Encoding process, Computer Networking

Encoding Process

c= uG

u: binary data sequence of length 4( input)

G: Generator matrix which is 7*4

c: Codeword

 

 

797_Encoding Process.png

Decoding Process

s= rHT

r: received data sequence of length 7 ( input) H: Parity-Check Matrix

s: Syndrome to check error-position

 

 

1855_Encoding Process1.png

If some output values of the encoding and decoding multiplication is over than 1, the value should be changed into remainder on division of itself by 2.  (Ex: (4 2 1 ) => (0 0 1))

 

s(Syndrome) detect error position. We can know the single-error-bit position in the table below.

234_Encoding Process2.png

Fig. Decoding table for Hamming code(7,4)

If s is [0 0 0] and r= [0 1 0 0 0 1 1], it supposes that there is no error and transmitted data is [0 0 1 1]. If s is [0 1 0] and r = [1 0 1 0 0 1 0], it supposes that 2th bit is corrupted, so r should be changed to [1 1 1 0 0 1 0], and transmitted data is lower 4bits, [0 0 1 0].

Posted Date: 2/19/2013 1:12:08 AM | Location : United States







Related Discussions:- Encoding process, Assignment Help, Ask Question on Encoding process, Get Answer, Expert's Help, Encoding process Discussions

Write discussion on Encoding process
Your posts are moderated
Related Questions
Repeater Repeater is  also named as active hub operates at physical  layer of OSI model. Repeater is an  electronic  device that simply regenerates the signal. Signals travell

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

If the amount of the application runs on the Client side, then it is Fat clients. It is mostly used for decision support and personal software. If the amount of the application

Question 1 Brief the Fourth generation network. List its advantages and disadvantages Question 2 Explain the steps involved in component identification and call establishm

What are the five major network services? Major Network Services are: a. File Services b. Message Services c.  Print Services  d.  Application Services e.  Datab

To execute any algorithm, selection of a proper data structure is very crucial. A particular operation may be executed with a data structure in a smaller time but it may have a ver

What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.

Half duplex is analogous to a one a lane bridge, it can handle traffic in both directions but no at the similar time.

What is D-AMPS D-AMPS uses 832 channels (in every direction) with three users sharing a sole channel. This allows D-AMPS to support up to the 2496 users simultaneously per cel