SlideShare a Scribd company logo
International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
12
Single-Bit Parity Detection and Correction using
Hamming Code 7-Bit Model
Wirda Fitriani
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot
Subroto Km. 4,5
Sei Sikambing,
20122, Medan,
Sumatera Utara, Indonesia
Andysah Putera
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot Subroto
Km. 4,5 Sei Sikambing,
20122, Medan,
Sumatera Utara, Indonesia
Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan
Panca Budi
Jl. Jend. Gatot Subroto Km.
4,5 Sei Sikambing,
20122, Medan, Sumatera
Utara,
Indonesia
ABSTRACT
In the world of technology is already integrated into the
network must have a data transmission process. Sending and
receiving data communications systems do not avoid mistakes.
Packets of data sent from the server to the client computer
always have an error in transmission. These shipments have
leaks that occur due to changes in voltage, frequency or
impact. One of the methods used to detect and correct errors
in data transmission is the Hamming method. This method
will check bit errors in delivery. Hamming is to do the process
at fault detection, and then the error will be corrected so that
the arrangement of the bits will go back to the bit sequence
before the data is sent. With the application of this method, the
data transmission process will avoid mistakes. Data will be
saved to the destination.
General Terms
Data Transmission
Keywords
Hamming Code, Error Detection
1. INTRODUCTION
Delivery of a message from someone that is confidential or
personal to others or the desired person is a way to change the
message to be sent into a code word so the secret message can
be read only by the sender and the person concerned. The
theory is used to change a secret message into a code word or
otherwise change the code word becomes the message is the
theory Encoding [1]. Encoding is the process of adding binary
numbers of n-m characters in each code to form a code word.
Decoding is the process of outlining a code word into a
message [7][8]. The examples of encoding and decoding
techniques are repetition and Hamming. In the encoding form
of repetition code, the code word obtained by repeating a
message that has been modified in the form k times as much
code. In Hamming encoding, the code word is obtained by
adding the binary numbers on every message that has been
modified as K characters [9][10]. Meanwhile, in the form of
repetition code decoding, the message is obtained by dividing
the total code word K parts. In decoding such as Hamming
code, the message was obtained by deleting the code word
before by K character. To determine the received message is
equal to sent it needs to be checked, and the error correcting
code word is received, i.e., the specific ways to obtain the
actual message.
2. THEORIES
2.1 Data Transmission
The data transmission is the process of sending data from one
data source to a data receiver using an electronic device. To
perform data transmission requires the medium, this medium
itself has several kinds such as buses, cables commonly found
on the computer, while the external computer in the
transmission of data can use external cables (Wired) and Wi-Fi
(Wireless).
Wired Cable
Wired cable is used to perform the data transmission process
directly; there are several kinds of which are as follows:
• Wired UTP or commonly known as Unshielded
Twisted Pair cable is used for transmitting over a
computer network such as in the office or cafe. In
addition to UTP, STP (Shielded Twisted Pair) in
which there are several wires in one bundle can also
be used to transmit data.
• Coaxial cable which consists of two kinds of
conductors separated by using an insulator.
• Fiber Optics is commonly called FO, where a cable
that can transmit information by passing data using
light waves.
Wireless
Wireless communication is having telecommunications using
electromagnetic waves instead of cable media. Nowadays
wireless technology has developed rapidly. It can be seen by
the increasing number of cellular phone use, besides
developing wireless technology is also used for integrated into
the same network. Wireless, also known as Media
Transmission Wireless is unguided, can only transmit data
without too much obstacles. The cast of data on the network is
typically done using a tool known as the antenna or
transceiver. Some of the wireless are:
• Radio
• Microwave
• Infra Red
• Bluetooth
• NFC
International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
13
Fig. 1 Transmission Process
Figure 1 shows the OSI model. It is a description for layered
communications and computer network protocol design. It
was developed as part of the Open Systems Interconnection
(OSI) initiative. In its most basic form, it divides network
architecture into seven layers which, from bottom to top, are
the Physical, Data-Link, Network, Transport, Session,
Presentation, Application Layers.
2.2 Hamming Code
Hamming code is an error correction system that uses parity
bits to correct the mistake [3][6]. Beside Hamming Code,
there are many other systems in a more efficient error
correction method to correct data error consists of many bits
[4][5]. Parity of method is to check the the codes that exist.
Linear error-correction code has various limitations error. On
Hamming Code, only one mistake can be repaired. For a two-
bit mistake, it can be only detected.
Hamming method is a frequently used error detection and
correction method. This method is quite simple. This method
uses XOR logic operation in the detection and correction of
errors. The tested data is a row of binary numbers of data
transmitted. Hamming code will check the error from the first
to the last bit, so the method is also called a linear error
correcting code. Hamming code method works by inserting
several pieces of check bits to data at a specific position. The
number of check bits inserted depending on data length.
𝑐𝑏 = 2 𝑛
− 𝑛 − 1 > 𝑝 (1)
Where:
cb : checkbit value
n : total checkbits
p : bit length
Table 1. Check Bit and Total Bit
Check-Bit Total Bit Position
1 0 1
2 1 2
3 4 4
4 11 8
5 26 16
6 57 32
7 120 64
8 247 128
Table 1 shows the limit of bit length. The total check-bits
obtained depends on the bit length. For example, if the bit
length is seven then the check-bit is 11. The following
illustration will describe how it works.
p = 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 21
− 1 − 1
= 0 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 22
− 2 − 1
= 1 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 23
− 3 − 1
= 4 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 24
− 4 − 1
= 11 > 7
The calculation run continuously until reach cb > p. For bit
length = 7, there will be four check-bits to check the bit data.
Table 2. Bit example
1 0 0 1 0 0 0
1 2 3 4 5 6 7
Table 3. Data and parity
x x 1 x 0 0 1 x 0 0 0
1 2 3 4 5 6 7 8 9 10 11
Table 2 shows the original data consists of seven bits only.
When it is transmitted, the Hamming code adds some extra
bits to mark the position. Since the bit length is seven bits, the
result will be 11 bits as shown in Table 3.
3. METHODOLOGY
Normally, a frame consists of m bits of data and r redundant,
or check bits. Take the total length of n (n = m + r). An n-bit
unit containing data and check-bit often attributed as the n bit
code word. In most data transmission applications, all 2m data
messages are legal data. However, as regards the method of
calculating the check bits, not all 2n used. If specified
algorithm to calculate the check bits, it will be possible to
make a complete list of the legal codewords. From this list can
be searched two codewords its minimum Hamming distance.
This distance is the Hamming distance of the complete code.
Assume two codewords: 10001001 and 10110001. This part
determine how many bits are related differently. In this case,
there are three different bits. To determine just do
EXCLUSIVE OR operation on the second codeword, and
count the number of 1 bits in operating results. Hamming
distance is the number of bit positions in which two
codewords differ. The thing to note is that when two separate
codewords with Hamming distance d, it will take a single bit
error d to convert from the one into the other. The properties
of error detection and error recovery of a code depend on its
Hamming distance. To detect d errors, it needs a code with d +
1 because of the code as it was unlikely that d single-bit errors
can change a valid codeword into another valid codeword.
International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
14
When the recipient sees an invalid codeword, there has been
an error in transmission. Likewise, to correct d errors, it needs
a code within 2d + 1 because it was declared legal codeword
can be separated even with d changes, the original codeword
will be closer than the other, then the error recovery can be
determined uniquely.
As a simple example for error detection code, download a
code in which a single parity bit is added to the data. The
parity bit is chosen so that the number of 1 bits in the
codeword becomes even (or odd). For example, if 10110101 is
delivered in even-numbered parity by adding a bit at the
edges, then the data was 101101011, while the even-numbered
10110001 parity becomes 101100010. A code with a single
parity bit has a distance of 2 because any single-bit error
produces a codeword with parity wrong.
The following steps are done to calculate the hamming code
as cited from Tim Downey from Florida International
University [2]. The key to the Hamming Code is the use of
extra parity bits to allow the identification of a single error.
Create the codeword as follows:
• Mark all bit positions that are powers of two as
parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
• All other bit positions are for the data to be encoded.
(positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17,
etc.)
• Each parity bit calculates the parity for some of the
bits in the code word. The position of the parity bit
determines the sequence of bits that it alternately
checks and skips.
• Position 1: check 1 bit, skip 1 bit, check 1 bit, skip 1
bit, etc. (1,3,5,7,9,11,13,15,...)
• Position 2: check 2 bits, skip 2 bits, check 2 bits,
skip 2 bits, etc. (2,3,6,7,10,11,14,15,...)
• Position 4: check 4 bits, skip 4 bits, check 4 bits,
skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...)
• Position 8: check 8 bits, skip 8 bits, check 8 bits,
skip 8 bits, etc. (8-15,24-31,40-47,...)
• Position 16: check 16 bits, skip 16 bits, check 16
bits, skip 16 bits, etc. (16-31,48-63,80-95,...)
• Position 32: check 32 bits, skip 32 bits, check 32
bits, skip 32 bits, etc. (32-63,96-127,160-191,...)
Set a parity bit to 1 if the total number of ones in the positions
it checks is odd. Set a parity bit to 0 if the total number of
ones in the positions it checks is even.
4. EVALUATION
4.1 Transmit
This section describes the calculation of the Hamming code.
Assume the data to transmit is the character of H. The bit
value of the character is 01001000. Since the Hamming code
uses 7 bits in this research, the bit value of H is 1001000. The
following calculation will explain how the character is
transmitted.
Character : H
Decimal : 72
Binary : 1001000
Bit 1 0 0 1 0 0 0
Position 1 2 3 4 5 6 7
The bit length is 7 represented by p.
p = 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 21
− 1 − 1
= 0 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 22
− 2 − 1
= 1 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 23
− 3 − 1
= 4 < 7
cb = 2 𝑛
− 𝑛 − 1 > 7
= 24
− 4 − 1
= 11 > 7
After the calculation, the total check-bits is 4 check-bits.
Parity x x 1 x 0 0 1 x 0 0 0
Position 1 2 3 4 5 6 7 8 9 10 11
There will be four check-bits must be inserted to the bit data.
The total length will be 11 bits (𝑏𝑖𝑡𝑑𝑎𝑡𝑎 + 𝑏𝑖𝑡𝑝𝑎𝑟𝑖𝑡𝑦). The
bits are still unknown. There is a technique to replace the x
with 0 or 1.
Table 4. Data extraction
Pos Binary Parity Data
11 1011 0
10 1010 0
9 1001 0
8 1000 x
7 0111 1
6 0110 0
5 0101 0
4 0100 x
3 0011 1
2 0010 x
1 0001 x
Table 4 shows the extraction from the previous parity data.
This step is to determine the value of x whether 0 or 1. The
method is to calculate how many “1” in each index of binary
data (Parity not included).
International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
15
Table 5. Parities value
Parity Value Amount
x1 0 there are 2 of 1
x2 0 there are 2 of 1
x3 1 There are 1 of 1
x4 0 There are 0 of 1
Table 5 show the value of every parity. There is rule to
determine the value.If the amount is even then the value is 0
and if the amount is odd then the value is 1.
Table 6. Data and parity
Position Insertion
1 x1 1 0 0 1 0 0 0
2 x1
x
2
1 0 0 1 0 0 0
4 x1
x
2
1
x
3
0 0 1 0 0 0
8 x1
x
2
1
x
3
0 0 1 x4 0 0 0
Result 0 0 1 1 0 0 1 0 0 0 0
Table 6 shows the final result of the data and parity formation.
There are 11 bits now after the parity addtion.
New Binary : 00110010000
4.2 Receive
This section tries to detect and fix the error from previous
binary string. The following calculation describes the full
explanation of the Hamming. Assume that the error is set to
the fifth bit.
Set Error : 00111010000 (the 5th
)
Bit Received : 1101000
Bit 1 1 0 1 0 0 0
Position 1 2 3 4 5 6 7
Table 7. Data extraction
Pos Binary Parity Data
11 1011 0
10 1010 0
9 1001 0
8 1000 x
7 0111 1
6 0110 0
5 0101 1
4 0100 x
3 0011 1
2 0010 x
1 0001 x
Table 7 shows the extraction from the previous parity data.
Table 8. Parities value
Parity Value Amount
x1 1 there are 3 of 1
x2 0 there are 2 of 1
x3 0 There are 1 of 1
x4 0 There are 0 of 1
Table 8 show the value of every parity. The value is different
from the first before the error. Until now, it is proved there
was a modification of the bit value. It means the data is not
retrieved perfectly.
Table 9. Error position
T. Parity R. Parity Error Pos
0 1 1
0 0 0
1 0 1
0 0 0
Error Position : 1010
Position Index : 5
The Hamming code detected the error in the fifth position as
determined previously. It is proved that the method works to a
significant condition.
5. CONCLUSION
By the test results and discussion programs that do, it can be
concluded that the method of Hamming code can detect bit
errors in the file received by the receiver file. The checking is
done by comparing the value of the check bits with the
original value of bits that exist in the file. Methods hamming
code can make corrections damage bits as a bit, or it is called
single bit error detection. It is the unfortunate method of
Hamming code can not detect if there is more than one-bit
error. Error detected just as much as the pieces only error even
though possessed more than one.
6. FUTURE SCOPE
The next research is needed to expand the single error parity
checking to the multi-error parity checking. The Hamming
code is limited to one error only. If multi-error or burst error
happens, Hamming can only detect the single error. By
composing the block system, it lets the computer program
perform the multi-error checking.
7. REFERENCES
[1] R. S. Geiger and A. Lampinen, "Old Against New, or a
Coming of Age? Broadcasting in an Era of Electronic
Media," Journal of Broadcasting & Electronic Media,
vol. 58, no. 3, pp. 333-341, 2014.
[2] T. Downey, "Calculating the Hamming Code," Florida
International University, 25 2 2016. [Online]. Available:
http://users.cis.fiu.edu/~downeyt/cop3402/hamming.html
. [Accessed 1 10 2016].
[3] K. P. Debalina Roy Choudhury, "Design of Hamming
Code Encoding and Decoding Circuit Using
Transmission Gate Logic," International Research
Journal of Engineering and Technology, vol. 2, no. 7, pp.
1165-1169, 2015.
International Journal of Computer Applications (0975 – 8887)
Volume 154 – No.2, November 2016
16
[4] E. S. Abuelyaman and A.-A. S. Al-Sehibani,
"Optimization of the Hamming Code for Error Prone
Media," International Journal of Computer Science and
Network Security, vol. 8, no. 3, pp. 278-285, 2008.
[5] R. W. Hamming, "Error Detection and Error Correction
Codes," Bell Systems Tech. Journal, vol. 29, no. 1, pp.
147-160, 1950.
[6] Z. Ramadhan and A. P. U. Siahaan, "Stop-and-Wait ARQ
Technique for Repairing Frame and Acknowledgment
Transmission," International Journal of Engineering
Trends and Technology, vol. 38, no. 7, pp. 384-387, 2016.
[7] N. Shep and P. Bhagat, "Implementation of Hamming
code using VLSI," International Journal of Engineering
Trends and Technology, vol. 4, no. 2, pp. 186-190, 2013.
[8] D. R. Choudhury and K. Podder, "Design of Hamming
Code Encoding and Decoding Circuit Using
Transmission Gate Logic," International Research
Journal of Engineering and Technology, vol. 2, no. 7, pp.
1165-1169, 2015.
[9] H. Saleh, "Design of Hamming Encoder and Decoder
Circuits For (64, 7) Code and (128, 8) Code Using
VHDL," Journal of Scientific and Engineering Research,
vol. 2, no. 1, pp. 1-15, 2015.
[10] S. Cha and H. Yoon, "Efficient Implementation of Single
Error Correction and Double Error Detection Code with
Check Bit Precomputation for Memories," Journal of
Semiconductor Technology and Science, vol. 12, no. 4,
pp. 418-425, 2012.
8. AUTHOR PROFILE
Wirda Fitriani was born in Medan, Indonesia, in 1979. She
received the S.Kom. degree in computer science from
Universitas Pembangunan Panca Budi, Medan, Indonesia, in
2005, She joined the Department of Engineering, Universitas
Pembangunan Panca Budi, as a Lecturer in 2008, and in 2014,
she entered the post-graduate university, AMIKOM,
Yogyakarta. She is now studying for her master degree. She
has become a writer in several conferences. She is still
working as a System Support at PT. Buana Varia Komputama,
Medan.
Andysah Putera Utama Siahaan was born in Medan,
Indonesia, in 1980. He received the S.Kom. degree in
computer science from Universitas Pembangunan Panca Budi,
Medan, Indonesia, in 2010, and the M.Kom. in computer
science as well from the University of Sumatera Utara,
Medan, Indonesia, in 2012. In 2010, he joined the Department
of Engineering, Universitas Pembangunan Panca Budi, as a
Lecturer, and in 2012 became a researcher. He is applying for
his Ph.D. degree in 2016. He has written several international
journals. He is now active in writing papers and joining
conferences.
IJCATM : www.ijcaonline.org

More Related Content

What's hot

Chapter 10
Chapter 10Chapter 10
Chapter 10
Faisal Mehmood
 
Full error detection and correction
Full error detection and correctionFull error detection and correction
Full error detection and correction
م.وائل الزعبي
 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission media
PANKAJ333
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
DILSHAD AHMAD
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Shubham Bammi
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
Badrul Alam
 
Error control coding
Error control codingError control coding
Error control coding
Mohammad Bappy
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
Umesh Gupta
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
ibrar562
 
T com presentation (error correcting code)
T com presentation   (error correcting code)T com presentation   (error correcting code)
T com presentation (error correcting code)
Akshit Jain
 

What's hot (20)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Full error detection and correction
Full error detection and correctionFull error detection and correction
Full error detection and correction
 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission media
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Error control coding
Error control codingError control coding
Error control coding
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
Block codes
Block codesBlock codes
Block codes
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
T com presentation (error correcting code)
T com presentation   (error correcting code)T com presentation   (error correcting code)
T com presentation (error correcting code)
 

Viewers also liked

LTE: HARQ
LTE: HARQLTE: HARQ
LTE: HARQ
Amit Rajput
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment TransmissionStop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
Universitas Pembangunan Panca Budi
 
Parity bits
Parity bitsParity bits
Parity bitsmrhaken
 
system on chip for telecommand system design
system on chip for telecommand system designsystem on chip for telecommand system design
system on chip for telecommand system design
Raghavendra Badager
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Project Student
 
Parity bits
Parity bitsParity bits
Parity bitsmrhaken
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)
Muhammad Irtiza
 
Number system
Number systemNumber system
Number system
Sajib
 
Stop and Wait arq
Stop and Wait arqStop and Wait arq
Stop and Wait arqpramodmmrv
 
Number system utm notes
Number system utm notesNumber system utm notes
Number system utm notes
Kurenai Ryu
 
Arq Protocols
Arq ProtocolsArq Protocols
Arq Protocols
anishgoel
 
Number system
Number systemNumber system
Number system
samypanch1234
 
Number system
Number systemNumber system
Number system
Palash Sachan
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrcHuawei Technologies
 
Flag Registers (Assembly Language)
Flag Registers (Assembly Language)Flag Registers (Assembly Language)
Flag Registers (Assembly Language)
Anwar Hasan Shuvo
 

Viewers also liked (20)

LTE: HARQ
LTE: HARQLTE: HARQ
LTE: HARQ
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment TransmissionStop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission
 
Parity bits
Parity bitsParity bits
Parity bits
 
system on chip for telecommand system design
system on chip for telecommand system designsystem on chip for telecommand system design
system on chip for telecommand system design
 
Al2ed chapter7
Al2ed chapter7Al2ed chapter7
Al2ed chapter7
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Harq
HarqHarq
Harq
 
Parity bits
Parity bitsParity bits
Parity bits
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)
 
Number system
Number systemNumber system
Number system
 
Okkkkk
OkkkkkOkkkkk
Okkkkk
 
Stop and Wait arq
Stop and Wait arqStop and Wait arq
Stop and Wait arq
 
Number system utm notes
Number system utm notesNumber system utm notes
Number system utm notes
 
Arq Protocols
Arq ProtocolsArq Protocols
Arq Protocols
 
Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
 
Number system
Number systemNumber system
Number system
 
Number system
Number systemNumber system
Number system
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Flag Registers (Assembly Language)
Flag Registers (Assembly Language)Flag Registers (Assembly Language)
Flag Registers (Assembly Language)
 

Similar to Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model

Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
IJRAT
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
anandhakrishnankv
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
ssuser8b4eb21
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
TELKOMNIKA JOURNAL
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
International Journal of Engineering Inventions www.ijeijournal.com
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
logesswarisrinivasan
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
DrDeepakBhatia
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
C04922125
C04922125C04922125
C04922125
IOSR-JEN
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
lthanuja01
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
Data Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal EncodingData Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal Encoding
Dr Rajiv Srivastava
 
Data link layer
Data link layerData link layer
Data link layer
IndrajaMeghavathula
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Tanzila Islam
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232IJRAT
 

Similar to Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model (20)

Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
C04922125
C04922125C04922125
C04922125
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Data Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal EncodingData Communication & Computer Networks:Digital Signal Encoding
Data Communication & Computer Networks:Digital Signal Encoding
 
Data link layer
Data link layerData link layer
Data link layer
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Universitas Pembangunan Panca Budi
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model

  • 1. International Journal of Computer Applications (0975 – 8887) Volume 154 – No.2, November 2016 12 Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model Wirda Fitriani Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Andysah Putera Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Utama Siahaan Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia ABSTRACT In the world of technology is already integrated into the network must have a data transmission process. Sending and receiving data communications systems do not avoid mistakes. Packets of data sent from the server to the client computer always have an error in transmission. These shipments have leaks that occur due to changes in voltage, frequency or impact. One of the methods used to detect and correct errors in data transmission is the Hamming method. This method will check bit errors in delivery. Hamming is to do the process at fault detection, and then the error will be corrected so that the arrangement of the bits will go back to the bit sequence before the data is sent. With the application of this method, the data transmission process will avoid mistakes. Data will be saved to the destination. General Terms Data Transmission Keywords Hamming Code, Error Detection 1. INTRODUCTION Delivery of a message from someone that is confidential or personal to others or the desired person is a way to change the message to be sent into a code word so the secret message can be read only by the sender and the person concerned. The theory is used to change a secret message into a code word or otherwise change the code word becomes the message is the theory Encoding [1]. Encoding is the process of adding binary numbers of n-m characters in each code to form a code word. Decoding is the process of outlining a code word into a message [7][8]. The examples of encoding and decoding techniques are repetition and Hamming. In the encoding form of repetition code, the code word obtained by repeating a message that has been modified in the form k times as much code. In Hamming encoding, the code word is obtained by adding the binary numbers on every message that has been modified as K characters [9][10]. Meanwhile, in the form of repetition code decoding, the message is obtained by dividing the total code word K parts. In decoding such as Hamming code, the message was obtained by deleting the code word before by K character. To determine the received message is equal to sent it needs to be checked, and the error correcting code word is received, i.e., the specific ways to obtain the actual message. 2. THEORIES 2.1 Data Transmission The data transmission is the process of sending data from one data source to a data receiver using an electronic device. To perform data transmission requires the medium, this medium itself has several kinds such as buses, cables commonly found on the computer, while the external computer in the transmission of data can use external cables (Wired) and Wi-Fi (Wireless). Wired Cable Wired cable is used to perform the data transmission process directly; there are several kinds of which are as follows: • Wired UTP or commonly known as Unshielded Twisted Pair cable is used for transmitting over a computer network such as in the office or cafe. In addition to UTP, STP (Shielded Twisted Pair) in which there are several wires in one bundle can also be used to transmit data. • Coaxial cable which consists of two kinds of conductors separated by using an insulator. • Fiber Optics is commonly called FO, where a cable that can transmit information by passing data using light waves. Wireless Wireless communication is having telecommunications using electromagnetic waves instead of cable media. Nowadays wireless technology has developed rapidly. It can be seen by the increasing number of cellular phone use, besides developing wireless technology is also used for integrated into the same network. Wireless, also known as Media Transmission Wireless is unguided, can only transmit data without too much obstacles. The cast of data on the network is typically done using a tool known as the antenna or transceiver. Some of the wireless are: • Radio • Microwave • Infra Red • Bluetooth • NFC
  • 2. International Journal of Computer Applications (0975 – 8887) Volume 154 – No.2, November 2016 13 Fig. 1 Transmission Process Figure 1 shows the OSI model. It is a description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative. In its most basic form, it divides network architecture into seven layers which, from bottom to top, are the Physical, Data-Link, Network, Transport, Session, Presentation, Application Layers. 2.2 Hamming Code Hamming code is an error correction system that uses parity bits to correct the mistake [3][6]. Beside Hamming Code, there are many other systems in a more efficient error correction method to correct data error consists of many bits [4][5]. Parity of method is to check the the codes that exist. Linear error-correction code has various limitations error. On Hamming Code, only one mistake can be repaired. For a two- bit mistake, it can be only detected. Hamming method is a frequently used error detection and correction method. This method is quite simple. This method uses XOR logic operation in the detection and correction of errors. The tested data is a row of binary numbers of data transmitted. Hamming code will check the error from the first to the last bit, so the method is also called a linear error correcting code. Hamming code method works by inserting several pieces of check bits to data at a specific position. The number of check bits inserted depending on data length. 𝑐𝑏 = 2 𝑛 − 𝑛 − 1 > 𝑝 (1) Where: cb : checkbit value n : total checkbits p : bit length Table 1. Check Bit and Total Bit Check-Bit Total Bit Position 1 0 1 2 1 2 3 4 4 4 11 8 5 26 16 6 57 32 7 120 64 8 247 128 Table 1 shows the limit of bit length. The total check-bits obtained depends on the bit length. For example, if the bit length is seven then the check-bit is 11. The following illustration will describe how it works. p = 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 21 − 1 − 1 = 0 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 22 − 2 − 1 = 1 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 23 − 3 − 1 = 4 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 24 − 4 − 1 = 11 > 7 The calculation run continuously until reach cb > p. For bit length = 7, there will be four check-bits to check the bit data. Table 2. Bit example 1 0 0 1 0 0 0 1 2 3 4 5 6 7 Table 3. Data and parity x x 1 x 0 0 1 x 0 0 0 1 2 3 4 5 6 7 8 9 10 11 Table 2 shows the original data consists of seven bits only. When it is transmitted, the Hamming code adds some extra bits to mark the position. Since the bit length is seven bits, the result will be 11 bits as shown in Table 3. 3. METHODOLOGY Normally, a frame consists of m bits of data and r redundant, or check bits. Take the total length of n (n = m + r). An n-bit unit containing data and check-bit often attributed as the n bit code word. In most data transmission applications, all 2m data messages are legal data. However, as regards the method of calculating the check bits, not all 2n used. If specified algorithm to calculate the check bits, it will be possible to make a complete list of the legal codewords. From this list can be searched two codewords its minimum Hamming distance. This distance is the Hamming distance of the complete code. Assume two codewords: 10001001 and 10110001. This part determine how many bits are related differently. In this case, there are three different bits. To determine just do EXCLUSIVE OR operation on the second codeword, and count the number of 1 bits in operating results. Hamming distance is the number of bit positions in which two codewords differ. The thing to note is that when two separate codewords with Hamming distance d, it will take a single bit error d to convert from the one into the other. The properties of error detection and error recovery of a code depend on its Hamming distance. To detect d errors, it needs a code with d + 1 because of the code as it was unlikely that d single-bit errors can change a valid codeword into another valid codeword.
  • 3. International Journal of Computer Applications (0975 – 8887) Volume 154 – No.2, November 2016 14 When the recipient sees an invalid codeword, there has been an error in transmission. Likewise, to correct d errors, it needs a code within 2d + 1 because it was declared legal codeword can be separated even with d changes, the original codeword will be closer than the other, then the error recovery can be determined uniquely. As a simple example for error detection code, download a code in which a single parity bit is added to the data. The parity bit is chosen so that the number of 1 bits in the codeword becomes even (or odd). For example, if 10110101 is delivered in even-numbered parity by adding a bit at the edges, then the data was 101101011, while the even-numbered 10110001 parity becomes 101100010. A code with a single parity bit has a distance of 2 because any single-bit error produces a codeword with parity wrong. The following steps are done to calculate the hamming code as cited from Tim Downey from Florida International University [2]. The key to the Hamming Code is the use of extra parity bits to allow the identification of a single error. Create the codeword as follows: • Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.) • All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17, etc.) • Each parity bit calculates the parity for some of the bits in the code word. The position of the parity bit determines the sequence of bits that it alternately checks and skips. • Position 1: check 1 bit, skip 1 bit, check 1 bit, skip 1 bit, etc. (1,3,5,7,9,11,13,15,...) • Position 2: check 2 bits, skip 2 bits, check 2 bits, skip 2 bits, etc. (2,3,6,7,10,11,14,15,...) • Position 4: check 4 bits, skip 4 bits, check 4 bits, skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...) • Position 8: check 8 bits, skip 8 bits, check 8 bits, skip 8 bits, etc. (8-15,24-31,40-47,...) • Position 16: check 16 bits, skip 16 bits, check 16 bits, skip 16 bits, etc. (16-31,48-63,80-95,...) • Position 32: check 32 bits, skip 32 bits, check 32 bits, skip 32 bits, etc. (32-63,96-127,160-191,...) Set a parity bit to 1 if the total number of ones in the positions it checks is odd. Set a parity bit to 0 if the total number of ones in the positions it checks is even. 4. EVALUATION 4.1 Transmit This section describes the calculation of the Hamming code. Assume the data to transmit is the character of H. The bit value of the character is 01001000. Since the Hamming code uses 7 bits in this research, the bit value of H is 1001000. The following calculation will explain how the character is transmitted. Character : H Decimal : 72 Binary : 1001000 Bit 1 0 0 1 0 0 0 Position 1 2 3 4 5 6 7 The bit length is 7 represented by p. p = 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 21 − 1 − 1 = 0 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 22 − 2 − 1 = 1 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 23 − 3 − 1 = 4 < 7 cb = 2 𝑛 − 𝑛 − 1 > 7 = 24 − 4 − 1 = 11 > 7 After the calculation, the total check-bits is 4 check-bits. Parity x x 1 x 0 0 1 x 0 0 0 Position 1 2 3 4 5 6 7 8 9 10 11 There will be four check-bits must be inserted to the bit data. The total length will be 11 bits (𝑏𝑖𝑡𝑑𝑎𝑡𝑎 + 𝑏𝑖𝑡𝑝𝑎𝑟𝑖𝑡𝑦). The bits are still unknown. There is a technique to replace the x with 0 or 1. Table 4. Data extraction Pos Binary Parity Data 11 1011 0 10 1010 0 9 1001 0 8 1000 x 7 0111 1 6 0110 0 5 0101 0 4 0100 x 3 0011 1 2 0010 x 1 0001 x Table 4 shows the extraction from the previous parity data. This step is to determine the value of x whether 0 or 1. The method is to calculate how many “1” in each index of binary data (Parity not included).
  • 4. International Journal of Computer Applications (0975 – 8887) Volume 154 – No.2, November 2016 15 Table 5. Parities value Parity Value Amount x1 0 there are 2 of 1 x2 0 there are 2 of 1 x3 1 There are 1 of 1 x4 0 There are 0 of 1 Table 5 show the value of every parity. There is rule to determine the value.If the amount is even then the value is 0 and if the amount is odd then the value is 1. Table 6. Data and parity Position Insertion 1 x1 1 0 0 1 0 0 0 2 x1 x 2 1 0 0 1 0 0 0 4 x1 x 2 1 x 3 0 0 1 0 0 0 8 x1 x 2 1 x 3 0 0 1 x4 0 0 0 Result 0 0 1 1 0 0 1 0 0 0 0 Table 6 shows the final result of the data and parity formation. There are 11 bits now after the parity addtion. New Binary : 00110010000 4.2 Receive This section tries to detect and fix the error from previous binary string. The following calculation describes the full explanation of the Hamming. Assume that the error is set to the fifth bit. Set Error : 00111010000 (the 5th ) Bit Received : 1101000 Bit 1 1 0 1 0 0 0 Position 1 2 3 4 5 6 7 Table 7. Data extraction Pos Binary Parity Data 11 1011 0 10 1010 0 9 1001 0 8 1000 x 7 0111 1 6 0110 0 5 0101 1 4 0100 x 3 0011 1 2 0010 x 1 0001 x Table 7 shows the extraction from the previous parity data. Table 8. Parities value Parity Value Amount x1 1 there are 3 of 1 x2 0 there are 2 of 1 x3 0 There are 1 of 1 x4 0 There are 0 of 1 Table 8 show the value of every parity. The value is different from the first before the error. Until now, it is proved there was a modification of the bit value. It means the data is not retrieved perfectly. Table 9. Error position T. Parity R. Parity Error Pos 0 1 1 0 0 0 1 0 1 0 0 0 Error Position : 1010 Position Index : 5 The Hamming code detected the error in the fifth position as determined previously. It is proved that the method works to a significant condition. 5. CONCLUSION By the test results and discussion programs that do, it can be concluded that the method of Hamming code can detect bit errors in the file received by the receiver file. The checking is done by comparing the value of the check bits with the original value of bits that exist in the file. Methods hamming code can make corrections damage bits as a bit, or it is called single bit error detection. It is the unfortunate method of Hamming code can not detect if there is more than one-bit error. Error detected just as much as the pieces only error even though possessed more than one. 6. FUTURE SCOPE The next research is needed to expand the single error parity checking to the multi-error parity checking. The Hamming code is limited to one error only. If multi-error or burst error happens, Hamming can only detect the single error. By composing the block system, it lets the computer program perform the multi-error checking. 7. REFERENCES [1] R. S. Geiger and A. Lampinen, "Old Against New, or a Coming of Age? Broadcasting in an Era of Electronic Media," Journal of Broadcasting & Electronic Media, vol. 58, no. 3, pp. 333-341, 2014. [2] T. Downey, "Calculating the Hamming Code," Florida International University, 25 2 2016. [Online]. Available: http://users.cis.fiu.edu/~downeyt/cop3402/hamming.html . [Accessed 1 10 2016]. [3] K. P. Debalina Roy Choudhury, "Design of Hamming Code Encoding and Decoding Circuit Using Transmission Gate Logic," International Research Journal of Engineering and Technology, vol. 2, no. 7, pp. 1165-1169, 2015.
  • 5. International Journal of Computer Applications (0975 – 8887) Volume 154 – No.2, November 2016 16 [4] E. S. Abuelyaman and A.-A. S. Al-Sehibani, "Optimization of the Hamming Code for Error Prone Media," International Journal of Computer Science and Network Security, vol. 8, no. 3, pp. 278-285, 2008. [5] R. W. Hamming, "Error Detection and Error Correction Codes," Bell Systems Tech. Journal, vol. 29, no. 1, pp. 147-160, 1950. [6] Z. Ramadhan and A. P. U. Siahaan, "Stop-and-Wait ARQ Technique for Repairing Frame and Acknowledgment Transmission," International Journal of Engineering Trends and Technology, vol. 38, no. 7, pp. 384-387, 2016. [7] N. Shep and P. Bhagat, "Implementation of Hamming code using VLSI," International Journal of Engineering Trends and Technology, vol. 4, no. 2, pp. 186-190, 2013. [8] D. R. Choudhury and K. Podder, "Design of Hamming Code Encoding and Decoding Circuit Using Transmission Gate Logic," International Research Journal of Engineering and Technology, vol. 2, no. 7, pp. 1165-1169, 2015. [9] H. Saleh, "Design of Hamming Encoder and Decoder Circuits For (64, 7) Code and (128, 8) Code Using VHDL," Journal of Scientific and Engineering Research, vol. 2, no. 1, pp. 1-15, 2015. [10] S. Cha and H. Yoon, "Efficient Implementation of Single Error Correction and Double Error Detection Code with Check Bit Precomputation for Memories," Journal of Semiconductor Technology and Science, vol. 12, no. 4, pp. 418-425, 2012. 8. AUTHOR PROFILE Wirda Fitriani was born in Medan, Indonesia, in 1979. She received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2005, She joined the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer in 2008, and in 2014, she entered the post-graduate university, AMIKOM, Yogyakarta. She is now studying for her master degree. She has become a writer in several conferences. She is still working as a System Support at PT. Buana Varia Komputama, Medan. Andysah Putera Utama Siahaan was born in Medan, Indonesia, in 1980. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and the M.Kom. in computer science as well from the University of Sumatera Utara, Medan, Indonesia, in 2012. In 2010, he joined the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2012 became a researcher. He is applying for his Ph.D. degree in 2016. He has written several international journals. He is now active in writing papers and joining conferences. IJCATM : www.ijcaonline.org