Show the error correction by hamming code, Computer Networking

Assignment Help:

Q. Show the Error Correction by Hamming Code?

Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits

For instance a 7-bit ASCII code requires 4 redundancy bits that can be added to the end of the data unit or mixed with the original data bits which are placed in positions 1, 2, 4 and 8 that is x0,x1,x2,x3 etc.

969_Show the Error Correction by Hamming Code.png

In the Hamming Code every "r" bit for one combination of data bits as below:

  • r1: bits 1, 3, 5, 7, 9, 11
  • r2: bits 2, 3, 6, 7, 10, 11
  • r3: bits 4, 5, 6, 7
  • r4: bits 8, 9, 10, 11

749_Show the Error Correction by Hamming Code1.png

1364_Show the Error Correction by Hamming Code2.png

1142_Show the Error Correction by Hamming Code3.png


Related Discussions:- Show the error correction by hamming code

What is cam, CAM- Content Address Memory.  Its another name of MAC address ...

CAM- Content Address Memory.  Its another name of MAC address table.

Sketch the output waveform square wave that symmetrical, Question: The ...

Question: The input to the circuit in the figure is a square wave that is symmetrical about 0V. Sketch the output waveform.

Write a long note on internet and privacy, Question 1 Write a long note on...

Question 1 Write a long note on computers in television development Question 2 Write a long note on the ‘Steadicam' Question 3 Write a long note on Internet and pr

Describe in a generic manner the packet of ipsec, Can you describe in a gen...

Can you describe in a generic manner the packet of IPSec

Objectives of performance evaluations, OBJECTIVES After studying this ...

OBJECTIVES After studying this part, you should be able to: Explain the Metrics for Performance Evaluation; Notify about various Parallel System Overheads; Desc

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Whcih is the routing metric used by rip, Routing Information Protocol (RIP)...

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Difference among symmetric and asymmetric cryptosystem, what's the differen...

what's the difference among Symmetric and Asymmetric cryptosystem?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd