SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
23
Survey on Error Control Coding Techniques
Suriya.N1
S.Kamalakannan2
SNS College of Engineering, Department of ECE, SNS College of Engineering, Department of ECE,
surikala@gmail.com kamalakannan.ap@gmail.com
Abstract - Error Control Coding techniques used to ensure that the information received is correct and has not been
corrupted, owing to the environmental defects and noises occurring during transmission or the data read operation
from Memory. Environmental interference and physical effects defects in the communication medium can cause
random bit errors during data transmission. While, data corruption means that the detection and correction of bytes
by applying modern coding techniques. Error control coding divided into automatic repeat request (ARQ) and
forward error correction (FEC).First of all, In ARQ, when the receiver detects an error in the receiver; it requests
back the sender to retransmit the data. Second, FEC deals with system of adding redundant data in a message and
also it can be recovered by a receiver even when a number of errors were introduce either during the process of data
transmission, or on the storage. Therefore, error detection and correction of burst errors can be obtained by Reed-
Solomon code. Moreover, the Low-Density Parity Check code furnishes outstanding performance that sparingly
near to the Shannon limit.
Index Terms-Error control coding (ECC), Forward Error Correction (FEC), Reed-Solomon (RS) code,
Redundancy,Low- Density Parity Check (LDPC) code.
1 INTRODUCTION
Error detection and correction helps in transmitting
data in a noisy channel to transmit data without errors.
Specifically, Error detection refers to detecting errors if
any, received by the receiver and correction is to correct
errors received by the receiver [5].
Error correction and detection achieved by two
methods:
(i) Automatic Repeat Request
(ii) Forward error correction
First of all, Automatic Repeat Request is an error
control technique whereby an error detection scheme
combined with requests for retransmission of incorrect
data. Second, Forward error correction is an error
correction method, correcting the errors without
retransmission of data and adding redundancy to the
message, to recover the original data in the receiver.
Especially, In Forward error correction, the receiver
does not ask to retransmit the data again and also error
is corrected and suitable for simplex communication
such as broadcasting.
Fig.1.systematic block encoding for error correction.
Figure 1 show that systematic block encoding for error
correction.ECC can be divided into two
classes.convolutional codes and Block codes.
Convolutional codes are processed on a bit by bit basis
and here the sequence of messages modified into the
sequence of codes. Hence, the encoder needs memory as
the bestow code is the combination of the present and
the past message. In addition, they are suitable for
hardware implementation and also Viterbi decoder
allows optimal decoding.
First of all, Block codes are processed on a
block by block basis. Second, no memory required for
block codes and these codes called as repetition codes,
hamming codes, cyclic redundancy check & BCH
codes. Specifically, LDPC & Turbo codes have recent
constructions that can provide almost optimal
efficiency.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
24
2 ERROR DETECTION SCHEMES
2.1 Parity Check
Error detection means that detecting errors
and it can be achieved through parity bits or CRC. Of
course, one extra bit added to the message to create
the number of 1‟s either, even in the case of even parity
or odd in case of odd parity.
The drawback of this method, if a single bit
error takes place, then the receiver can detect it by
counting the number of 1‟s. But when more than one bit
is in error it is sparingly difficult for the receiver to
detect the error.
2.2 Checksum
The Checksum has to be determined in the
transmitter and sent with the real data. However in
receiver, checksum is done and compare with the
received checksum .Besides that, a mismatch is an
indication of the error.
The drawback of this scheme as data and
checksum has received with an error and then the
detection may not be possible.
2.3 Cyclic Redundancy Check
At first, the message interpreted as polynomial
and it can be divided by a generator polynomial. Then
the reminder of the division added to the actual message
polynomial to form a code polynomial. Besides that, the
code polynomial is invariably divisible by the generator
polynomial. This property has been checked by the
receiver. If failed to satisfy this property the received
