Chapter 10 Error Detection and Correction

Similar documents
Chapter 10 Error Detection and Correction 10.1

Error Detection and Correction

Physical-Layer Services and Systems

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Part 3 of the book is devoted to the data link layer and the services provided by this layer.

Lecture 6: Reliable Transmission"

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Revision of Lecture Eleven

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Layering and Controlling Errors

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Lecture 3 Data Link Layer - Digital Data Communication Techniques

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

16.36 Communication Systems Engineering

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

Data and Computer Communications

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

Introduction to Error Control Coding

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

Error Protection: Detection and Correction

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

Channel Coding/Decoding. Hamming Method

Error Correction with Hamming Codes

GSM Network and Services

EE521 Analog and Digital Communications

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Hamming Codes and Decoding Methods

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Basics of Error Correcting Codes

Chapter 4. Communication System Design and Parameters

DIGITAL DATA COMMUNICATION TECHNIQUES

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Redundant Residue Number System Based Fault Tolerant Architecture over Wireless Network

Chapter 4 Digital Transmission 4.1

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

Error-Correcting Codes

Lab/Project Error Control Coding using LDPC Codes and HARQ

Wireless Communications

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

Chapter 7. Conclusion and Future Scope

Digital Data Communication Techniques

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)

Chapter 4 Digital Transmission 4.1

Umudike. Abia State, Nigeria

Performance of Reed-Solomon Codes in AWGN Channel

Digital Communication Systems ECS 452

Implementation of Reed-Solomon RS(255,239) Code

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel

Design and Characterization of ECC IP core using Improved Hamming Code

Communications Theory and Engineering

Chapter 1 Coding for Reliable Digital Transmission and Storage

A Novel Approach for Error Detection Using Additive Redundancy Check

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

Synchronization of Hamming Codes

QUIZ : oversubscription

A GSM Simulation Platform using MATLAB

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

2018/11/1 Thursday. YU Xiangyu

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley

Introduction to Coding Theory

The idea of similarity is through the Hamming

ECE 6640 Digital Communications

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel

ECE 6640 Digital Communications

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Running head: ERROR CORRECTION 1. Studies in Error Correction Coding. Hannah Kirse

Digital Transmission

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.

Outline. Communications Engineering 1

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Design of Reed Solomon Encoder and Decoder

Introduction. Chapter Basics of communication

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Lecture 3: Error Handling

Chapter-1: Introduction

C06a: Digital Modulation

Implementation of Reed Solomon Encoding Algorithm

VITERBI ALGORITHM IN CONTINUOUS-PHASE FREQUENCY SHIFT KEYING

Problem Sheet 1 Probability, random processes, and noise

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

RELIABILITY-BASED HYBRID-ARQ USING CONVOLUTIONAL CODES

6. FUNDAMENTALS OF CHANNEL CODER

Transcription:

Chapter 10 Error Detection and Correction 10.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

10.2 Note Data can be corrupted during transmission. Some applications require that errors be detected and corrected.

10.3 10 1 INTRODUCTION Let us first discuss some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy Detection Versus Correction Forward Error Correction Versus Retransmission Coding Modular Arithmetic

10.4 Note In a single-bit error, only 1 bit in the data unit has changed.

10.5 Figure 10.1 Single-bit error

10.6 Note A burst error means that 2 or more bits in the data unit have changed.

10.7 Figure 10.2 Burst error of length 8

10.8 Note To detect or correct errors, we need to send extra (redundant) bits with data.

10.9 Figure 10.3 The structure of encoder and decoder

10.10 Note In this book, we concentrate on block codes; we leave convolution codes to advanced texts.

10.11 Note In modulo-n arithmetic, we use only the integers in the range 0 to N 1, inclusive.

10.12 Figure 10.4 XORing of two single bits or two words

10.13 10 2 BLOCK CODING In block coding, we divide our message into blocks, each of k bits, called datawords.. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. Topics discussed in this section: Error Detection Error Correction Hamming Distance Minimum Hamming Distance

10.14 Figure 10.5 Datawords and codewords in block coding

10.15 Example 10.1 The 4B/5B block coding discussed in Chapter 4 is a good example of this type of coding. In this coding scheme, k = 4 and n = 5. As we saw, we have 2 k = 16 datawords and 2 n = 32 codewords. We saw that 16 out of 32 codewords are used for message transfer and the rest are either used for other purposes or unused.

Error Detection Enough redundancy is added to detect an error. The receiver knows an error occurred but does not know which bit(s) is(are) in error. Has less overhead than error correction. 10.16

10.17 Figure 10.6 Process of error detection in block coding

10.18 Example 10.2 Let us assume that k = 2 and n = 3. Table 10.1 shows the list of datawords and codewords. Later, we will see how to derive a codeword from a dataword. Assume the sender encodes the dataword 01 as 011 and sends it to the receiver. Consider the following cases: 1. The receiver receives 011. It is a valid codeword. The receiver extracts the dataword 01 from it.

10.19 Example 10.2 (continued) 2. The codeword is corrupted during transmission, and 111 is received. This is not a valid codeword and is discarded. 3. The codeword is corrupted during transmission, and 000 is received. This is a valid codeword. The receiver incorrectly extracts the dataword 00. Two corrupted bits have made the error undetectable.

10.20 Table 10.1 A code for error detection (Example 10.2)

10.21 Note An error-detecting code can detect only the types of errors for which it is designed; other types of errors may remain undetected.

10.22 Figure 10.7 Structure of encoder and decoder in error correction

10.23 Example 10.3 Let us add more redundant bits to Example 10.2 to see if the receiver can correct an error without knowing what was actually sent. We add 3 redundant bits to the 2-bit dataword to make 5-bit codewords. Table 10.2 shows the datawords and codewords. Assume the dataword is 01. The sender creates the codeword 01011. The codeword is corrupted during transmission, and 01001 is received. First, the receiver finds that the received codeword is not in the table. This means an error has occurred. The receiver, assuming that there is only 1 bit corrupted, uses the following strategy to guess the correct dataword.

Example 10.3 (continued) 1. Comparing the received codeword with the first codeword in the table (01001 versus 00000), the receiver decides that the first codeword is not the one that was sent because there are two different bits. 2. By the same reasoning, the original codeword cannot be the third or fourth one in the table. 3. The original codeword must be the second one in the table because this is the only one that differs from the received codeword by 1 bit. The receiver replaces 01001 with 01011 and consults the table to find the dataword 01. 10.24

10.25 Table 10.2 A code for error correction (Example 10.3)