Show the error correction by hamming code, Computer Networking

Assignment Help:

Q. Show the Error Correction by Hamming Code?

Hamming Code is able to be applied to data units of any length and uses the relationship between data and redundancy bits

For instance a 7-bit ASCII code requires 4 redundancy bits that can be added to the end of the data unit or mixed with the original data bits which are placed in positions 1, 2, 4 and 8 that is x0,x1,x2,x3 etc.

969_Show the Error Correction by Hamming Code.png

In the Hamming Code every "r" bit for one combination of data bits as below:

  • r1: bits 1, 3, 5, 7, 9, 11
  • r2: bits 2, 3, 6, 7, 10, 11
  • r3: bits 4, 5, 6, 7
  • r4: bits 8, 9, 10, 11

749_Show the Error Correction by Hamming Code1.png

1364_Show the Error Correction by Hamming Code2.png

1142_Show the Error Correction by Hamming Code3.png


Related Discussions:- Show the error correction by hamming code

Parts count method calculation, M E T HOD OF CALCULATION It involves...

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Explain how reducing ineffective taxation, Question: (a) With mobile t...

Question: (a) With mobile telecommunications providing an important engine for growth, continuing to stimulate growth and to ensure mobiles remain affordable for all, will re

Flash-nvram-system buffer-interface buffer, Flash It is also permanent...

Flash It is also permanent storage device. It stores the compressed form of Cisco IOS software image and the NVRAM data. Device structure One flash socket Support 80

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

Routers - network layer and routing , Routers The network  layer (also ...

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd