Chapter 2 Parity checks Simple codes Modular arithmetic.

Slides:



Advertisements
Similar presentations
5-1 Data Link Layer l Objective: to achieve reliable and efficient communication between 2 adjacent machines l Data link layer design issues n services.
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Information Technologies
Error Detection and Correction Parity Schemes: Modulo 2 addition (XOR) Word parity Block Parity.
Data and Computer Communications
Number Theory and Cryptography
Reliability of Disk Systems. Reliability So far, we looked at ways to improve the performance of disk systems. Next, we will look at ways to improve the.
Digital Fundamentals Floyd Chapter 2 Tenth Edition
Congruence class arithmetic. Definitions: a ≡ b mod m iff a mod m = b mod m. a  [b] iff a ≡ b mod m.
Fundamentals of Computer Networks ECE 478/578 Lecture #4: Error Detection and Correction Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
CSE115/ENGR160 Discrete Mathematics 03/17/11 Ming-Hsuan Yang UC Merced 1.
Chapter 11 Algebraic Coding Theory. Single Error Detection M = (1, 1, …, 1) is the m  1 parity check matrix for single error detection. If c = (0, 1,
Chapter 2 Error-Detecting Codes. Outline 2.1 Why Error-Detecting Codes? 2.2 Simple Parity Checks 2.3 Error-Detecting Codes 2.4 Independent Errors: White.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
College Algebra Fifth Edition
PrasadDigital Roots1 VEDIC MATHEMATICS : Digital Roots/Sums T. K. Prasad
Data link layer: services
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Fundamentals Tenth Edition Floyd.
Mathematics of Cryptography Part I: Modular Arithmetic
MATH 224 – Discrete Mathematics
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
Part.7.1 Copyright 2007 Koren & Krishna, Morgan-Kaufman FAULT TOLERANT SYSTEMS Part 7 - Coding.
Modular Arithmetic.
Mathematics Review Exponents Logarithms Series Modular arithmetic Proofs.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
Data and Computer Communications
Error Detection and Correction
Barcodes! Felipe Voloch These notes and the barcode program are available at /barcode.html.
CSE 20: Discrete Mathematics for Computer Science Prof. Shachar Lovett.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
CSCI 465 D ata Communications and Networks Lecture 9 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Discrete Mathematics 4. NUMBER THEORY Lecture 7 Dr.-Ing. Erwin Sitompul
1 Product Codes An extension of the concept of parity to a large number of words of data 0110… … … … … … …101.
Hamming (4,7) Code Binary Linear Codes Hamming Distance Weight of BLC
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
MA/CSSE 473 Day 09 Modular Division Revisited Fermat's Little Theorem Primality Testing.
Matrices CHAPTER 8.9 ~ Ch _2 Contents  8.9 Power of Matrices 8.9 Power of Matrices  8.10 Orthogonal Matrices 8.10 Orthogonal Matrices 
Reliability of Disk Systems. Reliability So far, we looked at ways to improve the performance of disk systems. Next, we will look at ways to improve the.
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
Modulo-2 Digital coding uses modulo-2 arithmetic where addition becomes the following operations: 0+0= =0 0+1= =1 It performs the.
2.8 Error Detection and Correction
Introduction to Information Technologies
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Communication Networks: Technology & Protocols
Congruence class arithmetic
CIS 321 Data Communications & Networking
Multiplication Inverse
Part III Datalink Layer 10.
Public Key Cryptosystems - RSA
Modular Arithmetic II Lecture 10: Oct 6.
Data Types, Identifiers, and Expressions
Chapter 7 Error Detection and Correction
Introduction to Information Technologies
Fundamentals of Data Representation
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Protocols and the TCP/IP Suite
Copyright © Zeph Grunschlag,
Error Detection and Correction
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Lecture 3 Strings and Things (Section 1.1)
Presentation transcript:

Chapter 2 Parity checks Simple codes Modular arithmetic

Simple Block Code Parity Checks Idea:Break a string of bits into blocks of size (n  1) and append (or prepend) an additional bit for even or odd parity (even # of 1’s, odd # of 1’s), to obtain n bit blocks. parity bit Other codes that admit parity checks: 2-out-of-5, 3-out-of-7 (van Duuren code) In general, 2.4

Error Probabilities Assume independent error probability p for each bit. The probability of no error = (1 – p) n. The probability of one error = np(1 – p) n-1. In general i 1  n √…√  √…√

Burst Code Parity Checks Instead of computing a parity check over contiguous sequences of bit positions, use a “checksum” over words of length L. 2.6 b1b1 …bLbL b L+1 …b2Lb2L  c1c1 …cLcL checksum physical noise Assume noise comes in “bursts” of length ≤ L, and is otherwise independently distributed.

Modular Arithmetic In mod (modulo) 2 arithmetic, 2 is the base (modulus) and there are no numbers other than 0 and 1. Any higher number mod 2 is obtained by dividing it by 2 and taking the remainder. For instance, 3 ≡ 1 mod 2 and 4 ≡ 0 mod 2. Mod 2 addition Mod 2 multiplication × = logical XOR = logical AND The base can be any number (usually a prime) and the rules are similar to those for base 2. Mod 5 additionMod 5 multiplication ×

Fact: If a ≡ m a′ and b ≡ m b′, then a + b ≡ m a′ + b′ and a ∙ b ≡ m a′ ∙ b′. Proof: a ≡ m a′ and b ≡ m b′ means that a = a′ + im and b = b′ + jm, so a + b = a′ + b′ + (i + j)m and a ∙ b = a′ ∙ b′ + a′jm + b′im + ijm 2. QED Multiplicative inverses may not exist for some numbers. Example: 2 × 5 ≡ 0 mod 10. Does 2 have a multiplicative inverse? Suppose it does, then 2 × 2 −1 ≡ 1 mod 10. However, multiplying both sides by 5 yields 0 ≡ 5 mod 10, which is false. Note: If the modulus is a prime, p, then numbers not congruent to p can’t multiply together to be congruent to p, so you don’t have the problem in the above example. Here is a proof that multiplicative inverses (for nonzero) numbers always exist in a prime modulus, p: Let q  , 0 < q < p, then GCD(p, q) = 1. (They are relatively prime). By the Euclidean Algorithm, we can always find k, l   such that kp + lq = 1,  lq ≡ 1 mod p  l = q − Rules for Modular arithmetic

Weighted Codes Deals with transcription errors (i.e. human non-binary error): Example: Assign numerical values 1 … 37 to the symbols consisting of letters, digits, and a space. Take a message of length less than 37 and weight each symbol therein according to its position in the message, appending a final check symbol s 1 chosen so the weighted sum is congruent to zero: transposing adjacent digits [e.g. 67 → 76]: ks k + (k+1)s k+1 becomes (k+1)s k + ks k+1 whose difference is s k+1 − s k ≢ 0 (mod 37) repeating an adjacent digit [e.g. 667 → 677]: difference is ks k − ks k+1 = k(s k − s k+1 ) ≢ 0 provided 0 < k < 37 and s k ≠ s k+1 For n < 37, s n … … s 1

10 digit weighted code (mod 11) where X stands for ten in the check (last) digit  1321  2571  4 messagesumsum of sums highest weight:w → w → w ↓↓ x → w + x → 2w + x ↓↓ y → w + x + y → 3w + 2x + y ↓↓ check digit (weight 1):z → w + x + y + z → 4w + 3x + 2y + z 2.9 ISBN Numbers