SlideShare a Scribd company logo
Error Correcting Codes
T-Com
How Is Data Transmitted ?
Occurrence of Error
Causes of Error (Noise):
o Multi-path propagation of the signal.
o Interference from other communication devices
Contd..
Solution
Channel Coding
Block Codes
● Divide the message into blocks each of k bits
called data words.
● Add r redundant bits to each blocks to make
the length n = k+r.
● Examples : Hamming Codes, Reed-Muller
Codes
Redundancy Coding
● In n-redundancy coding, each data bit is encoded in n
bits.
● In a 3-redundancy coding scheme, a ‘0’ data bit is
encoded as ‘000’ and a ‘1’ data bit is encoded as ‘111’.
How does it reduce the error?
❏ The decoder is taking blocks of n bits.
❏ The decoder expects all n bits to have the same value
❏ When the n bits in a block do not have the same value,
the decoder detects an error
❏ n-redundancy coding can correct up to (n-1)/2 bits in a
code
Correction Abilities of Codes
Signal Transmission Example
Hamming Code
❏ Hamming codes can correct one-bit errors
❏ 2r >= n + r + 1 , r=redundancy bits
n=data bits
Redundancy bits calculation
r1 will take care of these bits
r2 will take care of these bits
r4 will take care of these bits
r8 will take care of these bits
Example
d
d
d
r
d
d
d
r
d
r
Error Correction using hamming code
Reed Muller Code:R(1,3)
One of the interesting things about these codes is that
there are several ways to describe them and we shall look
at one of these-
1st order Reed Muller R(1,3) which can correct one bit
error.
Contd..
Need a Generator matrix
Dimension is
Encoding
❏ rows in the generator matrix = Dimension
❏ So 3 vectors are there and hence total length of the code to be sent =23
❏ Let m = (m1, m2, . . . mk) be a block, the encoded message Mc is
Mc=∑i=1,kmiri
where ri is a row of the encoding matrix of R(r, m).
❏ For example, using R(1, 3) to encode m = (0110) gives:
0 ∗(11111111) + 1 ∗(11110000) + 1 ∗(11001100) + 0 ∗(10101010) =
(00111100)
Decoding
❏ The rows of this matrix are basis vectors for the code v0, v1,v2 and v3.
❏ Any vector v of the code is a linear combination of these v =
a0v0+a1v1+a2v2 + a3v3
❏ If no errors occur, a received vector r = (y0, y1, y2, y3, y4, y5, y6,y7)
a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7
a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7
a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7
❏ If one error has occurred in r, then when all the calculations above are
made, 3 of the 4 values will agree for each ai, so the correct value will be
obtained by majority decoding.
a0 =r + a1v1 + a2v2 + a3v3
Example
Let m=1101 & Suppose that v = 10100101 is received as r= 10101101. Using,
a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7
a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7
a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 we calculate:
a1 =1=1=0=1
a2 =0=0=1=0
a3 =0=1=1=1
a1 =1 a2 =0 a3 =1
a0 =r + a1v1 + a2v2 + a3v3
So,10101101 + 01010101 + 00001111 = 11110111.
➔ a0 = 1
Contd..
❏ Decoded data bits are:a0 a1 a2 a3 =1101
v = a0v0 + a1v1 + a2v2 + a3v3
v = 11111111 + 01010101 + 00001111 = 10100101
❏ On comparing with r=10101101 we can find the error bit which is the fifth
bit.
References
❏ Reed-Muller Error Correcting Codes by Ben Cooke:
❏ http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.
1.1.208.440&rep=rep1&type=pdf
❏ Error Correction Code by Todd K Moon
❏ Hamming Block Codes:
http://web.udl.es/usuaris/carlesm/docencia/xc1/Treba
lls/Hamming.Treball.pdf
End of the presentation
ThankYou
Akshit Jain 2013124
Nitin Varun 2013070
Ad

More Related Content

What's hot (20)

301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
Srinivas Naidu
 
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
0586umer
 
6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol6LoWPAN: An open IoT Networking Protocol
6LoWPAN: An open IoT Networking Protocol
Samsung Open Source Group
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
KhushbooGupta145
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Network Coding
Network CodingNetwork Coding
Network Coding
Kishoj Bajracharya
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
shravan kumar upadhayay
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
kuldeep singh shishodia
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
Vishal Verma
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentation
mahalakshmimalini
 
Lambda design rule
Lambda design ruleLambda design rule
Lambda design rule
Gowri Kishore
 
Counter propagation Network
Counter propagation NetworkCounter propagation Network
Counter propagation Network
Akshay Dhole
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
System partitioning in VLSI and its considerations
System partitioning in VLSI and its considerationsSystem partitioning in VLSI and its considerations
System partitioning in VLSI and its considerations
Subash John
 
Chapter 7 8051 programming in c
Chapter 7  8051 programming in cChapter 7  8051 programming in c
Chapter 7 8051 programming in c
Abdelrahman Elewah
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
Srinivas Naidu
 
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
CDMA - USE WALSH TABLE TO GENERATE CHIP SEQUENCE
0586umer
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
KhushbooGupta145
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Counter propagation Network
Counter propagation NetworkCounter propagation Network
Counter propagation Network
Akshay Dhole
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
System partitioning in VLSI and its considerations
System partitioning in VLSI and its considerationsSystem partitioning in VLSI and its considerations
System partitioning in VLSI and its considerations
Subash John
 
Chapter 7 8051 programming in c
Chapter 7  8051 programming in cChapter 7  8051 programming in c
Chapter 7 8051 programming in c
Abdelrahman Elewah
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX Microprocessor
Raunaq Sahni
 

Viewers also liked (20)

Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6
njit-ronbrown
 
Computer network
Computer networkComputer network
Computer network
Subrata Kumer Paul
 
Galois field
Galois fieldGalois field
Galois field
Niaj Morshed
 
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
marujirou
 
28 networking
28  networking28  networking
28 networking
Ravindra Rathore
 
Ch11 communication
Ch11  communicationCh11  communication
Ch11 communication
adrienne0901
 
26 io -ii file handling
26  io -ii  file handling26  io -ii  file handling
26 io -ii file handling
Ravindra Rathore
 
Introduction of reflection
Introduction of reflection Introduction of reflection
Introduction of reflection
Ravindra Rathore
 
21 multi threading - iii
21 multi threading - iii21 multi threading - iii
21 multi threading - iii
Ravindra Rathore
 
22 multi threading iv
22 multi threading iv22 multi threading iv
22 multi threading iv
Ravindra Rathore
 
Lecture 5 phasor notations
Lecture 5 phasor notationsLecture 5 phasor notations
Lecture 5 phasor notations
Ravindra Rathore
 
Vlsi
VlsiVlsi
Vlsi
Rina Ahire
 
Fiber optics101
Fiber optics101Fiber optics101
Fiber optics101
admercano101
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
Madhumita Tamhane
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
Rina Ahire
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6
njit-ronbrown
 
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
marujirou
 
Ch11 communication
Ch11  communicationCh11  communication
Ch11 communication
adrienne0901
 
Introduction of reflection
Introduction of reflection Introduction of reflection
Introduction of reflection
Ravindra Rathore
 
Lecture 5 phasor notations
Lecture 5 phasor notationsLecture 5 phasor notations
Lecture 5 phasor notations
Ravindra Rathore
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
Madhumita Tamhane
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
Rina Ahire
 
Ad

Similar to T com presentation (error correcting code) (20)

linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
saigopinadh bodigiri
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf
230231060
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
Nitesh Singh
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
bhagavanprasad
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
Vivek Kumar
 
Cn lec-06
Cn lec-06Cn lec-06
Cn lec-06
M Mudassar Khan
 
Hamming codes
Hamming codesHamming codes
Hamming codes
GIGI JOSEPH
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
error control coding
error control coding error control coding
error control coding
Suhad Malayshi
 
this is computer network power presentation
this is computer network power presentationthis is computer network power presentation
this is computer network power presentation
adarshpandey9910
 
Computer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptxComputer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptx
Temesgen Geta
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
SneheshDutta
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detection
Nitesh Singh
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
Krishbathija
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
prashant513130
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
IKhait
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf
230231060
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
this is computer network power presentation
this is computer network power presentationthis is computer network power presentation
this is computer network power presentation
adarshpandey9910
 
Computer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptxComputer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptx
Temesgen Geta
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
SneheshDutta
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detection
Nitesh Singh
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
Krishbathija
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
prashant513130
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
IKhait
 
Ad

Recently uploaded (20)

Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 

T com presentation (error correcting code)

  • 2. How Is Data Transmitted ?
  • 3. Occurrence of Error Causes of Error (Noise): o Multi-path propagation of the signal. o Interference from other communication devices
  • 6. Block Codes ● Divide the message into blocks each of k bits called data words. ● Add r redundant bits to each blocks to make the length n = k+r. ● Examples : Hamming Codes, Reed-Muller Codes
  • 7. Redundancy Coding ● In n-redundancy coding, each data bit is encoded in n bits. ● In a 3-redundancy coding scheme, a ‘0’ data bit is encoded as ‘000’ and a ‘1’ data bit is encoded as ‘111’.
  • 8. How does it reduce the error? ❏ The decoder is taking blocks of n bits. ❏ The decoder expects all n bits to have the same value ❏ When the n bits in a block do not have the same value, the decoder detects an error ❏ n-redundancy coding can correct up to (n-1)/2 bits in a code
  • 11. Hamming Code ❏ Hamming codes can correct one-bit errors ❏ 2r >= n + r + 1 , r=redundancy bits n=data bits
  • 12. Redundancy bits calculation r1 will take care of these bits r2 will take care of these bits r4 will take care of these bits r8 will take care of these bits
  • 14. Error Correction using hamming code
  • 15. Reed Muller Code:R(1,3) One of the interesting things about these codes is that there are several ways to describe them and we shall look at one of these- 1st order Reed Muller R(1,3) which can correct one bit error.
  • 16. Contd.. Need a Generator matrix Dimension is
  • 17. Encoding ❏ rows in the generator matrix = Dimension ❏ So 3 vectors are there and hence total length of the code to be sent =23 ❏ Let m = (m1, m2, . . . mk) be a block, the encoded message Mc is Mc=∑i=1,kmiri where ri is a row of the encoding matrix of R(r, m). ❏ For example, using R(1, 3) to encode m = (0110) gives: 0 ∗(11111111) + 1 ∗(11110000) + 1 ∗(11001100) + 0 ∗(10101010) = (00111100)
  • 18. Decoding ❏ The rows of this matrix are basis vectors for the code v0, v1,v2 and v3. ❏ Any vector v of the code is a linear combination of these v = a0v0+a1v1+a2v2 + a3v3 ❏ If no errors occur, a received vector r = (y0, y1, y2, y3, y4, y5, y6,y7) a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7 a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7 a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 ❏ If one error has occurred in r, then when all the calculations above are made, 3 of the 4 values will agree for each ai, so the correct value will be obtained by majority decoding. a0 =r + a1v1 + a2v2 + a3v3
  • 19. Example Let m=1101 & Suppose that v = 10100101 is received as r= 10101101. Using, a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7 a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7 a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 we calculate: a1 =1=1=0=1 a2 =0=0=1=0 a3 =0=1=1=1 a1 =1 a2 =0 a3 =1 a0 =r + a1v1 + a2v2 + a3v3 So,10101101 + 01010101 + 00001111 = 11110111. ➔ a0 = 1
  • 20. Contd.. ❏ Decoded data bits are:a0 a1 a2 a3 =1101 v = a0v0 + a1v1 + a2v2 + a3v3 v = 11111111 + 01010101 + 00001111 = 10100101 ❏ On comparing with r=10101101 we can find the error bit which is the fifth bit.
  • 21. References ❏ Reed-Muller Error Correcting Codes by Ben Cooke: ❏ http://citeseerx.ist.psu.edu/viewdoc/download?doi=10. 1.1.208.440&rep=rep1&type=pdf ❏ Error Correction Code by Todd K Moon ❏ Hamming Block Codes: http://web.udl.es/usuaris/carlesm/docencia/xc1/Treba lls/Hamming.Treball.pdf
  • 22. End of the presentation ThankYou Akshit Jain 2013124 Nitin Varun 2013070

