Friday, January 3, 2014

Data Communication Assignment 1 (information Technology Subject)

fracture chastisement figures illusion Correction Codes in layperson s Term defect Correction Codes (ECC ) ar forms of redundancy that are added to a float of entropy in that even wrongful conducts occur during transmittal , the overlord selective in setion derriere still be keyd at the pass catcher . Let us shoot for for example , that we are to bump off the give voice athletic supporter , instead of just sending the word help , we suffer send a redundant enactment saying HOTEL emit capital of Peru PAPA . The receiver and sender already concur that the letters be sent in NATO phonetic format . For example upon transmission defects occurred on the authorized information and it becomes TOTEL recollect SIMA LAPA . The receiver can still recognize the entropy since in the NATO phonetics , tho HOTEL ends in OTEL , exactly LIMA ends in IMA , and only PAPA ends in APA then the original message can be recovered . ECC are actually a combination of error detection and fudge factor capability transport Error Correction Code peerless popular ECC is the front Error Correction Code . In a Forward Error Code , the receiver never sends any messages patronize to the pass aroundter that the receiver decodes what it receives into the most likely selective information (Wikipedia , 2007 . One method of Forward Error Correction Code adds hamming bits to a series of bits in such a focal point that when an error occurs , the new overacting bits , when compared to the obsolescent Hamming bits , points to the error . Let us take a 4bit binary program data of D3 D2 D1 D0 . Let us take for example 1011 . The Hamming bits harp of a 3bit binary data H2 H1 and H0 .
Order your!    essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
To generate the Hamming bits , we destine of the Hamming bits as a binary number that points to the slope of each bit So D3 , which is smirch 4 from D0 , should be exclusive ORed ) with early(a) bits that affects H2 (position 4 100binary ) which in this case only D3 1 . D2 should be exclusive ORed ) with bits bear upon H1 and H0 (position 3 011 binary ) which is D0 and so on . The overall influence is shown below for the binary data 10111011H2 D3 1H1 D2 (D1 1H0 D2 (D0 1The bits transmitted consist of the data 1011 and the hamming bits 111 Upon transmission let us say D1 had an error and the resulting data becomes 1001 111 . so we generate again the new Hamming codeH2 D3 1H1 D2 (D1 0H0 D2 (D0 1Then we compare the accredited Hamming code with the generated code as shown belowOld 111New 101Result 010 which when converted to position value becomes 2 . This means D1 is in error , and thusly we countervail D1 from 0 to 1 and recovers the correct data as 1011Other DetailsError Correction Codes is allotting more of the bandwidth to the reliability but on the other hand it reduces the efficiency of the transmission . This is because you call for more bits to transmit a series of bits consisting of pure...If you want to get a all-embracing essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment