SlideShare a Scribd company logo
1 of 26
Topic:- Coding Scheme
(i).- Information theory
(ii).- Error coding scheme.
Submitted to:- Submitted By:-
Mr. Hemant Kumar Meena 1. Pawan Kumar Jangid
Assistant Professor 2. Sunil Kumar Yadav
Dept. of Electrical Engineering,MNIT, Jaipur 3. Manish Kumar Bagara
4. Chandan Kumar
What is information theory:-
Information theory is a branch of applied mathematics,
electrical engineering, and computer science involving the
quantification of information. Information theory was
developed by Claude E. Shannon to find fundamental limits on
signal processing operations such as compressing data and on
reliably storing and communicating data.
Concept of Information Theory:-
A key measure of information is entropy, which is
usually expressed by the average number of bits needed
to store or communicate one symbol in a message.
Entropy quantifies the uncertainty involved in
predicting the value of a random variable. For example,
specifying the outcome of a fair coin flip (two equally
likely outcomes) provides less information (lower
entropy) than specifying the outcome from a roll of a
die (six equally likely outcomes).
Application of information theory:-
Lossless data compression (e.g. ZIP files)
Lossy data compression (e.g. Mp3s and jpegs)
Channel coding (e.g. For digital subscriber line (DSL)).
Important sub-fields of information theory are source coding,
channel coding, algorithmic complexity theory, algorithmic
information theory, information-theoretic security, and
measures of information.
APPLICATIONS IN OTHER AREAS:-
Including statistical inference
Natural language processing,
Cryptography
Neurobiology
The evolution and function of molecular codes
Model selection in ecology thermal physics
Quantum computing
Linguistics, Plagiarism detection, Pattern Recognition, Anomaly Detection
Error coding scheme (Error detection and correction) :-
 Techniques that enable reliable delivery of digital data over unreliable communication
channels.
 Error detection techniques allow detecting errors,
while error correction enables reconstruction of the original data in many cases.
Definitions:-
The general definitions of the terms are as follows:-
1. Error detection is the detection of errors caused by noise or other impairments during
transmission from the transmitter to the receiver.
2. Error correction is the detection of errors and reconstruction of the original, error-free data.
Error detection schemes:-
1 Repetition codes
2 Parity bits
3 Checksums
4 Cyclic redundancy checks (CRCs)
5 Cryptographic hash functions
6 Error-correcting codes
1. Repetition codes:-
 Coding scheme that repeats the bits across a channel to achieve error-free communication.
 The data are divided into blocks of bits. Each block is transmitted some predetermined number of times.
For example, to send the bit pattern "1011", the four-bit block can be repeated three times, thus producing "1011 1011
1011". However, if this twelve-bit pattern was received as "1010 1011 1011" – where the first block is unlike the other
two – it can be determined that an error has occurred.
2. Parity bits:-
A parity bit is a bit that is added to a group of source bits
to ensure that the number of set bits (i.e., bits with value
1) in the outcome is even or odd. It is a very simple
scheme that can be used to detect single or any other odd
number (i.e., three, five, etc.) of errors in the output. An
even number of flipped bits will make the parity bit appear
correct even though the data is erroneous.
Extensions and variations on the parity bit mechanism are
horizontal redundancy checks, vertical redundancy
checks, and "double," "dual," or "diagonal" parity (used in
RAID-DP).
Figure - Even-parity checking scheme
3. Checksums:-
A checksum of a message is a modular
arithmetic sum of message code words of a
fixed word length. The sum may be
negated by means of a ones'-complement
operation prior to transmission to detect
errors resulting in all-zero messages.
Checksum schemes include parity bits,
check digits, and longitudinal redundancy
checks. Some checksum schemes, such as
the Damm algorithm, the Luhn algorithm,
and the Verhoeff algorithm, are specifically
designed to detect errors commonly
introduced by humans in writing down or
remembering identification numbers.
Figure- Calculating Checksum
4. Cyclic redundancy checks (CRCs)
A cyclic redundancy check (CRC) is a non-secure
hash function designed to detect accidental changes
to digital data in computer networks; as a result, it
is not suitable for detecting maliciously introduced
errors. It is characterized by specification of what is
called a generator polynomial, which is used as the
divisor in a polynomial long division over a finite
field, taking the input data as the dividend, such
that the remainder becomes the result.
CRCs are particularly easy to implement in
hardware, and are therefore commonly used in
digital networks and storage devices such as hard
disk drives.
Figure - basic scheme for cyclic
redundancy checking
5. Cryptographic hash functions
• The output of a cryptographic hash function, also known as a message digest, can provide
strong assurances about data integrity, whether changes of the data are accidental or
maliciously introduced.
• Any modification to the data will likely be detected through a mismatching hash value.
• Furthermore, given some hash value, it is infeasible to find some input data that will yield the
same hash value.
• If an attacker can change not only the message but also the hash value, then a keyed hash or
message authentication code (MAC) can be used for additional security. Without knowing the
key, it is infeasible for the attacker to calculate the correct keyed hash value for a modified
message.
6. Error-correcting codes
Any error-correcting code can be used for error detection. A code with minimum Hamming
distance, d, can detect up to d − 1 errors in a code word. Using minimum-distance-based error-
correcting codes for error detection can be suitable if a strict limit on the minimum number of
errors to be detected is desired.
Codes with minimum Hamming distance d = 2 are degenerate cases of error-correcting codes, and
can be used to detect single errors. The parity bit is an example of a single-error-detecting code.
Error Correction :-
The techniques that we have discussed
so far can detect errors, but do not correct them.
Error Correction can be handled in two ways:-
1 . Backward error correction:-
When an error is
discovered, the receiver can have the sender retransmit
the entire data unit.
2 . Forward error correction(Error-correcting code):-
An error-
correcting code (ECC) or forward error correction (FEC)
code is a system of adding redundant data, or parity data,
to a message, such that it can be recovered by a receiver
even when a number of errors (up to the capability of the
code being used) were introduced, either during the
process of transmission, or on storage.
• Since the receiver does not have to ask the sender for
retransmission of the data, a backchannel is not
required in forward error correction.
• Error-correcting codes are frequently used in lower-
layer communication, as well as for reliable storage in
media such as CDs, DVDs, hard disks, and RAM.
• In theory it is possible to correct any number of errors
atomically.
• The number of bits required to correct multiple-bit or
burst error is so high that in most of the cases it is
inefficient to do so. For this reason, most error
correction is limited to one, two or at the most three-bit
errors.
Single-bit error correction:-
Concept of error-correction
can be easily understood by examining the simplest case
of single-bit errors.
• As we have already seen that a single-bit error can be
detected by addition of a parity bit with the data,
which needed to be send. A single additional bit can
detect error, but it’s not sufficient enough to correct
that error too. For correcting an error one has to know
the exact position of error. For this one has to know the
required number of redundant bits.
 To calculate the numbers of redundant bits (r) required
to correct d data bits .
 2r ≥ d+r+1
 Where d = no. of bits to be transmitted and
r = no. of redundant bits
Approach to a solution :-
1. Decide on the number of bits in the code word.
2. Determine the bit positions of the check bits.
3. Determine which parity bits check which positions
4. Calculate the values of the parity bits
The bit positions covered by each parity bit can be
calculated by writing each bit position as a sum of the
powers of 2:
1 = 1
2 = 2
3 = 1 + 2
4 = 4
5 = 1 + 4
6 = 2 + 4
7 = 1 + 2 + 4
8 = 8
9 = 1 + 8
10 = 2 + 8
11 = 3 + 8
12 = 4 + 8
a
Check bit 1 governs positions 1, 3, 5, 7, 9
Check bit 2 governs positions 2, 3, 6, 7, 10
Check bit 4 governs positions 4, 5, 6, 7, 12
Check bit 8 governs positions 8, 9, 10, 11, 12
man
Applications of Error Coding Scheme:-
 Internet:-
 In TCP/IP stack, error control is performed at multiple levels:
 -In Ethernet carries a CRC checksum.
 -IPv4 header use checksum to protect the contain of header.
 - IPv6 header, use link layer technology.
 -UDP provide checksum for error correction.
 -TCP provides a checksum for protection of addressing information
from the IP headers.
Deep-space telecommunications:-
• The Voyager 1 and Voyager 2 missions, in 1977, uses
convolution codes and reed Muller codes to delivers color
imaging amongst scientific information of Jupiter and Saturn.
• The Voyager 2 craft additionally Reed–Solomon code allowed
for very powerful error correction.
• Space mission uses more powerful Turbo codes and LDPC
code.
 Satellite broadcasting :-
• The demand for satellite transponder bandwidth
continues to grow.
• It uses forward error correction .
• QPSK coupled with Reed Solomon codes.
• PSK ,QAM increase transponder efficiency.
 Data storage:-
• Error detection improve reliability of data storage.
• ORC use in group code recoding detect and correct the errors.
• Read Solomon code used compact discs to correct errors
caused by scratches.
• Modern hard drives uses CRC codes to detect and correct the
minor errors.
 Error-correcting memory:-
 DRAM memory provide protection against soft errors by relying on
error correcting codes.
 ECC used in deep space application due to increase radiation.
 ECC generally use Hamming codes.
 ECC supports check summing errors detected on PCI bus. .
Thank You!

More Related Content

What's hot

Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionShubham Bammi
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission mediaPANKAJ333
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation Badrul Alam
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
Basics of channel coding
Basics of channel codingBasics of channel coding
Basics of channel codingDrAimalKhan
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionJeoffnaRuth
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)VARUN KUMAR
 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error CorrectionAditi Singhal
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 

What's hot (20)

Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Slides
SlidesSlides
Slides
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Full error detection and correction
Full error detection and correctionFull error detection and correction
Full error detection and correction
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Source coding
Source coding Source coding
Source coding
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission media
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
Basics of channel coding
Basics of channel codingBasics of channel coding
Basics of channel coding
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error Correction
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 

Similar to Information Theory and Error Coding Scheme

Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 
Error detecting and correcting codes
Error detecting and correcting codesError detecting and correcting codes
Error detecting and correcting codessaraswathi12
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerShashank HP
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsWilliam Chipman
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Information Theory and Error Coding Scheme (20)

Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
Dn4301681689
Dn4301681689Dn4301681689
Dn4301681689
 
Data link layer
Data link layerData link layer
Data link layer
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
B0210714
B0210714B0210714
B0210714
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detecting and correcting codes
Error detecting and correcting codesError detecting and correcting codes
Error detecting and correcting codes
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Data link layer
Data link layerData link layer
Data link layer
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax Communications
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from skysunilyadav

More from skysunilyadav (10)

Ecm sky
Ecm skyEcm sky
Ecm sky
 
Report
ReportReport
Report
 
Report
ReportReport
Report
 
My training
My trainingMy training
My training
 
Spectrum analyzer
Spectrum  analyzerSpectrum  analyzer
Spectrum analyzer
 
5. fourier properties
5. fourier properties5. fourier properties
5. fourier properties
 
4. cft
4. cft4. cft
4. cft
 
3. convolution fourier
3. convolution fourier3. convolution fourier
3. convolution fourier
 
2. signal & systems beyonds
2. signal & systems  beyonds2. signal & systems  beyonds
2. signal & systems beyonds
 
1. signal and systems basics
1. signal and systems basics1. signal and systems basics
1. signal and systems basics
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Information Theory and Error Coding Scheme

  • 1. Topic:- Coding Scheme (i).- Information theory (ii).- Error coding scheme. Submitted to:- Submitted By:- Mr. Hemant Kumar Meena 1. Pawan Kumar Jangid Assistant Professor 2. Sunil Kumar Yadav Dept. of Electrical Engineering,MNIT, Jaipur 3. Manish Kumar Bagara 4. Chandan Kumar
  • 2. What is information theory:- Information theory is a branch of applied mathematics, electrical engineering, and computer science involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental limits on signal processing operations such as compressing data and on reliably storing and communicating data.
  • 3. Concept of Information Theory:- A key measure of information is entropy, which is usually expressed by the average number of bits needed to store or communicate one symbol in a message. Entropy quantifies the uncertainty involved in predicting the value of a random variable. For example, specifying the outcome of a fair coin flip (two equally likely outcomes) provides less information (lower entropy) than specifying the outcome from a roll of a die (six equally likely outcomes).
  • 4. Application of information theory:- Lossless data compression (e.g. ZIP files) Lossy data compression (e.g. Mp3s and jpegs) Channel coding (e.g. For digital subscriber line (DSL)). Important sub-fields of information theory are source coding, channel coding, algorithmic complexity theory, algorithmic information theory, information-theoretic security, and measures of information.
  • 5. APPLICATIONS IN OTHER AREAS:- Including statistical inference Natural language processing, Cryptography Neurobiology The evolution and function of molecular codes Model selection in ecology thermal physics Quantum computing Linguistics, Plagiarism detection, Pattern Recognition, Anomaly Detection
  • 6. Error coding scheme (Error detection and correction) :-  Techniques that enable reliable delivery of digital data over unreliable communication channels.  Error detection techniques allow detecting errors, while error correction enables reconstruction of the original data in many cases. Definitions:- The general definitions of the terms are as follows:- 1. Error detection is the detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver. 2. Error correction is the detection of errors and reconstruction of the original, error-free data.
  • 7. Error detection schemes:- 1 Repetition codes 2 Parity bits 3 Checksums 4 Cyclic redundancy checks (CRCs) 5 Cryptographic hash functions 6 Error-correcting codes 1. Repetition codes:-  Coding scheme that repeats the bits across a channel to achieve error-free communication.  The data are divided into blocks of bits. Each block is transmitted some predetermined number of times. For example, to send the bit pattern "1011", the four-bit block can be repeated three times, thus producing "1011 1011 1011". However, if this twelve-bit pattern was received as "1010 1011 1011" – where the first block is unlike the other two – it can be determined that an error has occurred.
  • 8. 2. Parity bits:- A parity bit is a bit that is added to a group of source bits to ensure that the number of set bits (i.e., bits with value 1) in the outcome is even or odd. It is a very simple scheme that can be used to detect single or any other odd number (i.e., three, five, etc.) of errors in the output. An even number of flipped bits will make the parity bit appear correct even though the data is erroneous. Extensions and variations on the parity bit mechanism are horizontal redundancy checks, vertical redundancy checks, and "double," "dual," or "diagonal" parity (used in RAID-DP). Figure - Even-parity checking scheme
  • 9. 3. Checksums:- A checksum of a message is a modular arithmetic sum of message code words of a fixed word length. The sum may be negated by means of a ones'-complement operation prior to transmission to detect errors resulting in all-zero messages. Checksum schemes include parity bits, check digits, and longitudinal redundancy checks. Some checksum schemes, such as the Damm algorithm, the Luhn algorithm, and the Verhoeff algorithm, are specifically designed to detect errors commonly introduced by humans in writing down or remembering identification numbers. Figure- Calculating Checksum
  • 10. 4. Cyclic redundancy checks (CRCs) A cyclic redundancy check (CRC) is a non-secure hash function designed to detect accidental changes to digital data in computer networks; as a result, it is not suitable for detecting maliciously introduced errors. It is characterized by specification of what is called a generator polynomial, which is used as the divisor in a polynomial long division over a finite field, taking the input data as the dividend, such that the remainder becomes the result. CRCs are particularly easy to implement in hardware, and are therefore commonly used in digital networks and storage devices such as hard disk drives. Figure - basic scheme for cyclic redundancy checking
  • 11. 5. Cryptographic hash functions • The output of a cryptographic hash function, also known as a message digest, can provide strong assurances about data integrity, whether changes of the data are accidental or maliciously introduced. • Any modification to the data will likely be detected through a mismatching hash value. • Furthermore, given some hash value, it is infeasible to find some input data that will yield the same hash value. • If an attacker can change not only the message but also the hash value, then a keyed hash or message authentication code (MAC) can be used for additional security. Without knowing the key, it is infeasible for the attacker to calculate the correct keyed hash value for a modified message. 6. Error-correcting codes Any error-correcting code can be used for error detection. A code with minimum Hamming distance, d, can detect up to d − 1 errors in a code word. Using minimum-distance-based error- correcting codes for error detection can be suitable if a strict limit on the minimum number of errors to be detected is desired. Codes with minimum Hamming distance d = 2 are degenerate cases of error-correcting codes, and can be used to detect single errors. The parity bit is an example of a single-error-detecting code.
  • 12. Error Correction :- The techniques that we have discussed so far can detect errors, but do not correct them. Error Correction can be handled in two ways:- 1 . Backward error correction:- When an error is discovered, the receiver can have the sender retransmit the entire data unit.
  • 13. 2 . Forward error correction(Error-correcting code):- An error- correcting code (ECC) or forward error correction (FEC) code is a system of adding redundant data, or parity data, to a message, such that it can be recovered by a receiver even when a number of errors (up to the capability of the code being used) were introduced, either during the process of transmission, or on storage. • Since the receiver does not have to ask the sender for retransmission of the data, a backchannel is not required in forward error correction.
  • 14. • Error-correcting codes are frequently used in lower- layer communication, as well as for reliable storage in media such as CDs, DVDs, hard disks, and RAM. • In theory it is possible to correct any number of errors atomically. • The number of bits required to correct multiple-bit or burst error is so high that in most of the cases it is inefficient to do so. For this reason, most error correction is limited to one, two or at the most three-bit errors.
  • 15. Single-bit error correction:- Concept of error-correction can be easily understood by examining the simplest case of single-bit errors. • As we have already seen that a single-bit error can be detected by addition of a parity bit with the data, which needed to be send. A single additional bit can detect error, but it’s not sufficient enough to correct that error too. For correcting an error one has to know the exact position of error. For this one has to know the required number of redundant bits.
  • 16.  To calculate the numbers of redundant bits (r) required to correct d data bits .  2r ≥ d+r+1  Where d = no. of bits to be transmitted and r = no. of redundant bits
  • 17. Approach to a solution :- 1. Decide on the number of bits in the code word. 2. Determine the bit positions of the check bits. 3. Determine which parity bits check which positions 4. Calculate the values of the parity bits The bit positions covered by each parity bit can be calculated by writing each bit position as a sum of the powers of 2:
  • 18. 1 = 1 2 = 2 3 = 1 + 2 4 = 4 5 = 1 + 4 6 = 2 + 4 7 = 1 + 2 + 4 8 = 8 9 = 1 + 8 10 = 2 + 8 11 = 3 + 8 12 = 4 + 8
  • 19. a Check bit 1 governs positions 1, 3, 5, 7, 9 Check bit 2 governs positions 2, 3, 6, 7, 10 Check bit 4 governs positions 4, 5, 6, 7, 12 Check bit 8 governs positions 8, 9, 10, 11, 12
  • 20. man
  • 21. Applications of Error Coding Scheme:-  Internet:-  In TCP/IP stack, error control is performed at multiple levels:  -In Ethernet carries a CRC checksum.  -IPv4 header use checksum to protect the contain of header.  - IPv6 header, use link layer technology.  -UDP provide checksum for error correction.  -TCP provides a checksum for protection of addressing information from the IP headers.
  • 22. Deep-space telecommunications:- • The Voyager 1 and Voyager 2 missions, in 1977, uses convolution codes and reed Muller codes to delivers color imaging amongst scientific information of Jupiter and Saturn. • The Voyager 2 craft additionally Reed–Solomon code allowed for very powerful error correction. • Space mission uses more powerful Turbo codes and LDPC code.
  • 23.  Satellite broadcasting :- • The demand for satellite transponder bandwidth continues to grow. • It uses forward error correction . • QPSK coupled with Reed Solomon codes. • PSK ,QAM increase transponder efficiency.
  • 24.  Data storage:- • Error detection improve reliability of data storage. • ORC use in group code recoding detect and correct the errors. • Read Solomon code used compact discs to correct errors caused by scratches. • Modern hard drives uses CRC codes to detect and correct the minor errors.
  • 25.  Error-correcting memory:-  DRAM memory provide protection against soft errors by relying on error correcting codes.  ECC used in deep space application due to increase radiation.  ECC generally use Hamming codes.  ECC supports check summing errors detected on PCI bus. .