sick from drinking the water in Manhattan and the surrounding areas. It is now known that there is a life-threatening biological agent in the water system called tularemia. It is still unknown how it got into the water systems but together we will be able to work as a team to resolve the issue and protect the lives of the residents in this area.…

    • 1561 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Communication and Message

    • 620 Words
    • 3 Pages

    Answer the following questions, using information from this week’s readings. Respond to each question in 100 to 200 words.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When I was in active in the military, I was always frustrated about the amount of overlapping. It a way it made sense for the organization. If someone was out of the picture, the unit still needed to be able to function successfully. Now that I am out, I find it comical. It amazes me how we all were able to come together and make it work. One time I had my wife drop me off because I was going to Twenty-nine Palms for a month and a half for a divisional exercise right before our deployment to Afghanistan. She stayed and observed us, as we got ready to leave. She told me she was amazed how we go anything successfully done because it looked like a dysfunctional circus. Going from the military to getting a degree in leadership has really…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Miscommunication

    • 848 Words
    • 4 Pages

    Problems in every society usually derive from one specific thing. Miscommunication. How many times have you gotten in an argument or a disagreement with someone over what someone said, and then you later found out that that person meant something completely different from what was running through your head? How many times have you gotten off the phone with someone—someone important, --and wondered, what in the world were he or she talking about? I often get this feeling after class.…

    • 848 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    So to clear out the ambiguity or to ensure proper interpretation of data, a coding technique called Manchester coding is employed in IEEE802.3 standards.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The screen grab of the tool execution identifying the occurrence of data-flow interference is given in Fig. 4. In the case study application, a variable no_of_students is used by both register and unregister functionalities. The value of no_of_students is incremented when a new student registers for a course and gets decremented when a student unregisters from the course. The data-flow interference occurs when variable no_of_students is not updated according to the functionalities (i.e) if the value giveed to no_of_students is not correctly updated, then marks may be giveed to an unregistered student by the Professor during the execution of give marks…

    • 745 Words
    • 3 Pages
    Good Essays