Encoding process, Computer Networking

Encoding Process

c= uG

u: binary data sequence of length 4( input)

G: Generator matrix which is 7*4

c: Codeword

 

 

797_Encoding Process.png

Decoding Process

s= rHT

r: received data sequence of length 7 ( input) H: Parity-Check Matrix

s: Syndrome to check error-position

 

 

1855_Encoding Process1.png

If some output values of the encoding and decoding multiplication is over than 1, the value should be changed into remainder on division of itself by 2.  (Ex: (4 2 1 ) => (0 0 1))

 

s(Syndrome) detect error position. We can know the single-error-bit position in the table below.

234_Encoding Process2.png

Fig. Decoding table for Hamming code(7,4)

If s is [0 0 0] and r= [0 1 0 0 0 1 1], it supposes that there is no error and transmitted data is [0 0 1 1]. If s is [0 1 0] and r = [1 0 1 0 0 1 0], it supposes that 2th bit is corrupted, so r should be changed to [1 1 1 0 0 1 0], and transmitted data is lower 4bits, [0 0 1 0].

Posted Date: 2/19/2013 1:12:08 AM | Location : United States







Related Discussions:- Encoding process, Assignment Help, Ask Question on Encoding process, Get Answer, Expert's Help, Encoding process Discussions

Write discussion on Encoding process
Your posts are moderated
Related Questions
The address recorded by a router should be its outgoing interface. That is, if a router forwards a datagram that has the record route option enabled, and if the datagram arrives at

What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of every SQL command are returned over the net

No Retransmission This  protocols  will not  through  the correctly received packets  but buffers than  and send  acknowledgment  for those packets. Thus  retransmission of th

Latest Internet and Intranet technologies Even though the security capabilities of the latest Internet and Intranet technologies have enabled the companies to control the avail

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Q. Explain about Congestion control? Congestion control Open-loop congestion control - prevent congestion before it happens retransmission policy - Ret


Describe DHCP concept

What is the Power Of Semantic Web Languages? Ans) The major power of Semantic Web languages is that anyone can create one, simply by publishing some RDF that defines a set of