Explain about double error detection bit, Computer Engineering

Assignment Help:

Q. Explain about Double Error Detection bit?

Let's presume now that two bit errors take place in data.

Data received:

379_Double Error Detection bit.png

So on -matching we conclude P3-D3 pair doesn't match.

Despite the fact that this information is wrong. Such problems can be recognized by adding one more bit to this Single Error Detection Code.  This is known as Double Error Detection bit (P5, D5).

So our data now is

2132_Double Error Detection bit1.png

Data receiving end.

1988_Double Error Detection bit2.png

D5-P5 mismatch denotes there is double bit error therefore don't try to correct error in its place asks sender to transmit data again.  So the name single error correction but double error detection as this code corrects single bit errors however only detects error in two bit.


Related Discussions:- Explain about double error detection bit

Variables and quantifiers - first-order logic, Variables and Quantifiers: ...

Variables and Quantifiers: Now we have to diagnose now that if we wanted to say that there is a meal at the Red Lion which costs only 3 pounds, is well sayed. Rather thenif we

Show smtp and electronic mail, One of the very useful things about Internet...

One of the very useful things about Internet is that it enables almost instantly exchange of electronic message (e-mail) across the worlds. E-mail is a standard as well as popular

Difference between perl and mod_perl, Perl is a language and MOD_PERL is a ...

Perl is a language and MOD_PERL is a module of Apache used to increase the performance of the application.

Block-level distributed parity, Given a RAID 5 (block-level distributed par...

Given a RAID 5 (block-level distributed parity) with k disks, how well will large block trnsmitted work? How well will it handle a high I/O request rate? Evaluate the performance t

Explain what is the difference among isr & function call, In ISR there is n...

In ISR there is no return value but in function call there is return value

Explain progressive control, Explain the term Progressive Control. Pro...

Explain the term Progressive Control. Progressive Control: Step by step system is an illustration of progressive control. The connection is established in stages, in respo

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Implement a priority queue, 1. Insert the following characters with their r...

1. Insert the following characters with their respective priorities (shown as ordered pairs) into an empty treap: (K, 17), (F, 22), (P, 29), (M, 10), (N, 15), (L, 26), (G, 13),

Phython, super ascii string checker

super ascii string checker

By which transport protocol used, The transport protocol used by TFTP (Triv...

The transport protocol used by TFTP (Trivial File Transfer Protocol) is? The transport protocol used through Trivial File Transfer Protocol is UDP.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd