Encoding process, Computer Networking

Encoding Process

c= uG

u: binary data sequence of length 4( input)

G: Generator matrix which is 7*4

c: Codeword

 

 

797_Encoding Process.png

Decoding Process

s= rHT

r: received data sequence of length 7 ( input) H: Parity-Check Matrix

s: Syndrome to check error-position

 

 

1855_Encoding Process1.png

If some output values of the encoding and decoding multiplication is over than 1, the value should be changed into remainder on division of itself by 2.  (Ex: (4 2 1 ) => (0 0 1))

 

s(Syndrome) detect error position. We can know the single-error-bit position in the table below.

234_Encoding Process2.png

Fig. Decoding table for Hamming code(7,4)

If s is [0 0 0] and r= [0 1 0 0 0 1 1], it supposes that there is no error and transmitted data is [0 0 1 1]. If s is [0 1 0] and r = [1 0 1 0 0 1 0], it supposes that 2th bit is corrupted, so r should be changed to [1 1 1 0 0 1 0], and transmitted data is lower 4bits, [0 0 1 0].

Posted Date: 2/19/2013 1:12:08 AM | Location : United States







Related Discussions:- Encoding process, Assignment Help, Ask Question on Encoding process, Get Answer, Expert's Help, Encoding process Discussions

Write discussion on Encoding process
Your posts are moderated
Related Questions
What are the issues there in network environment Some of the issues necessary are: Network planning should be carried out covering the following important issues:

Disadvantages of Fiber Optics - Installation/maintenance - Unidirectional - Cost

Explain the building blocks of Client/Server? The client side building block runs the client side of the application. The server side building block runs the server side of

Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

Q. What are the TCP Services? TCP - Services Full Duplex Service Connection Oriented Service Reliable Service

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

Source to Destination Data Transfer - Datagram approach - Each packet is treated independently. - Every pkt will take its own path to reach the destination. - There i