Error correcting code - hamming code, Computer Networking

Error Correcting Code - Hamming Code:

Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can detect up to two simultaneous bit errors, and correct single-bit errors

1420_Error Correcting Code - Hamming Code.png

Fig. Transmitted image on using hamming code and not

 Hamming code is the one of the simple error-correcting code, so it can just detect up to two-bit errors, and correct single-bit error. In this project, we will use the hamming (7,4) code. (7,4) means that the generated code( called codeword) is 7bit, and original data is 4bit.

Posted Date: 2/19/2013 1:08:30 AM | Location : United States







Related Discussions:- Error correcting code - hamming code, Assignment Help, Ask Question on Error correcting code - hamming code, Get Answer, Expert's Help, Error correcting code - hamming code Discussions

Write discussion on Error correcting code - hamming code
Your posts are moderated
Related Questions
Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

What is CRC and Checksum CRC (Cyclic redudancy check) CRC, is the most powerful of the redundancy checking methods, is based on binary division. Checksum Checksum

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

Discuss  about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group.  A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi

Overview of Data transmission network model A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physi

Switched Ethernet In switched networks a switch device identifies the destination address and routes the frame to the specific port to which the destination station is conn

XYZ INC. is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order m

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th