code word has error. Finally, it was complex but
efficient error detection scheme.
3 ERROR CORRECTION SCHEMES
3.1 Hamming code
Hamming codes are the first class of block
codes for error correction. Besides that, it can be used to
detect single and double bit errors and corrects single -
bit errors.
Design of hamming code as (n,k,t) code refers
to an „n‟ bit codeword having „k‟ data bits and „r‟(n-k)
redundant bits having capability of correcting „t‟ bits in
the error(„t‟- corrupted bits).the hamming rule defined
as
2k
≥n+k+1
Rule1:
(i)All bit positions that are of the form 2j
are
used as data bits.
(ii)The remaining positions can be used as
message bits(like 3,5,6,7,9,10,11,12,13,14,17,18…….)
To illustrate that, code will be in the form of
P1 P2 D3 P4 D5 D6 D7 P8 D9 D10
……………..
Where P1, P2, P4, P8 are parity bits
D3, D5, D6, D7 are data bits
The drawback of this scheme, if more than
one bit has an error then it will cause a system to
malfunction.
3.2 BCH Code
BCH code can be the form of a large class of
puissant random error correcting cyclic codes. Binary
BCH codes discovered by Hocquenghem in 1959 and
independently by Bose & Chaudhuri in
1960.Additionally BCH code have the generalization of
hamming codes for multiple error correction.
These codes are imperative for two reasons:
1. Simple decoding scheme.
2. The class of BCH code is quite large.
Indeed, for any positive integers r and t
with t≤2r-1
-1, there is a BCH code of
length n=2r
-1 that is t-correcting and has
dimension k≥n-rt.
3.3 Reed-Solomon code
Specifically, RS code used for the successful
forward error correction code in practice today.
Consequently, It can correct multiple and long burst
errors with a relatively high code rate and the number of
errors in the code can correct depends upon the amount
of parity bits added. In any number of bits within the
symbol are corrupted, after that RS code can correct the
entire symbol [6].Figure 2 shows that RS(n,k) code in
systematic form.
RS code can correct errors in the wide range of
systems in digital communications. RS codes widely
used in Compact Discs, DVDs, Barcodes and wireless
and mobile communications. Accordingly it is also used
in satellite communications and broadband modems.
K Symbols 2t Symbols
Fig.2 RS (n,k) code
A t-error correcting RS code with symbols
from GF (q) has following parameters:
Block length: n = q-1
Number of parity-check digits: n-k =2t
Minimum distance: dmin=2t+1
Construct a t- error correcting RS code of length q-1
with entries in GF (q).find the primitive element
α€GF(q).The dimension of the code is k=q-2t-1.
Unchanged Data Parity
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
25
Error correction capacity= (length-dimension)/2.
For encoding process, initially find the
generator polynomial
…………. (1)
Fig.3 LFSR Encoder circuit for an RS code
The message polynomial M(X) is the order of k-1,
M(x)=Mk-1 xk-1
+…………..+M 1x+M0
………….(2)
Where each of the coefficients Mk-1, M1, M0
…………….. as m-bit message symbol.
First of all, to encode the information, the
message polynomial multiplied by Xn-k
and the result is
divided by g(x), the remainder called as parity check
polynomial P(x).
Finally, Codeword as formed in systematic
form.
C(x) = M(x) + P(x)…………….(3)
In decoding the process, errors can be added
with the coded message polynomial E(x).
The received polynomial is
R(x) =C(x) +E(x)…………..(4)
Where E(x) =En-1xn-1
+…………..+E1x+E0………(5)
The decoding steps are,
i) Syndrome calculation: error detection
ii) Key equation solver -To find the
coefficients of the error locator polynomial.
iii) Chien search algorithm-To find the roots of
the error locator polynomial.
iv) Forney algorithm- To find the value of the
errors.
As a result, we can correct the received codeword by
XORing the received vector with the error vector.
3.4 Low Density Parity Check Code
At first, LDPC (Low-Density Parity Check) codes
are a class of linear block code. The term “Low-
Density” refers to the characteristic of the parity check
matrix which contains only a few „1‟s in comparison to
„0‟s. Especially, LDPC codes are arguably the best error
correction codes in existence at bsetow. LDPC codes
were first introduced by R. Gallager in his PhD thesis in
earlier 1960 and soon forgotten due to the introduction
of Reed-Solomon codes and the implementation issues
with limited technological know how at that time. In
addition, the LDPC codes were rediscovered in mid-90s
by R. Neal and D. Mackay at the Cambridge University
[1].
As a result, it has better block error
performance which exactly close to Shannon limit.
An (n, k) block code takes k bits (message
bits) at a time and produces n bits (code bits).adding the
redundancy make that the errors correction.
u= [u0 u1 u2……uk-1]
c= [c0 c1 c2……cn-1]
Where u be collection of k message bits,
c be the collection of n encoded bits called as a
codeword.
Code rate: r =k/n.
Codeword encoded through the generator
matrix,
C=u*G
For every generator matrix, there exist many
parity check matrices that satisfy
G*HT
=0
Where G= [Ik P]
H = [PT
In-k ]
P = Parity check matrix
LDPC Code represented by parity check matrix H that
must satisfy
c.HT
= 0
where codeword denoted as c.
Check nodes
Bit nodes
r0 r1 r2 r31
g
31
g
1
g
2
g
0
m(x)
r(x)
c(x)
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
26
Fig. 4 Tanner graph representation of a
parity check matrix.
Figure 4 shows that tanner graph representation
of a parity check matrix. Here, Decoding can be the
decision process which finds a codeword that minimizes
the probability of decoded error based on a received
word.
Decoding algorithms are,
1. Sum product algorithm
2. Bit flipping algorithm
3. Min sum algorithm
Nowadays LDPC code used in DVB-S2 & Wi-
MAX standard. Furthermore LDPC code can be used
along with RS codes for OFDM application for high
data rates. As a result, LDPC code as the strong
candidate for 4G or 5G error correcting code.
3.5 Convolutional Code
In particular, Convolutional codes differ from block
codes, the encoder contains memory and n encoder
outputs at any time unit depends not only on the k inputs
but also m previous inputs.
Fig.5 convolution code
In Figure 5, Convolutional code is generated by
passing message sequence to be transmitted through a
linear finite state shift register. Shift register contains k
(k-bit) stages and linear algebraic function generators.
Furthermore, Encoding is achieved by three methods,
state diagram, trellis diagram and tree diagram.
In particular, Trellis diagrams are difficult but
generally preferred over both tree and state diagrams
because they represent linear time sequencing of events.
The performance of the convolutional codes depends
upon the decoding algorithm and also the distance
properties of the code.
Different ways to decoding the convolutional codes.
1. Sequence decoding
-fano algorithm
2. Maximum likelihood decoding
-Viterbi decoding
F. Turbo codes
Turbo codes are the class of FEC codes
developed in 1990.It is the concatenation of two
convolutional codes. Hence, it can be concatenated
either in serial, parallel or hybrid manner. In addition,
Turbo codes yield better performance at low signal to
noise ratio.
Input xi Systematic output xi
Fig.6 Block Diagram of the Turbo encoder
Fig .7 Block Diagram of the turbo decoder
In Figure 7, two component decoders are linked by
inter-leaver in a structure manner similar to that of
encoder.
Two suitable decoder methods are
i) Soft output viterbi algorithm
ii) Maximum posteriori probability
Usually, turbo codes are used for many
commercial applications, including third-generation
cellular systems UMTS and CDMA 2000.
4 CONCLUSION
To summarize that Hamming code correct only
single bit error. RS code corrects both burst errors and
+
+ +
+ +
Code digits
digits
Binary information
digits
+
Encoder I
Encoder II
Interleaver
Output I
Output II
Decoder 1 Interleaver
Decoder 2
De-
interl
eaver
Input 2
Input 1
Final
Output
^
1
De-interleaver
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
27
random errors.BCH targets only single bit errors.
However it is better than RS code, when we given the
same parity check bits for both RS and BCH code. In
particular, code with higher redundancy, can usually
correct more errors because code rate is low. If more
errors can be corrected, then the communication system
operate with a lower transmit power and high data rate.
LDPC& turbo code has the same performance
which is sparingly close to the Shannon‟s theorem. But
LDPC does not require long inter-leaver to achieve
better performance. In contrast, due to usage of inter-
leaver, Turbo code has high latency than the LDPC
code. To conclude that LDPC code have significantly
lower complexity at performance, S/N ratio and code
lengths.
REFERENCES
[1] R. Gallagar “Low-Density Parity Check Code” IRE
Transaction paper Theory pp 21-28, Jan 1962.
[2]Reed Solomon codes-principles,
architechures.http://www.cs.cmu.edu/~guyb/realworld/reed
solomon/reed_solomon_codes.html
[3] Lin and Costello, "Error Control Coding: Fundamentals
and Applications", Prentice-Hall 1983.
[4]Kjetil Fagervik and Arne Sjøthun Larssen “Performance
and complexity comparison of low density parity check
codes and turbo codes”.
[5]en.wikipedia.org/wiki/Error_detection_and_correction.
[6] http://www.cyclicdesign.com/index.php/

More Related Content

What's hot

Book wiegandschwarz
Book wiegandschwarzBook wiegandschwarz
Book wiegandschwarzdavid s
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityIAEME Publication
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...IOSR Journals
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)VARUN KUMAR
 
Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on GraphsHossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphsknowdiff
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodeIJERA Editor
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...ijwmn
 
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...IJMERJOURNAL
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 

What's hot (20)

Book wiegandschwarz
Book wiegandschwarzBook wiegandschwarz
Book wiegandschwarz
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Slides
SlidesSlides
Slides
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on GraphsHossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphs
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
Jb2415831591
Jb2415831591Jb2415831591
Jb2415831591
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
 
K0216571
K0216571K0216571
K0216571
 
Turbocode
TurbocodeTurbocode
Turbocode
 
Error control coding
Error control codingError control coding
Error control coding
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
 
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 

Similar to Survey on Error Control Coding Techniques

Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeskysunilyadav
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basicsRam Singh Yadav
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -IntroductionBurdwan University
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correctioninventionjournals
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knightDevanshi Piprottar
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 

Similar to Survey on Error Control Coding Techniques (20)

Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
C04922125
C04922125C04922125
C04922125
 
Data link layer
Data link layerData link layer
Data link layer
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basics
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Dn4301681689
Dn4301681689Dn4301681689
Dn4301681689
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
B0210714
B0210714B0210714
B0210714
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
Data link layer
Data link layerData link layer
Data link layer
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Survey on Error Control Coding Techniques

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 23 Survey on Error Control Coding Techniques Suriya.N1 S.Kamalakannan2 SNS College of Engineering, Department of ECE, SNS College of Engineering, Department of ECE, surikala@gmail.com kamalakannan.ap@gmail.com Abstract - Error Control Coding techniques used to ensure that the information received is correct and has not been corrupted, owing to the environmental defects and noises occurring during transmission or the data read operation from Memory. Environmental interference and physical effects defects in the communication medium can cause random bit errors during data transmission. While, data corruption means that the detection and correction of bytes by applying modern coding techniques. Error control coding divided into automatic repeat request (ARQ) and forward error correction (FEC).First of all, In ARQ, when the receiver detects an error in the receiver; it requests back the sender to retransmit the data. Second, FEC deals with system of adding redundant data in a message and also it can be recovered by a receiver even when a number of errors were introduce either during the process of data transmission, or on the storage. Therefore, error detection and correction of burst errors can be obtained by Reed- Solomon code. Moreover, the Low-Density Parity Check code furnishes outstanding performance that sparingly near to the Shannon limit. Index Terms-Error control coding (ECC), Forward Error Correction (FEC), Reed-Solomon (RS) code, Redundancy,Low- Density Parity Check (LDPC) code. 1 INTRODUCTION Error detection and correction helps in transmitting data in a noisy channel to transmit data without errors. Specifically, Error detection refers to detecting errors if any, received by the receiver and correction is to correct errors received by the receiver [5]. Error correction and detection achieved by two methods: (i) Automatic Repeat Request (ii) Forward error correction First of all, Automatic Repeat Request is an error control technique whereby an error detection scheme combined with requests for retransmission of incorrect data. Second, Forward error correction is an error correction method, correcting the errors without retransmission of data and adding redundancy to the message, to recover the original data in the receiver. Especially, In Forward error correction, the receiver does not ask to retransmit the data again and also error is corrected and suitable for simplex communication such as broadcasting. Fig.1.systematic block encoding for error correction. Figure 1 show that systematic block encoding for error correction.ECC can be divided into two classes.convolutional codes and Block codes. Convolutional codes are processed on a bit by bit basis and here the sequence of messages modified into the sequence of codes. Hence, the encoder needs memory as the bestow code is the combination of the present and the past message. In addition, they are suitable for hardware implementation and also Viterbi decoder allows optimal decoding. First of all, Block codes are processed on a block by block basis. Second, no memory required for block codes and these codes called as repetition codes, hamming codes, cyclic redundancy check & BCH codes. Specifically, LDPC & Turbo codes have recent constructions that can provide almost optimal efficiency.
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 24 2 ERROR DETECTION SCHEMES 2.1 Parity Check Error detection means that detecting errors and it can be achieved through parity bits or CRC. Of course, one extra bit added to the message to create the number of 1‟s either, even in the case of even parity or odd in case of odd parity. The drawback of this method, if a single bit error takes place, then the receiver can detect it by counting the number of 1‟s. But when more than one bit is in error it is sparingly difficult for the receiver to detect the error. 2.2 Checksum The Checksum has to be determined in the transmitter and sent with the real data. However in receiver, checksum is done and compare with the received checksum .Besides that, a mismatch is an indication of the error. The drawback of this scheme as data and checksum has received with an error and then the detection may not be possible. 2.3 Cyclic Redundancy Check At first, the message interpreted as polynomial and it can be divided by a generator polynomial. Then the reminder of the division added to the actual message polynomial to form a code polynomial. Besides that, the code polynomial is invariably divisible by the generator polynomial. This property has been checked by the receiver. If failed to satisfy this property the received code word has error. Finally, it was complex but efficient error detection scheme. 3 ERROR CORRECTION SCHEMES 3.1 Hamming code Hamming codes are the first class of block codes for error correction. Besides that, it can be used to detect single and double bit errors and corrects single - bit errors. Design of hamming code as (n,k,t) code refers to an „n‟ bit codeword having „k‟ data bits and „r‟(n-k) redundant bits having capability of correcting „t‟ bits in the error(„t‟- corrupted bits).the hamming rule defined as 2k ≥n+k+1 Rule1: (i)All bit positions that are of the form 2j are used as data bits. (ii)The remaining positions can be used as message bits(like 3,5,6,7,9,10,11,12,13,14,17,18…….) To illustrate that, code will be in the form of P1 P2 D3 P4 D5 D6 D7 P8 D9 D10 …………….. Where P1, P2, P4, P8 are parity bits D3, D5, D6, D7 are data bits The drawback of this scheme, if more than one bit has an error then it will cause a system to malfunction. 3.2 BCH Code BCH code can be the form of a large class of puissant random error correcting cyclic codes. Binary BCH codes discovered by Hocquenghem in 1959 and independently by Bose & Chaudhuri in 1960.Additionally BCH code have the generalization of hamming codes for multiple error correction. These codes are imperative for two reasons: 1. Simple decoding scheme. 2. The class of BCH code is quite large. Indeed, for any positive integers r and t with t≤2r-1 -1, there is a BCH code of length n=2r -1 that is t-correcting and has dimension k≥n-rt. 3.3 Reed-Solomon code Specifically, RS code used for the successful forward error correction code in practice today. Consequently, It can correct multiple and long burst errors with a relatively high code rate and the number of errors in the code can correct depends upon the amount of parity bits added. In any number of bits within the symbol are corrupted, after that RS code can correct the entire symbol [6].Figure 2 shows that RS(n,k) code in systematic form. RS code can correct errors in the wide range of systems in digital communications. RS codes widely used in Compact Discs, DVDs, Barcodes and wireless and mobile communications. Accordingly it is also used in satellite communications and broadband modems. K Symbols 2t Symbols Fig.2 RS (n,k) code A t-error correcting RS code with symbols from GF (q) has following parameters: Block length: n = q-1 Number of parity-check digits: n-k =2t Minimum distance: dmin=2t+1 Construct a t- error correcting RS code of length q-1 with entries in GF (q).find the primitive element α€GF(q).The dimension of the code is k=q-2t-1. Unchanged Data Parity
