Encoding process, Computer Networking

Assignment Help:

Encoding Process

c= uG

u: binary data sequence of length 4( input)

G: Generator matrix which is 7*4

c: Codeword

 

 

797_Encoding Process.png

Decoding Process

s= rHT

r: received data sequence of length 7 ( input) H: Parity-Check Matrix

s: Syndrome to check error-position

 

 

1855_Encoding Process1.png

If some output values of the encoding and decoding multiplication is over than 1, the value should be changed into remainder on division of itself by 2.  (Ex: (4 2 1 ) => (0 0 1))

 

s(Syndrome) detect error position. We can know the single-error-bit position in the table below.

234_Encoding Process2.png

Fig. Decoding table for Hamming code(7,4)

If s is [0 0 0] and r= [0 1 0 0 0 1 1], it supposes that there is no error and transmitted data is [0 0 1 1]. If s is [0 1 0] and r = [1 0 1 0 0 1 0], it supposes that 2th bit is corrupted, so r should be changed to [1 1 1 0 0 1 0], and transmitted data is lower 4bits, [0 0 1 0].


Related Discussions:- Encoding process

Determine the disadvantages of socks protocol, Determine the disadvantages ...

Determine the disadvantages of SOCKS protocol The main problem with SOCKS is that it lacks transparency to software developers and users. Implementation requires a change to

Define firewall and its uses, Firewall is a device or a component that res...

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho

Broadcast domain and collision domain, Explain Difference between broadcast...

Explain Difference between broadcast domain and collision domain? Ans) Broadcast Domain Send the packet to all the Present Network IT might be send by the person It mig

Effectiveness of data communications, Efficiency of a data communications s...

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

Merits of message passage-shared memory, Gives excellent low-level control ...

Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb

Program for two library methods with thread , #include void subdomain(...

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

What is mpmm, MPMM is a Project Management Methodology which gives a comple...

MPMM is a Project Management Methodology which gives a complete "framework" for managing projects. This framework gives you with a step-by-step walkthrough of the phases, activitie

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd