SlideShare a Scribd company logo
1 of 22
Error Correcting Codes
T-Com
How Is Data Transmitted ?
Occurrence of Error
Causes of Error (Noise):
o Multi-path propagation of the signal.
o Interference from other communication devices
Contd..
Solution
Channel Coding
Block Codes
● Divide the message into blocks each of k bits
called data words.
● Add r redundant bits to each blocks to make
the length n = k+r.
● Examples : Hamming Codes, Reed-Muller
Codes
Redundancy Coding
● In n-redundancy coding, each data bit is encoded in n
bits.
● In a 3-redundancy coding scheme, a ‘0’ data bit is
encoded as ‘000’ and a ‘1’ data bit is encoded as ‘111’.
How does it reduce the error?
❏ The decoder is taking blocks of n bits.
❏ The decoder expects all n bits to have the same value
❏ When the n bits in a block do not have the same value,
the decoder detects an error
❏ n-redundancy coding can correct up to (n-1)/2 bits in a
code
Correction Abilities of Codes
Signal Transmission Example
Hamming Code
❏ Hamming codes can correct one-bit errors
❏ 2r >= n + r + 1 , r=redundancy bits
n=data bits
Redundancy bits calculation
r1 will take care of these bits
r2 will take care of these bits
r4 will take care of these bits
r8 will take care of these bits
Example
d
d
d
r
d
d
d
r
d
r
Error Correction using hamming code
Reed Muller Code:R(1,3)
One of the interesting things about these codes is that
there are several ways to describe them and we shall look
at one of these-
1st order Reed Muller R(1,3) which can correct one bit
error.
Contd..
Need a Generator matrix
Dimension is
Encoding
❏ rows in the generator matrix = Dimension
❏ So 3 vectors are there and hence total length of the code to be sent =23
❏ Let m = (m1, m2, . . . mk) be a block, the encoded message Mc is
Mc=∑i=1,kmiri
where ri is a row of the encoding matrix of R(r, m).
❏ For example, using R(1, 3) to encode m = (0110) gives:
0 ∗(11111111) + 1 ∗(11110000) + 1 ∗(11001100) + 0 ∗(10101010) =
(00111100)
Decoding
❏ The rows of this matrix are basis vectors for the code v0, v1,v2 and v3.
❏ Any vector v of the code is a linear combination of these v =
a0v0+a1v1+a2v2 + a3v3
❏ If no errors occur, a received vector r = (y0, y1, y2, y3, y4, y5, y6,y7)
a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7
a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7
a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7
❏ If one error has occurred in r, then when all the calculations above are
made, 3 of the 4 values will agree for each ai, so the correct value will be
obtained by majority decoding.
a0 =r + a1v1 + a2v2 + a3v3
Example
Let m=1101 & Suppose that v = 10100101 is received as r= 10101101. Using,
a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7
a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7
a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 we calculate:
a1 =1=1=0=1
a2 =0=0=1=0
a3 =0=1=1=1
a1 =1 a2 =0 a3 =1
a0 =r + a1v1 + a2v2 + a3v3
So,10101101 + 01010101 + 00001111 = 11110111.
➔ a0 = 1
Contd..
❏ Decoded data bits are:a0 a1 a2 a3 =1101
v = a0v0 + a1v1 + a2v2 + a3v3
v = 11111111 + 01010101 + 00001111 = 10100101
❏ On comparing with r=10101101 we can find the error bit which is the fifth
bit.
References
❏ Reed-Muller Error Correcting Codes by Ben Cooke:
❏ http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.
1.1.208.440&rep=rep1&type=pdf
❏ Error Correction Code by Todd K Moon
❏ Hamming Block Codes:
http://web.udl.es/usuaris/carlesm/docencia/xc1/Treba
lls/Hamming.Treball.pdf
End of the presentation
ThankYou
Akshit Jain 2013124
Nitin Varun 2013070

More Related Content

What's hot

basic computer programming and micro programmed control
basic computer programming and micro programmed controlbasic computer programming and micro programmed control
basic computer programming and micro programmed controlRai University
 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operationNikhil Pandit
 
8086 instructions
8086 instructions8086 instructions
8086 instructionsRavi Anand
 
8085 addressing modes
8085 addressing modes8085 addressing modes
8085 addressing modesVijay Kumar
 
Line coding presentation
Line coding presentationLine coding presentation
Line coding presentationDibyendu Porey
 
8051 programming skills using EMBEDDED C
8051 programming skills using EMBEDDED C8051 programming skills using EMBEDDED C
8051 programming skills using EMBEDDED CAman Sharma
 
BCD to binary code converter
BCD to binary code converterBCD to binary code converter
BCD to binary code converterkiruthikamaniG1
 
Microinstruction sequencing new
Microinstruction sequencing newMicroinstruction sequencing new
Microinstruction sequencing newMahesh Kumar Attri
 
Chapter 5The proessor status and the FLAGS registers
Chapter 5The proessor status and the FLAGS registersChapter 5The proessor status and the FLAGS registers
Chapter 5The proessor status and the FLAGS registerswarda aziz
 
Presentation bcd adder
Presentation bcd adderPresentation bcd adder
Presentation bcd adderNokiBul
 
memory reference instruction
memory reference instructionmemory reference instruction
memory reference instructionDeepikaT13
 
Representation of numbers and characters
Representation of numbers and charactersRepresentation of numbers and characters
Representation of numbers and characterswarda aziz
 

What's hot (20)

basic computer programming and micro programmed control
basic computer programming and micro programmed controlbasic computer programming and micro programmed control
basic computer programming and micro programmed control
 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
8086 instructions
8086 instructions8086 instructions
8086 instructions
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 
8085 addressing modes
8085 addressing modes8085 addressing modes
8085 addressing modes
 
Arithmetic and logical instructions
Arithmetic and logical instructionsArithmetic and logical instructions
Arithmetic and logical instructions
 
Line coding presentation
Line coding presentationLine coding presentation
Line coding presentation
 
8086 alp
8086 alp8086 alp
8086 alp
 
8051 interrupts
8051 interrupts8051 interrupts
8051 interrupts
 
8051 programming skills using EMBEDDED C
8051 programming skills using EMBEDDED C8051 programming skills using EMBEDDED C
8051 programming skills using EMBEDDED C
 
BCD to binary code converter
BCD to binary code converterBCD to binary code converter
BCD to binary code converter
 
Interrupt
InterruptInterrupt
Interrupt
 
Microinstruction sequencing new
Microinstruction sequencing newMicroinstruction sequencing new
Microinstruction sequencing new
 
Addressing sequencing
Addressing sequencingAddressing sequencing
Addressing sequencing
 
Chapter 5The proessor status and the FLAGS registers
Chapter 5The proessor status and the FLAGS registersChapter 5The proessor status and the FLAGS registers
Chapter 5The proessor status and the FLAGS registers
 
Micro program example
Micro program exampleMicro program example
Micro program example
 
Presentation bcd adder
Presentation bcd adderPresentation bcd adder
Presentation bcd adder
 
memory reference instruction
memory reference instructionmemory reference instruction
memory reference instruction
 
Representation of numbers and characters
Representation of numbers and charactersRepresentation of numbers and characters
Representation of numbers and characters
 

Viewers also liked

Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and CorrectionTechiNerd
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerAbdullaziz Tagawy
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6njit-ronbrown
 
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)marujirou
 
Ch11 communication
Ch11  communicationCh11  communication
Ch11 communicationadrienne0901
 
Introduction of reflection
Introduction of reflection Introduction of reflection
Introduction of reflection Ravindra Rathore
 
Lecture 5 phasor notations
Lecture 5 phasor notationsLecture 5 phasor notations
Lecture 5 phasor notationsRavindra Rathore
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesMadhumita Tamhane
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrumRina Ahire
 

Viewers also liked (20)

Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6
 
Computer network
Computer networkComputer network
Computer network
 
Galois field
Galois fieldGalois field
Galois field
 
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
Semantic Compositionality through Recursive Matrix-Vector Spaces (Socher et al.)
 
