burst error

7
REPORT ON Error Detection & Correction of Burst Error Assigned by, Ashraful Hoque Lecturer CSE Department Southeast University Submitted by, Tanzila Islam Section : 01 30 th Batch of CSE Date of Submission: 25,April 2015

Upload: tanzila-islam

Post on 21-Aug-2015

18 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Burst Error

REPORT ON

Error Detection & Correction

of

Burst Error

Assigned by,

Ashraful Hoque Lecturer

CSE Department Southeast University

Submitted by,

Tanzila Islam

Section : 01 30th Batch of CSE

Date of Submission: 25,April 2015

Page 2: Burst Error

Hamming Code, Burst Error Correcting of Burst Error

A study on Burst Error

Page 3: Burst Error

April, 2015

Ashraful Hoque Lecturer, Department of CSE, Southeast University. Dear Sir,

Here is the Term Paper on Error correction & detection of Burst Error that you

asked us to submit on April, 2015.

In this report the concept of Hamming Code, Burst Error, and how to detect &

correct it are discussed first. Then described those using figure.

It was my pleasure to complete this report. I have prepared this report with my

utmost earnestness and sincere effort. Please let me know, if you have any query

concerning the report.

Thank you.

Sincerely yours,

Tanzila Islam

ID#2012000000022

30th Batch, Sec-01

Dept. of CSE

Southeast University

Page 4: Burst Error

Abstract

The codes we have considered so far have been designed to correct random errors. In general, a t-error correcting code corrects all error patterns of weight t or less in a codeword of block length n. It may be, however, that certain channels introduce errors localized in short intervals rather than at random. For example, in storage mediums, errors resulting from physical irregularities or structural alteration, perhaps flaws in the original medium or damage due to wear and tear, are not independent, but rather tend to be spatially concentrated. Similarly, interference over short time intervals in serially transmitted radio signals causes errors to occur in bursts. There exist codes for correcting such burst errors. Many of these codes are cyclic. We briefly consider burst-error correcting codes in this section.

Page 5: Burst Error

Hamming code:

Hamming code is a set of error-correction code s that can be used to detect and

correct bit errors that can occur when computer data is moved or stored. Reliable

communication is assured if the hamming distance between the transmitter and

receiver is less than or equal to one. Error coding is a method of detecting and

correcting these errors to ensure information is transferred intact from its source to

its destination. Error coding is used for fault tolerant computing in computer

memory, magnetic and optical data storage media, satellite and deep space

communications, network communications, cellular telephone networks, and almost

any other form of digital data communication.

Types of Errors: Whenever bits flow from one point to another, they are subject to unpredictable changes because of interference. This interference can change the shape of the signal. In a single-bit error, a 0 is changed to a 1 or a 1 to a 0. The term single-bit error means that only 1 bit of a given data unit (such as a byte, character, or packet) is changed from 1 to 0 or from 0 to 1. The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1.

Burst error:

The term burst error means that two or more bits in the data unit have changed

from 0 to 1 or vice-versa. Even if we know what type of errors can occur, we can’t

simple recognize them. We can do this simply by comparing this copy received with

another copy of intended transmission. In this mechanism the source data block is

send twice. The receiver compares them with the help of a comparator and if those

two blocks differ, a request for re-transmission is made. To achieve forward error

correction, three sets of the same data block are sent and majority decision selects

the correct block. These methods are very inefficient and increase the traffic two or

three times. Fortunately there are more efficient error detection and correction

codes. There are two basic strategies for dealing with errors. One way is to include

enough redundant information (extra bits are introduced into the data stream at the

transmitter on a regular and logical basis) along with each block of data sent to

enable the receiver to deduce what the transmitted character must have been. The

term burst errors suggest that those errors are cor-related, i.e. if one bit is

erroneous; it is quite likely that the adjacent bits have also been corrupted. When

Page 6: Burst Error

one refers to the term burst error of size m, what is meant is that the distance in bits

from the first to the last error in the frame is at most m – 1 while the intermediate

bits may or may not be corrupted.

Redundancy: The central concept in detecting or correcting errors is redundancy. To be able to detect or correct errors, we need to send some extra bits with our data. These redundant bits are added by the sender and removed by the receiver. Their presence allows the receiver to detect or correct corrupted bits. The concept of including extra information in the transmission for error detection is a good one. But instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called redundancy because the extra bits are redundant to the information: they are discarded as soon as the accuracy of the transmission has been determined. Figure 8 shows the process of using redundant bits to check the accuracy of a data unit. Once the data stream has been generated, it passes through a device that analyses it and adds on an appropriately coded redundancy check. The data unit, now enlarged by several hits, travels over the link to the receiver. The receiver puts the entire stream through a checking function. If the received hit stream passes the checking criteria, the data portion of the data unit. Correcting Burst Errors: Consider a linear code C. If all burst errors of length t or less occur in distinct cosets of a standard array for C, then each can be uniquely identified by its syndrome, and all such errors are then correctable. Furthermore, if C is a linear code capable of correcting all burst errors of length t or less, then all such errors must occur in distinct cosets. To see this, suppose C can correct two such distinct errors e1 and e2 which lie in some coset Ci of C. Then e1- e2 = c is a non-zero codeword. Now suppose e1 is a received vector. How should it be decoded? The codeword 0 could have been altered to e1 by the error e1, or the codeword c could have been altered to e1 by the error e2. We get a contradiction, since the code cannot correct this burst error of length t or less. Thus, we conclude that these errors must lie in distinct cosets. Theorem: A linear code C can correct all burst errors of length t or less if and only if all such errors occur in distinct cosets of C.

Page 7: Burst Error

Consider a binary representation of length l such that l > 1. Now, if non-zero bits of the representation are cyclically confined to l consecutive positions with nonzero first and last positions, we say that this is burst of length l.

A code is said to be l-burst-error-correcting code if it has ability to correct burst errors up to length I.

Example: 00110010000 is a burst of length 5, while 010000000000001000 is a burst of length 6.

A burst of length l that is obtained by any cyclic shift of a burst of length l is called Wraparound burst of length I. Following are typical parameters that a burst can have 1. Location of burst - Least significant digit of burst is called as location of that burst. 2. Pattern of burst - A burst pattern of a burst of length l is defined as the polynomial b(x) of degree l − 1.