Preview

Information Theory

Good Essays
Open Document
Open Document
2168 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Theory
Ass.Prof.Dr. Thamer Information theory 4th class in Communications

Error Detection and Correction
1. Types of Errors Whenever bits flow from one point to another, they are subject to unpredictable changes because of interference. This interference can change the shape of the signal. In a single-bit error, a 0 is changed to a 1 or a 1 to a 0. The term single-bit error means that only 1 bit of a given data unit (such as a byte, character, or packet) is changed from 1 to 0 or from 0 to 1. The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1. 2. Redundancy The central concept in detecting or correcting errors is redundancy. To be able to detect or correct errors, we need to send some extra bits with our data. These redundant bits are added by the sender and removed by the receiver. Their presence allows the receiver to detect or correct corrupted bits. The concept of including extra information in the transmission for error detection is a good one. But instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called redundancy because the extra bits are redundant to the information: they are discarded as soon as the accuracy of the transmission has been determined. Figure 8 shows the process of using redundant bits to check the accuracy of a data unit. Once the data stream has been generated, it passes through a device that analyses it and adds on an appropriately coded redundancy check. The data unit, now enlarged by several hits, travels over the link
1

Ass.Prof.Dr. Thamer Information theory 4th class in Communications

to the receiver. The receiver puts the entire stream through a checking function. If the received hit stream passes the checking criteria, the data portion of the data unit is accepted and the redundant bits are discarded.

Fig. 8 Three types of redundancy checks are common in data communications: parity check, cyclic

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    Any connected devise that reads the data transmitted will check the destination address; if the address does not belong to the devise, it will not read the rest of the frame. Once the intended recipient reads the frame, it will send a response to the source address; data received intact - continue, or data corrupt -…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PT2520 Unit7Labs Tramil

    • 330 Words
    • 1 Page

    1. What does redundancy refer to? Redundancy refers to repeating the same data more than once; It occurs in a number of ways such as the data could be repeated over and over again in the same file.…

    • 330 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Add a section 2 to your guide (entitled ‘Error detection and correction’) which explains the techniques that can be used to reduce data transmission…

    • 3587 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Information Methods

    • 4779 Words
    • 20 Pages

    I declare that ( the first four boxes must be completed for the assignment to be accepted):X This assignment does not contain any material that has previously been submitted for assessment at this or any other university. X This is an original piece of work and no part has been completed by any other student than signed below. X I have read and understood the avoiding plagiarism guidelines at http://www.swinburne.edu.au/ltas/plagiarism/students.htm and no part of this work has been copied or paraphrased from any other source except where this has been clearly acknowledged in the body of the assignment and included in the reference list. X I have retained a copy of this assignment in the event of it becoming lost or damaged. □ (optional) I agree to a copy of the assignment being retained as an exemplar for future students (subject to identifying details being removed).…

    • 4779 Words
    • 20 Pages
    Powerful Essays
  • Best Essays

    information based decision

    • 3304 Words
    • 14 Pages

    Information is data that has been processed so that it has meaning and value to a recipient,…

    • 3304 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Ups Case

    • 299 Words
    • 2 Pages

    2. Data from package is sent to the package-tracking system and retransmitted to the wireless LAN.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hfdth

    • 1396 Words
    • 6 Pages

    suited for implementing high-performance memory decoders. All inputs are buffered and input clamping diodes are…

    • 1396 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    The information processing theory gives us a glance or an idea of the way people learn. It looks at the ways our mind processes any incoming information, and how it is processed and moved first into working memory and then into long-term memory. This theory also describes the way each of these component parts and the system linking them improves with time. Strong inclusion of the information processing theory can lead to more effective ways of teaching, which will result in children becoming better at retaining and processing information. They also learn to integrate it into their knowledge base so it can be reused in the future more effectively. The information processing theory was developed to help social learning theorists and others understand how humans learn and solve problems. When applying information processing theory to child development, researchers examine how the mental processes mature to explain changes in problem-solving behavior, decision-making, information gathering and storage, and other cognitive processes.…

    • 1225 Words
    • 4 Pages
    Good Essays
  • Good Essays

    H. 264/Avr Analysis

    • 826 Words
    • 4 Pages

    Instead, it can select the reference frame prior to the corrupted picture whenever feedback information is received. One form of reference picture selection can be demonstrated in Fig. 4.11, it shows the transmission of frames 1 through 9. The encoder prediction is indicated by the use of curved arrows in the figure. In this concept, the most recent frame is usually utilized as the reference frame for motion-compensation prediction. However, if frame 4 gets corrupted by packet loss, the decoder immediately signals a negative acknowledgement (NACK) message to the encoder about the error. This informs the encoder that frame number 4 is damaged, and that all subsequent frames are prone to error propagation. In this regard, the encoder then selects the most recent frame known to be correctly received (frame 3 in this figure) as a reference for the encoding of the next frame, which is frame 6. Round Trip Time (RTT) determines the required amount of time for the prediction structure to be altered, and consequently determines the number of frames that will be affected by the error propagation…

    • 826 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Devices- several devices work to see that the message is properly directed to the source to the destination device.…

    • 1776 Words
    • 8 Pages
    Good Essays
  • Good Essays

    THE EFFECTS OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON STUDENTS’ LEARNING IN TEACHER EDUCATION PROGRAMS…

    • 536 Words
    • 3 Pages
    Good Essays