28 networking
28  networking28  networking
28 networking
 
Ch11 communication
Ch11  communicationCh11  communication
Ch11 communication
 
26 io -ii file handling
26  io -ii  file handling26  io -ii  file handling
26 io -ii file handling
 
Introduction of reflection
Introduction of reflection Introduction of reflection
Introduction of reflection
 
21 multi threading - iii
21 multi threading - iii21 multi threading - iii
21 multi threading - iii
 
22 multi threading iv
22 multi threading iv22 multi threading iv
22 multi threading iv
 
Lecture 5 phasor notations
Lecture 5 phasor notationsLecture 5 phasor notations
Lecture 5 phasor notations
 
Vlsi
VlsiVlsi
Vlsi
 
Fiber optics101
Fiber optics101Fiber optics101
Fiber optics101
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 

Similar to Error Correcting Codes Explained: Block Codes, Redundancy Coding, Hamming Codes & Reed-Muller Codes

4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdfkenilpatel65
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf230231060
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionJeoffnaRuth
 
Computer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptxComputer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptxTemesgen Geta
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabSneheshDutta
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.pptprashant513130
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailedIKhait
 

Similar to Error Correcting Codes Explained: Block Codes, Redundancy Coding, Hamming Codes & Reed-Muller Codes (20)

linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Cn lec-06
Cn lec-06Cn lec-06
Cn lec-06
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
error control coding
error control coding error control coding
error control coding
 
Computer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptxComputer Representation of Numbers and.pptx
Computer Representation of Numbers and.pptx
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
 
ch10_2_v1.ppt
ch10_2_v1.pptch10_2_v1.ppt
ch10_2_v1.ppt
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Error Correcting Codes Explained: Block Codes, Redundancy Coding, Hamming Codes & Reed-Muller Codes

  • 2. How Is Data Transmitted ?
  • 3. Occurrence of Error Causes of Error (Noise): o Multi-path propagation of the signal. o Interference from other communication devices
  • 6. Block Codes ● Divide the message into blocks each of k bits called data words. ● Add r redundant bits to each blocks to make the length n = k+r. ● Examples : Hamming Codes, Reed-Muller Codes
  • 7. Redundancy Coding ● In n-redundancy coding, each data bit is encoded in n bits. ● In a 3-redundancy coding scheme, a ‘0’ data bit is encoded as ‘000’ and a ‘1’ data bit is encoded as ‘111’.
  • 8. How does it reduce the error? ❏ The decoder is taking blocks of n bits. ❏ The decoder expects all n bits to have the same value ❏ When the n bits in a block do not have the same value, the decoder detects an error ❏ n-redundancy coding can correct up to (n-1)/2 bits in a code
  • 11. Hamming Code ❏ Hamming codes can correct one-bit errors ❏ 2r >= n + r + 1 , r=redundancy bits n=data bits
  • 12. Redundancy bits calculation r1 will take care of these bits r2 will take care of these bits r4 will take care of these bits r8 will take care of these bits
  • 14. Error Correction using hamming code
  • 15. Reed Muller Code:R(1,3) One of the interesting things about these codes is that there are several ways to describe them and we shall look at one of these- 1st order Reed Muller R(1,3) which can correct one bit error.
  • 16. Contd.. Need a Generator matrix Dimension is
  • 17. Encoding ❏ rows in the generator matrix = Dimension ❏ So 3 vectors are there and hence total length of the code to be sent =23 ❏ Let m = (m1, m2, . . . mk) be a block, the encoded message Mc is Mc=∑i=1,kmiri where ri is a row of the encoding matrix of R(r, m). ❏ For example, using R(1, 3) to encode m = (0110) gives: 0 ∗(11111111) + 1 ∗(11110000) + 1 ∗(11001100) + 0 ∗(10101010) = (00111100)
  • 18. Decoding ❏ The rows of this matrix are basis vectors for the code v0, v1,v2 and v3. ❏ Any vector v of the code is a linear combination of these v = a0v0+a1v1+a2v2 + a3v3 ❏ If no errors occur, a received vector r = (y0, y1, y2, y3, y4, y5, y6,y7) a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7 a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7 a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 ❏ If one error has occurred in r, then when all the calculations above are made, 3 of the 4 values will agree for each ai, so the correct value will be obtained by majority decoding. a0 =r + a1v1 + a2v2 + a3v3
  • 19. Example Let m=1101 & Suppose that v = 10100101 is received as r= 10101101. Using, a1 =y0 +y1 =y2 +y3 =y4 +y5 =y6 +y7 a2 =y0 +y2 =y1 +y3 =y4 +y6 =y5 +y7 a3 =y0 +y4 =y1 +y5 =y2 +y6 =y3 +y7 we calculate: a1 =1=1=0=1 a2 =0=0=1=0 a3 =0=1=1=1 a1 =1 a2 =0 a3 =1 a0 =r + a1v1 + a2v2 + a3v3 So,10101101 + 01010101 + 00001111 = 11110111. ➔ a0 = 1
  • 20. Contd.. ❏ Decoded data bits are:a0 a1 a2 a3 =1101 v = a0v0 + a1v1 + a2v2 + a3v3 v = 11111111 + 01010101 + 00001111 = 10100101 ❏ On comparing with r=10101101 we can find the error bit which is the fifth bit.
  • 21. References ❏ Reed-Muller Error Correcting Codes by Ben Cooke: ❏ http://citeseerx.ist.psu.edu/viewdoc/download?doi=10. 1.1.208.440&rep=rep1&type=pdf ❏ Error Correction Code by Todd K Moon ❏ Hamming Block Codes: http://web.udl.es/usuaris/carlesm/docencia/xc1/Treba lls/Hamming.Treball.pdf
  • 22. End of the presentation ThankYou Akshit Jain 2013124 Nitin Varun 2013070

Editor's Notes

  1. This topic is motivated by the problem of communicating reliably over noisy chan- nels — where the data sent over the channel may come out corrupted on the other end, butbut the receiver wasn’t able to correct the errors and recover the original message. The data is transmitted in the form of binary bits 1’s and 0’s.The encoder converts the message in binary and is transmitted by the transmitter.
  2. During the transmission the data due to noise or multipath propogation may get corrupted i.e the bits may flip or lost.
  3. These are the basically the forms of data transmitted and the errors
  4. The solution to the problem is chanel coding i.e error correction by encoding the message with some redundant bits and making the receiver side decode the message.This will prevent the continuous call to retransmission and hence save bandwidth and time and cost.
  5. Block codes are one of the kind of methods of error correction.In these methods we divide our message into equally sized blocks which is called data words. And in it we also add extra bits which is called redundant bits to the original data which will be used later to correct errors in the message.we will discuss two block codes methods Hamming codes and Reed Muller.
  6. Before discussing humming and reed muller let’s first discuss one of the simplest block codes Redundancy coding.In it we send each bits multiple times depending upon redundancy level. As we can see from given example we want to send 100 and we encoded our message by repeating each bit 3 times
  7. Now how does it reduces error. the decoder will take blocks of n bits depending upon our redundancy level. and will check bits in each block if all the bits are not same in a block then there is an error and it will check for the majority bits in the block and select that bit. So basically we know that for n bits the majority bit will be that bit which occurs more than n -1 /2 times.if there are less than or equal to n-1 /2 errors in a block then it can correct that errors.
  8. here we can see how redundant coding is useful in reducing errors in received messages.
  9. the hamming code can correct upto one bit errors.Suppose we want to send n bits then according to this equation we can detect the number of redundancy bits required to detect and correct that error. From the figure We arrange all these bits in a pattern and the redundancy bits are arranged on the 2^ positions.This is till the no. of redundancy bits gets completed and then we arrange the data bits at remaining positions.
  10. [Look at the figure] the parity bits are calculated using the data bits and they are used in some order and here it is explain for each parity bit.
  11. Lets see an example
  12. Suppose the code received is erroraneous and we know the error is at bit 7 but the receiver doesn’t know that.So,how will it find it.Let’s see. Calculate the check bits using the parity bits [sort of C0,C1,C2] .Arrange it like this and Take these calculated check bits together and get the number.That bit will be corrupted.
  13. Now lets see the last code which is reed muller and it is the most interesting and the complex one. here we are explain only first order reed muller code of block size of 2 ^ 3 bits which can correct one bit error.
  14. this is a generation matrix and this the dimension equation which are required in generating the code
  15. the encoding matrix is created by putting the first row as one and then adding k-1 rows. k is the dimension of reed muller code and which also specify the amount of data bits which sent in one block.
  16. The rows of the matrix are represented as v0,v1,v2,v3. The block of bits which we will send is called a vecotr and is represented as [equation] Suppose the received vector is r as shown Then we will decode this vector using an algorithm.These are the equations and they are formed basically by using the characterstic equations and these are--- Now these bits are calculated using the majority bits in the four characterstic equations for each bit a0 to a3 Now this is the reason the code detects only one error.As if only one bit wrong then only one equation is affected for each data bit and hence can find the majority. a0 is calculated using the majorith in the a0 equation
  17. a0 is