Editor's Notes

  • #3: This topic is motivated by the problem of communicating reliably over noisy chan- nels — where the data sent over the channel may come out corrupted on the other end, butbut the receiver wasn’t able to correct the errors and recover the original message. The data is transmitted in the form of binary bits 1’s and 0’s.The encoder converts the message in binary and is transmitted by the transmitter.
  • #4: During the transmission the data due to noise or multipath propogation may get corrupted i.e the bits may flip or lost.
  • #5: These are the basically the forms of data transmitted and the errors
  • #6: The solution to the problem is chanel coding i.e error correction by encoding the message with some redundant bits and making the receiver side decode the message.This will prevent the continuous call to retransmission and hence save bandwidth and time and cost.
  • #7: Block codes are one of the kind of methods of error correction.In these methods we divide our message into equally sized blocks which is called data words. And in it we also add extra bits which is called redundant bits to the original data which will be used later to correct errors in the message.we will discuss two block codes methods Hamming codes and Reed Muller.
  • #8: Before discussing humming and reed muller let’s first discuss one of the simplest block codes Redundancy coding.In it we send each bits multiple times depending upon redundancy level. As we can see from given example we want to send 100 and we encoded our message by repeating each bit 3 times
  • #9: Now how does it reduces error. the decoder will take blocks of n bits depending upon our redundancy level. and will check bits in each block if all the bits are not same in a block then there is an error and it will check for the majority bits in the block and select that bit. So basically we know that for n bits the majority bit will be that bit which occurs more than n -1 /2 times.if there are less than or equal to n-1 /2 errors in a block then it can correct that errors.
  • #11: here we can see how redundant coding is useful in reducing errors in received messages.
  • #12: the hamming code can correct upto one bit errors.Suppose we want to send n bits then according to this equation we can detect the number of redundancy bits required to detect and correct that error. From the figure We arrange all these bits in a pattern and the redundancy bits are arranged on the 2^ positions.This is till the no. of redundancy bits gets completed and then we arrange the data bits at remaining positions.
  • #13: [Look at the figure] the parity bits are calculated using the data bits and they are used in some order and here it is explain for each parity bit.
  • #14: Lets see an example
  • #15: Suppose the code received is erroraneous and we know the error is at bit 7 but the receiver doesn’t know that.So,how will it find it.Let’s see. Calculate the check bits using the parity bits [sort of C0,C1,C2] .Arrange it like this and Take these calculated check bits together and get the number.That bit will be corrupted.
  • #16: Now lets see the last code which is reed muller and it is the most interesting and the complex one. here we are explain only first order reed muller code of block size of 2 ^ 3 bits which can correct one bit error.
  • #17: this is a generation matrix and this the dimension equation which are required in generating the code
  • #18: the encoding matrix is created by putting the first row as one and then adding k-1 rows. k is the dimension of reed muller code and which also specify the amount of data bits which sent in one block.
  • #19: The rows of the matrix are represented as v0,v1,v2,v3. The block of bits which we will send is called a vecotr and is represented as [equation] Suppose the received vector is r as shown Then we will decode this vector using an algorithm.These are the equations and they are formed basically by using the characterstic equations and these are--- Now these bits are calculated using the majority bits in the four characterstic equations for each bit a0 to a3 Now this is the reason the code detects only one error.As if only one bit wrong then only one equation is affected for each data bit and hence can find the majority. a0 is calculated using the majorith in the a0 equation
  • #20: a0 is