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 25 Error correction capacity= (length-dimension)/2. For encoding process, initially find the generator polynomial …………. (1) Fig.3 LFSR Encoder circuit for an RS code The message polynomial M(X) is the order of k-1, M(x)=Mk-1 xk-1 +…………..+M 1x+M0 ………….(2) Where each of the coefficients Mk-1, M1, M0 …………….. as m-bit message symbol. First of all, to encode the information, the message polynomial multiplied by Xn-k and the result is divided by g(x), the remainder called as parity check polynomial P(x). Finally, Codeword as formed in systematic form. C(x) = M(x) + P(x)…………….(3) In decoding the process, errors can be added with the coded message polynomial E(x). The received polynomial is R(x) =C(x) +E(x)…………..(4) Where E(x) =En-1xn-1 +…………..+E1x+E0………(5) The decoding steps are, i) Syndrome calculation: error detection ii) Key equation solver -To find the coefficients of the error locator polynomial. iii) Chien search algorithm-To find the roots of the error locator polynomial. iv) Forney algorithm- To find the value of the errors. As a result, we can correct the received codeword by XORing the received vector with the error vector. 3.4 Low Density Parity Check Code At first, LDPC (Low-Density Parity Check) codes are a class of linear block code. The term “Low- Density” refers to the characteristic of the parity check matrix which contains only a few „1‟s in comparison to „0‟s. Especially, LDPC codes are arguably the best error correction codes in existence at bsetow. LDPC codes were first introduced by R. Gallager in his PhD thesis in earlier 1960 and soon forgotten due to the introduction of Reed-Solomon codes and the implementation issues with limited technological know how at that time. In addition, the LDPC codes were rediscovered in mid-90s by R. Neal and D. Mackay at the Cambridge University [1]. As a result, it has better block error performance which exactly close to Shannon limit. An (n, k) block code takes k bits (message bits) at a time and produces n bits (code bits).adding the redundancy make that the errors correction. u= [u0 u1 u2……uk-1] c= [c0 c1 c2……cn-1] Where u be collection of k message bits, c be the collection of n encoded bits called as a codeword. Code rate: r =k/n. Codeword encoded through the generator matrix, C=u*G For every generator matrix, there exist many parity check matrices that satisfy G*HT =0 Where G= [Ik P] H = [PT In-k ] P = Parity check matrix LDPC Code represented by parity check matrix H that must satisfy c.HT = 0 where codeword denoted as c. Check nodes Bit nodes r0 r1 r2 r31 g 31 g 1 g 2 g 0 m(x) r(x) c(x)
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 26 Fig. 4 Tanner graph representation of a parity check matrix. Figure 4 shows that tanner graph representation of a parity check matrix. Here, Decoding can be the decision process which finds a codeword that minimizes the probability of decoded error based on a received word. Decoding algorithms are, 1. Sum product algorithm 2. Bit flipping algorithm 3. Min sum algorithm Nowadays LDPC code used in DVB-S2 & Wi- MAX standard. Furthermore LDPC code can be used along with RS codes for OFDM application for high data rates. As a result, LDPC code as the strong candidate for 4G or 5G error correcting code. 3.5 Convolutional Code In particular, Convolutional codes differ from block codes, the encoder contains memory and n encoder outputs at any time unit depends not only on the k inputs but also m previous inputs. Fig.5 convolution code In Figure 5, Convolutional code is generated by passing message sequence to be transmitted through a linear finite state shift register. Shift register contains k (k-bit) stages and linear algebraic function generators. Furthermore, Encoding is achieved by three methods, state diagram, trellis diagram and tree diagram. In particular, Trellis diagrams are difficult but generally preferred over both tree and state diagrams because they represent linear time sequencing of events. The performance of the convolutional codes depends upon the decoding algorithm and also the distance properties of the code. Different ways to decoding the convolutional codes. 1. Sequence decoding -fano algorithm 2. Maximum likelihood decoding -Viterbi decoding F. Turbo codes Turbo codes are the class of FEC codes developed in 1990.It is the concatenation of two convolutional codes. Hence, it can be concatenated either in serial, parallel or hybrid manner. In addition, Turbo codes yield better performance at low signal to noise ratio. Input xi Systematic output xi Fig.6 Block Diagram of the Turbo encoder Fig .7 Block Diagram of the turbo decoder In Figure 7, two component decoders are linked by inter-leaver in a structure manner similar to that of encoder. Two suitable decoder methods are i) Soft output viterbi algorithm ii) Maximum posteriori probability Usually, turbo codes are used for many commercial applications, including third-generation cellular systems UMTS and CDMA 2000. 4 CONCLUSION To summarize that Hamming code correct only single bit error. RS code corrects both burst errors and + + + + + Code digits digits Binary information digits + Encoder I Encoder II Interleaver Output I Output II Decoder 1 Interleaver Decoder 2 De- interl eaver Input 2 Input 1 Final Output ^ 1 De-interleaver
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 27 random errors.BCH targets only single bit errors. However it is better than RS code, when we given the same parity check bits for both RS and BCH code. In particular, code with higher redundancy, can usually correct more errors because code rate is low. If more errors can be corrected, then the communication system operate with a lower transmit power and high data rate. LDPC& turbo code has the same performance which is sparingly close to the Shannon‟s theorem. But LDPC does not require long inter-leaver to achieve better performance. In contrast, due to usage of inter- leaver, Turbo code has high latency than the LDPC code. To conclude that LDPC code have significantly lower complexity at performance, S/N ratio and code lengths. REFERENCES [1] R. Gallagar “Low-Density Parity Check Code” IRE Transaction paper Theory pp 21-28, Jan 1962. [2]Reed Solomon codes-principles, architechures.http://www.cs.cmu.edu/~guyb/realworld/reed solomon/reed_solomon_codes.html [3] Lin and Costello, "Error Control Coding: Fundamentals and Applications", Prentice-Hall 1983. [4]Kjetil Fagervik and Arne Sjøthun Larssen “Performance and complexity comparison of low density parity check codes and turbo codes”. [5]en.wikipedia.org/wiki/Error_detection_and_correction. [6] http://www.cyclicdesign.com/index.php/