Preview

Communication Errors

Good Essays
Open Document
Open Document
538 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Communication Errors
Communication Errors
When information is transferred back and forth among the various parts of a computer, or transmitted from the earth to the moon and back, or, for that matter, merely left in storage, a chance exists that the bit pattern ultimately retrieved may not be identical to the original one. Particles of dirt or grease on a magnetic recording surface or a malfunctioning circuit may cause data to be incorrectly recorded or read. Static on a transmission path may corrupt portions of the data. And, in the case of some technologies, normal background radiation can alter patterns stored in a machine’s main memory. To resolve such problems, a variety of encoding techniques have been developed to allow the detection and even the correction of errors. Today, because these techniques are largely built into the internal components of a computer system, they are not apparent to the personnel using the machine. Nonetheless, their presence is important and represents a significant contribution to scientific research. It is fitting, therefore, that we investigate some of these techniques that lie behind the reliability of today’s equipment.

• Parity Bits
A simple method of detecting errors is based on the principle that if each bit pattern being manipulated has an odd number of 1s and a pattern with an even number of 1s is encountered, an error must have occurred. To use this principle, we need an encoding system in which each pattern contains an odd number of 1s. This is easily obtained by first adding an additional bit, called a parity bit, to each pattern in an encoding system already available (perhaps at the high-order end).

In each case, we assign the value 1 or 0 to this new bit so that the entire resulting pattern has an odd number of 1s. Once our encoding system has been modified in this way, a pattern with an even number of 1s indicates that an error has occurred and that the pattern being manipulated is incorrect.

• Error-Correcting Codes

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Following the two scenarios where if one bit is converted and results in the same received pattern +-0+-0-+…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    The bit pattern 1011 in 1’s complement notation is 7. The result of 7 – 2 using 2’s complement notation is 8. The bit pattern 1110 in 2’s complement notation is 9. The range of numbers that can be represented using the Excess-2N-1 notation is _________.…

    • 4533 Words
    • 19 Pages
    Satisfactory Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    2. Convert your binary result back into decimal to prove your answer is correct. This is also shown in the following example.…

    • 705 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Copyright © 2012 Pearson Education, Inc. 0-4 2 Stored Program Concept A program can be encoded as bit patterns and stored i main memory. F d t d in i From th there, the CPU can then extract the instructions and execute them. In turn, the program to be executed can be altered easily.…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Binary Code

    • 597 Words
    • 3 Pages

    Did you know that all of the information that travels through your computer is based on two commands? It's true. The only data that a computer can understand is on and off. But, the millions of combinations of those two commands given in series are what make a computer work.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. List the major obstacles to good communication in the day to day work of a police agency, and detail the major strategies you would use to overcome those obstacles.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hello, my name is Amanda Cummings and I am the director of the Manhattan Regional Emergency Management Office. I am receiving official reports about many people getting sick from drinking the water in Manhattan and the surrounding areas. It is now known that there is a life-threatening biological agent in the water system called tularemia. It is still unknown how it got into the water systems but together we will be able to work as a team to resolve the issue and protect the lives of the residents in this area.…

    • 1561 Words
    • 7 Pages
    Better Essays
  • Good Essays

    In March of 1979, the Three Mile Island (TMI) nuclear power plant of Middleton, PA faced near meltdown. People feared an unseen enemy: radiation. B.M. Dunn had some vital information to the possibility of this incident prior to its occurring. Dunn relayed this information to D.F. Hallman. Hallman’s memo and the involvement of those who did or did not receive it have been under a microscope since this historical event.…

    • 1095 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Communication and Message

    • 620 Words
    • 3 Pages

    Answer the following questions, using information from this week’s readings. Respond to each question in 100 to 200 words.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When I was in active in the military, I was always frustrated about the amount of overlapping. It a way it made sense for the organization. If someone was out of the picture, the unit still needed to be able to function successfully. Now that I am out, I find it comical. It amazes me how we all were able to come together and make it work. One time I had my wife drop me off because I was going to Twenty-nine Palms for a month and a half for a divisional exercise right before our deployment to Afghanistan. She stayed and observed us, as we got ready to leave. She told me she was amazed how we go anything successfully done because it looked like a dysfunctional circus. Going from the military to getting a degree in leadership has really…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Miscommunication

    • 848 Words
    • 4 Pages

    Problems in every society usually derive from one specific thing. Miscommunication. How many times have you gotten in an argument or a disagreement with someone over what someone said, and then you later found out that that person meant something completely different from what was running through your head? How many times have you gotten off the phone with someone—someone important, --and wondered, what in the world were he or she talking about? I often get this feeling after class.…

    • 848 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    So to clear out the ambiguity or to ensure proper interpretation of data, a coding technique called Manchester coding is employed in IEEE802.3 standards.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The screen grab of the tool execution identifying the occurrence of data-flow interference is given in Fig. 4. In the case study application, a variable no_of_students is used by both register and unregister functionalities. The value of no_of_students is incremented when a new student registers for a course and gets decremented when a student unregisters from the course. The data-flow interference occurs when variable no_of_students is not updated according to the functionalities (i.e) if the value giveed to no_of_students is not correctly updated, then marks may be giveed to an unregistered student by the Professor during the execution of give marks…

    • 745 Words
    • 3 Pages
    Good Essays