Show the error correction by hamming code, Computer Networking

Assignment Help:

Q. Show the Error Correction by Hamming Code?

Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits

For instance a 7-bit ASCII code requires 4 redundancy bits that can be added to the end of the data unit or mixed with the original data bits which are placed in positions 1, 2, 4 and 8 that is x0,x1,x2,x3 etc.

969_Show the Error Correction by Hamming Code.png

In the Hamming Code every "r" bit for one combination of data bits as below:

  • r1: bits 1, 3, 5, 7, 9, 11
  • r2: bits 2, 3, 6, 7, 10, 11
  • r3: bits 4, 5, 6, 7
  • r4: bits 8, 9, 10, 11

749_Show the Error Correction by Hamming Code1.png

1364_Show the Error Correction by Hamming Code2.png

1142_Show the Error Correction by Hamming Code3.png


Related Discussions:- Show the error correction by hamming code

What is bus topology, Q. What is Bus Topology?  Multipoint configurati...

Q. What is Bus Topology?  Multipoint configuration  One cable acts like a backbone to link all devices   Advantages: Effortlessness of installation and less cabling

Classify different types of ip routing, INTERNETWORKING - TCP/IP 1. Sta...

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Determine the mean node-node path, Mean node-node path The mean node-no...

Mean node-node path The mean node-node path is two times the mean node-root path.  Number the levels of the tree with the root as 1 and the deepest level as N.  The path from t

What is boundary level masking, Q. What is Boundary Level Masking? ...

Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma

Difference between unicast and anycast, Difference between Unicast and Anyc...

Difference between Unicast and Anycast Unicast: An identifier for a single interface. A packet sent to a unicast address is delivered to the interface identified by that addres

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

Program, i need the job to be done within 3days

i need the job to be done within 3days

Discuss on the characteristics of agents, Question 1 Discuss on the cha...

Question 1 Discuss on the characteristics of agents 2 Belief, Desire and Intention architecture is the most popular agent architecture. Procedural Reasoning System (PRS) is

Explain the term ftp- file transfer protocol, Explain the term FTP: File T...

Explain the term FTP: File Transfer Protocol A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for pur

Role of software in intranet, Role of Software in Intranet For an Intr...

Role of Software in Intranet For an Intranet to be successful, it must have strong software support. In this section, a brief description of the operating system, groupware an

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd