Académique Documents
Professionnel Documents
Culture Documents
Error-Detectng and
Error-Correctng Codes
M. Adnan Quaium
Assistant Professor
Department of Electrical and Electronic Engineering
Ahsanullah University of Science and Technology
Room – 4A07
Email – adnan.eee@aust.edu
URL- htp://adnan.quaium.com/aust/cse49u5
The codeword (message) itself has a length of n=m+r bits and consists of
the payload to be transmited (the communicaton) and extra bits that
enable the detecton of a transmission error (the redundancy).
Codeword C1 1000100010001000
Codeword C2 1000000011000000
The number of positons that difer between the two codewords a and b
is referred to as the Hamming Distance H(a,b) of the two codewords.
If two codewords difer by n bits, then exactly n single bit errors can
transform the one codeword into the other.
(⊕ -Operator, 0 ⊕ 0 = 0, 1 ⊕ 1 = 0, 0 ⊕ 1 = 1 ⊕ 0 = 1)
a is added with the parity bit p=0, the code actually transmited is
a’=0100010001000100|0.
If the bits of multple code words are summarized together into a matrix,
in additon to horizontally determined parity bits, (Longitudinal
Redundancy Check, LRC) parity is also defned in columns (Vertcal
Redundancy Check, VRC).
0 0 0 1 0 1 1 1 0 0 1
includes a 1 in the second positon from the least signifcant bit (9, 3,
6, 7, 10, 11, etc).
● Check bit 4 covers all the bits positons whose binary representaton
includes a 1 in the third positon from the least signifcant bit (4–7,
19–15, 90–93, etc).
● Check bit 8 covers all the bits positons whose binary representaton
includes a 1 in the fourth positon from the least signifcant bit bits (8–
15, 94–31, 40–47, etc).
Check bit 1 covers all the bits positons whose binary representaton
includes a 1 in the least signifcant positon (1, 3, 5, 7, u, 11, etc).
0 0 0 1 0 1 1 1 0 0 1 1
Check bit 9 covers all the bits positons whose binary representaton
includes a 1 in the second positon from the least signifcant bit (9, 3, 6, 7,
10, 11, etc).
0 0 0 1 0 1 1 1 0 0 1 1 1
Check bit 4 covers all the bits positons whose binary representaton
includes a 1 in the third positon from the least signifcant bit (4–7, 19–15,
90–93, etc).
0 0 0 1 0 1 1 1 0 0 0 1 1 1
Check bit 8 covers all the bits positons whose binary representaton
includes a 1 in the fourth positon from the least signifcant bit bits (8–15,
94–31, 40–47, etc)
0 0 0 1 0 1 1 1 1 0 0 0 1 1 1
00010111001
Together with the calculated check bit p0 - p3 the fnal codeword is:
000101111000111
1
1 0
1 0
1 0
0
In this way, every bit error of the code can be detected and corrected.
Checksum procedures are used, for example, in the Internet protocol (IP).
The most well-known procedure is the so-called Cyclic Redundancy Check
(CRC), also called Polynomial Code.
Checksum procedures are used, for example, in the Internet protocol (IP).
The most well-known procedure is the so-called Cyclic Redundancy Check
(CRC), also called Polynomial Code.
must not