SlideShare a Scribd company logo
REED SOLOMON CODE
AND CONVOLUTION
CODE
REED SOLOMON
CODE
CONTENTS
 Introduction
 Properties of RS code
 RS Encoder
 RS Decoder
 Software Implementation
 Advantages
 Disadvantages
 Applications
INTRODUCTION
 Reed–Solomon codes are an important group of error-correcting codes introduced
by Irving S. Reed and Gustave Solomon in 1960.
 RS codes operate on the information by dividing the message stream into blocks of
data, adding redundancy per block depending only on the current inputs.
 It is capable to correct both burst errors (where a series of bits in the codeword are
received in error) and erasures.
PROPERTIES OF RS CODE
 RS codes are generally represented as RS (n, k), with s-bit symbols.
 Block Length: n
No. of Original Message symbols: k
Number of Parity Digits: n – k
 A Reed-Solomon decoder can correct up to t symbols that contain errors in a
codeword, where 2t = n-k.
 The relationship between the symbol size, m, and the size of the codeword n, is
given by n=2s-1
 The following diagram shows a typical Reed-Solomon codeword:
k 2t
n
Data Parity
Example:-
 RS(255,223) with 8-bit symbols.
 Each codeword contains 255 code word bytes, of which 223 bytes are data and 32
bytes are parity. For this code:
n = 255, k = 223, s = 8
2t = 32, t = 16
 The decoder can correct any 16 symbol errors in the code word: i.e. errors upto 16
bytes anywhere in the codeword can be automatically corrected.
 Given a symbol size s, the maximum codeword length (n) for a Reed-Solomon code
is n = 2s – 1
 For example, the maximum length of a code with 8-bit symbols (s=8) is 255 bytes.
 Reed-Solomon codes may be shortened by (conceptually) making a number of data
symbols zero at the encoder, not transmitting them, and then re-inserting them at
the decoder.
 Example: The (255,223) code described above can be shortened to (200,168). The
encoder takes a block of 168 data bytes, (conceptually) adds 55 zero bytes, creates
a (255,223) codeword and transmits only the 168 data bytes and 32 parity bytes.
ENCODER
 Message Polynomial-
c(x) = m(x). xn-k
 RS generator Polynomial-
g(x) = g0 + g1. x+ g2 x2+ …. + g2t-1. x2t-1 + x2t
DECODER
SOFTWARE IMPLEMENTATION
 Until recently, software implementations in real-time required too much
computational power for all but the simplest of Reed-Solomon codes (i.e. codes
with small values of t).
 The following Table gives some example benchmark figures on a 166 MHz Pentium
PC:
Code Data rate
RS(255,251) 12 Mb/s
RS(255,239) 2.7 Mb/s
RS(255,223) 1.1 Mb/s
ADVANTAGES
 Reed-Solomon codes are most widely used to correcting burst errors.
 Coding gain is very high.
 The Coding rate is very high for Reed Solomon code so it is suitable for many
applications including storage and transmission.
DISADVANTAGES
 Unlike BCH codes , RS Codes does not perform considerably well in BPSK
modulation schemes.
 Bit Error Ratio(BER) for Reed-Solomon Codes is not as good as BCH codes.
APPLICATIONS
 Data Storage
 Bar Code
 Satellite Broadcasting
 Spread-Spectrum System
 Ultra Wideband(UWB)
CONVOLUTION CODE
ERROR CORRECTION CODE
 There are four important error correction codes that find applications in digital
transmission. They are :
18
Block Parity
Hamming Code
Interleaved Code
Convolutional Code
INTRODUCTION
 Convolutional codes are introduced in 1955 by Elias.
 Convolution coding is a popular error-correcting coding method used in
digital communications. A message is convoluted, and then transmitted
into a noisy channel.
 This convolution operation encodes some redundant information into
the transmitted signal.
19
CONVOLUTIONAL ENCODER
 Convolutional encoding of data is accomplished using a shift register
and associated combinatorial logic that performs modulo-two addition.
 A shift register is merely a chain of flip-flops.
PARAMETERS OF CONVOLUTION ENCODER
 Convolutional codes are commonly specified by three parameters:
 n = number of output bits
 k = number of input bits
 K = number of shift registers
 Code Rate: The quantity k/n is called as code rate. It is a measure of the efficiency
of the code.
 Constraint Length: The quantity L(or K) is called the constraint length of the code. It
represents the number of bits in the encoder memory that affect the generation of
the n output bits.
CONVOLUTIONAL CODE ENCODER
+
+
Shift Register
Linear Algebraic Function Generator
CONVOLUTION CODE ENCODER
+
+
Constraint Length (K) = 3Code Rate = k/nNo of input bits (k)= 1state = K-1state = 2k=1 K=3 n=2
No of linear Algebraic Function
Generator(n) = 2
CONVOLUTION CODE ENCODER
+
0 0 0
+
11001
k=1 K=3 n=2
Input 1 0 0 1 1
State 10 01 00 10 11
Outpu 11 10 11 11 01
1 1 111100110111 1
REPRESENTATION OF CONVOLUTION CODES
 State Diagram
 Tree Diagram
 Trellis Diagram
STATE DIAGRAM
 Contents of shift registers make up "state" of code:
 Most recent input is most significant bit of state.
 Oldest input is least significant bit of state.
 (this convention is sometimes reverse)
TREE DIAGRAM
1101
k=1 K=3 n=2
TRELLIS DIAGRAM REPRESENTATION
 The trellis diagram is basically a redrawing of the state diagram. It
shows all possible state transitions at each time step. Then we connect
each state to the next state.
 There are only two choices possible at each state. These are
determined by the arrival of either a 0 or a 1 bit.
 The arrows show the input bit.
 The arrows going upwards represent a 0 bit and going downwards
represent a 1 bit.
TRELLIS DIAGRAM
DIFFERENCE BETWEEN BLOCK CODE AND CONVOLUTION
CODE
 The difference between block codes and convolution codes is the encoding
principle.
 In the block codes, the information bits are followed by the parity bits while in
convolution codes the information bits are spread along the sequence.
 The block codes can be applied only for the block of data whereas convolution
coding can be applied to a continuous data stream as well as to blocks of data.
ADVANTAGES
 Convolution coding is a popular error-correcting coding method used in digital
communications.
 The convolution operation encodes some redundant information into the
transmitted signal.
 It is simple and has good performance with low implementation cost.
FACTORS AND PROPERTIES
 The performance of a convolutional code depends on the coding rate and the
constraint length.
 Longer constraint length K
More powerful code
More coding gain
 Smaller coding rate R=k/n
More powerful code due to extra redundancy
Less bandwidth efficiency
THANK YOU
E047 E048 E049 E050 E056 E058CREATED

More Related Content

What's hot

Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basics
Ram Singh Yadav
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
Sahar Foroughi
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
Abdullaziz Tagawy
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
 
Cyclic code non systematic
Cyclic code non systematicCyclic code non systematic
Cyclic code non systematic
Nihal Gupta
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
vasanth_mtech
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
Shradheshwar Verma
 
Dcs unit 2
Dcs unit 2Dcs unit 2
Dcs unit 2
Anil Nigam
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
saigopinadh bodigiri
 
Turbo codes
Turbo codesTurbo codes
Turbo codes
RAVINDRA GAIKWAD
 
Hamming codes
Hamming codesHamming codes
Hamming codes
GIGI JOSEPH
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
VARUN KUMAR
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
jknm
 
Detection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN ChannelDetection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN Channel
DrAimalKhan
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
Burdwan University
 
Reed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمونReed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمون
Muhammed Abdulmahdi
 

What's hot (20)

Turbo code
Turbo codeTurbo code
Turbo code
 
Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basics
 
Turbo codes.ppt
Turbo codes.pptTurbo codes.ppt
Turbo codes.ppt
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Cyclic code non systematic
Cyclic code non systematicCyclic code non systematic
Cyclic code non systematic
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
 
Dcs unit 2
Dcs unit 2Dcs unit 2
Dcs unit 2
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Turbo codes
Turbo codesTurbo codes
Turbo codes
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Detection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN ChannelDetection and Binary Decision in AWGN Channel
Detection and Binary Decision in AWGN Channel
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
 
Reed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمونReed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمون
 

Similar to Reed Soloman and convolution codes

Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
inventionjournals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
LDPC_CODES.ppt
LDPC_CODES.pptLDPC_CODES.ppt
LDPC_CODES.ppt
hsomashekar987
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
pulugurtha venkatesh
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Encoding in sc
Encoding in scEncoding in sc
Encoding in sc
rajshreemuthiah
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
IJERA Editor
 
C04922125
C04922125C04922125
C04922125
IOSR-JEN
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
IJERA Editor
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
lthanuja01
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copie
Sourour Kanzari
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
Journal For Research
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
Devanshi Piprottar
 

Similar to Reed Soloman and convolution codes (20)

Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
LDPC_CODES.ppt
LDPC_CODES.pptLDPC_CODES.ppt
LDPC_CODES.ppt
 
Presentation
PresentationPresentation
Presentation
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Encoding in sc
Encoding in scEncoding in sc
Encoding in sc
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
 
C04922125
C04922125C04922125
C04922125
 
Compression Ii
Compression IiCompression Ii
Compression Ii
 
Compression Ii
Compression IiCompression Ii
Compression Ii
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copie
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Slides
SlidesSlides
Slides
 
I Tlecture 13a
I Tlecture 13aI Tlecture 13a
I Tlecture 13a
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Reed Soloman and convolution codes

  • 1. REED SOLOMON CODE AND CONVOLUTION CODE
  • 3. CONTENTS  Introduction  Properties of RS code  RS Encoder  RS Decoder  Software Implementation  Advantages  Disadvantages  Applications
  • 4. INTRODUCTION  Reed–Solomon codes are an important group of error-correcting codes introduced by Irving S. Reed and Gustave Solomon in 1960.  RS codes operate on the information by dividing the message stream into blocks of data, adding redundancy per block depending only on the current inputs.  It is capable to correct both burst errors (where a series of bits in the codeword are received in error) and erasures.
  • 5. PROPERTIES OF RS CODE  RS codes are generally represented as RS (n, k), with s-bit symbols.  Block Length: n No. of Original Message symbols: k Number of Parity Digits: n – k  A Reed-Solomon decoder can correct up to t symbols that contain errors in a codeword, where 2t = n-k.  The relationship between the symbol size, m, and the size of the codeword n, is given by n=2s-1
  • 6.  The following diagram shows a typical Reed-Solomon codeword: k 2t n Data Parity
  • 7. Example:-  RS(255,223) with 8-bit symbols.  Each codeword contains 255 code word bytes, of which 223 bytes are data and 32 bytes are parity. For this code: n = 255, k = 223, s = 8 2t = 32, t = 16  The decoder can correct any 16 symbol errors in the code word: i.e. errors upto 16 bytes anywhere in the codeword can be automatically corrected.
  • 8.  Given a symbol size s, the maximum codeword length (n) for a Reed-Solomon code is n = 2s – 1  For example, the maximum length of a code with 8-bit symbols (s=8) is 255 bytes.  Reed-Solomon codes may be shortened by (conceptually) making a number of data symbols zero at the encoder, not transmitting them, and then re-inserting them at the decoder.
  • 9.  Example: The (255,223) code described above can be shortened to (200,168). The encoder takes a block of 168 data bytes, (conceptually) adds 55 zero bytes, creates a (255,223) codeword and transmits only the 168 data bytes and 32 parity bytes.
  • 11.  Message Polynomial- c(x) = m(x). xn-k  RS generator Polynomial- g(x) = g0 + g1. x+ g2 x2+ …. + g2t-1. x2t-1 + x2t
  • 13. SOFTWARE IMPLEMENTATION  Until recently, software implementations in real-time required too much computational power for all but the simplest of Reed-Solomon codes (i.e. codes with small values of t).  The following Table gives some example benchmark figures on a 166 MHz Pentium PC: Code Data rate RS(255,251) 12 Mb/s RS(255,239) 2.7 Mb/s RS(255,223) 1.1 Mb/s
  • 14. ADVANTAGES  Reed-Solomon codes are most widely used to correcting burst errors.  Coding gain is very high.  The Coding rate is very high for Reed Solomon code so it is suitable for many applications including storage and transmission.
  • 15. DISADVANTAGES  Unlike BCH codes , RS Codes does not perform considerably well in BPSK modulation schemes.  Bit Error Ratio(BER) for Reed-Solomon Codes is not as good as BCH codes.
  • 16. APPLICATIONS  Data Storage  Bar Code  Satellite Broadcasting  Spread-Spectrum System  Ultra Wideband(UWB)
  • 18. ERROR CORRECTION CODE  There are four important error correction codes that find applications in digital transmission. They are : 18 Block Parity Hamming Code Interleaved Code Convolutional Code
  • 19. INTRODUCTION  Convolutional codes are introduced in 1955 by Elias.  Convolution coding is a popular error-correcting coding method used in digital communications. A message is convoluted, and then transmitted into a noisy channel.  This convolution operation encodes some redundant information into the transmitted signal. 19
  • 20. CONVOLUTIONAL ENCODER  Convolutional encoding of data is accomplished using a shift register and associated combinatorial logic that performs modulo-two addition.  A shift register is merely a chain of flip-flops.
  • 21. PARAMETERS OF CONVOLUTION ENCODER  Convolutional codes are commonly specified by three parameters:  n = number of output bits  k = number of input bits  K = number of shift registers  Code Rate: The quantity k/n is called as code rate. It is a measure of the efficiency of the code.  Constraint Length: The quantity L(or K) is called the constraint length of the code. It represents the number of bits in the encoder memory that affect the generation of the n output bits.
  • 22. CONVOLUTIONAL CODE ENCODER + + Shift Register Linear Algebraic Function Generator
  • 23. CONVOLUTION CODE ENCODER + + Constraint Length (K) = 3Code Rate = k/nNo of input bits (k)= 1state = K-1state = 2k=1 K=3 n=2 No of linear Algebraic Function Generator(n) = 2
  • 24. CONVOLUTION CODE ENCODER + 0 0 0 + 11001 k=1 K=3 n=2 Input 1 0 0 1 1 State 10 01 00 10 11 Outpu 11 10 11 11 01 1 1 111100110111 1
  • 25. REPRESENTATION OF CONVOLUTION CODES  State Diagram  Tree Diagram  Trellis Diagram
  • 26. STATE DIAGRAM  Contents of shift registers make up "state" of code:  Most recent input is most significant bit of state.  Oldest input is least significant bit of state.  (this convention is sometimes reverse)
  • 28. TRELLIS DIAGRAM REPRESENTATION  The trellis diagram is basically a redrawing of the state diagram. It shows all possible state transitions at each time step. Then we connect each state to the next state.  There are only two choices possible at each state. These are determined by the arrival of either a 0 or a 1 bit.  The arrows show the input bit.  The arrows going upwards represent a 0 bit and going downwards represent a 1 bit.
  • 30. DIFFERENCE BETWEEN BLOCK CODE AND CONVOLUTION CODE  The difference between block codes and convolution codes is the encoding principle.  In the block codes, the information bits are followed by the parity bits while in convolution codes the information bits are spread along the sequence.  The block codes can be applied only for the block of data whereas convolution coding can be applied to a continuous data stream as well as to blocks of data.
  • 31. ADVANTAGES  Convolution coding is a popular error-correcting coding method used in digital communications.  The convolution operation encodes some redundant information into the transmitted signal.  It is simple and has good performance with low implementation cost.
  • 32. FACTORS AND PROPERTIES  The performance of a convolutional code depends on the coding rate and the constraint length.  Longer constraint length K More powerful code More coding gain  Smaller coding rate R=k/n More powerful code due to extra redundancy Less bandwidth efficiency
  • 33. THANK YOU E047 E048 E049 E050 E056 E058CREATED

Editor's Notes

  1. The tree diagram representation shows all possible information and encoded sequences for the convolutional encoder. In the tree diagram, a solid line represents input information bit 0 and a dashed line represents input information bit 1. The corresponding output encoded bits are shown on the branches of the tree. An input information sequence defines a specific path through the tree diagram from left to right.
  2. Created by