Summary of lecture 4 We are accustomed to count like 1,2,3,4,5,6,7,8,9,10,11,12,… This is called counting in base 10 – the second digit tells us how many.

Slides:



Advertisements
Similar presentations
Summary of lecture 4 We are accustomed to count like 1,2,3,4,5,6,7,8,9,10,11,12,… This is called counting in base 10 – the second digit tells us how many.
Advertisements

Information Representation
Information and Coding Theory
The Binary Numbering Systems
Math for Liberal Studies.  Problems can occur when data is transmitted from one place to another  The two main problems are  transmission errors: the.
Lecture 10 : Huffman Encoding Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang University Lecture notes : courtesy.
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
CHAPTER 2 Number Systems, Operations, and Codes
Huffman Encoding 16-Apr-17.
Digital Fundamentals Floyd Chapter 2 Tenth Edition
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
MAT 1000 Mathematics in Today's World Winter 2015.
VIT UNIVERSITY1 ECE 103 DIGITAL LOGIC DESIGN CHAPTER I NUMBER SYSTEMS AND CODES Reference: M. Morris Mano & Michael D. Ciletti, "Digital Design", Fourth.
MAT 1000 Mathematics in Today's World Winter 2015.
Error Detection and Correction
Spring 2015 Mathematics in Management Science Binary Linear Codes Two Examples.
Chapter 16: Identification Numbers Lesson Plan
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
Summary of lecture 7 Error detection schemes arise in a range of different places, such as Travelers Checks airline tickets bank account numbers universal.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Fundamentals Tenth Edition Floyd.
Ones group Thousands group Millions group Billions group Trillions group Three- Digit Groups (separated by commas) CHAPTER.
Numeral Systems Subjects: Numeral System Positional systems Decimal
Wong Wai Ling, Lam Pui Ki Identification number  clearly identify a person or a thing Check digit  an extra digit for the purpose of error.
It is physically impossible for any data recording or transmission medium to be 100% perfect 100% of the time over its entire expected useful life. As.
IT253: Computer Organization
Cosc 2150: Computer Organization
Lecture 12.  The ISBN 10-digit uses a reverse weighting system: multiply the first digit by 10, the second by 9, the third by 8 and so on until the check.
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Spring 2015 Mathematics in Management Science Identification Numbers Data Security Check Digits UPCs, Routing Nos, Bar Codes Personal Data.
Math for Liberal Studies.  A binary code is a system for encoding data made up of 0’s and 1’s  Examples  Postnet (tall = 1, short = 0)  UPC (dark.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
What are the challenges? To know how to translate word problems into a workable mathematical equation. To know where to start and how to go about figuring.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
ENEE244-02xx Digital Logic Design Lecture 3. Announcements Homework 1 due next class (Thursday, September 11) First recitation quiz will be next Monday,
Riyadh Philanthropic Society For Science Prince Sultan College For Woman Dept. of Computer & Information Sciences CS 251 Introduction to Computer Organization.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Barcodes! Felipe Voloch These notes and the barcode program are available at /barcode.html.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
CSCI-100 Introduction to Computing Hardware Part II.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Coding Seven’s and Nine’s Sol: DM.11 Classwork: Students will take turns reading the “Coding Introduction” Worksheet aloud Homework (day 46): Worksheet.
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Hamming (4,7) Code Binary Linear Codes Hamming Distance Weight of BLC
Software Design and Development Storing Data Part 2 Text, sound and video Computing Science.
The ASCII Alphanumeric Code What is it? Why use it? How do we use it?
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
MAT199: Math Alive Error corretcing and compression Ian Griffiths Mathematical Institute, University of Oxford, Department of Mathematics, Princeton University.
Dr. Clincy Professor of CS
2.8 Error Detection and Correction
Error Detection & Correction
Some required material From ICT T529 CD
Chapter 16: Identification Numbers Lesson Plan
Error Detection and Correction
Data Compression.
Part III Datalink Layer 10.
Packetizing Error Detection
MAT 105 Spring 2008 Chapter 17: Binary Codes.
Packetizing Error Detection
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
Fundamentals of Data Representation
Chapter Nine: Data Transmission
Packetizing Error Detection
Huffman Encoding.
Chapter 16: Identification Numbers Lesson Plan
Binary CSCE 101.
2.8 Error Detection and Correction
Presentation transcript:

Summary of lecture 4 We are accustomed to count like 1,2,3,4,5,6,7,8,9,10,11,12,… This is called counting in base 10 – the second digit tells us how many lots of ‘tens’ we have.

Summary of lecture 4 We are accustomed to count like 1,2,3,4,5,6,7,8,9,10,11,12,… This is called counting in base 10 – the second digit tells us how many lots of ‘tens’ we have. We can count in any base we like – e.g., base 5 (tally charts); base 12 (dozens); base 60 (time); base 2 (binary).

Summary of lecture 4 We are accustomed to count like 1,2,3,4,5,6,7,8,9,10,11,12,… This is called counting in base 10 – the second digit tells us how many lots of ‘tens’ we have. We can count in any base we like – e.g., base 5 (tally charts); base 12 (dozens); base 60 (time); base 2 (binary). Addition works in any base we like, e.g., 9 in base 10 = 1001 in base 2 6 in base 10 = 110 in base = 1111 in base 2 = 15 in base 10 = 9 + 6

Bending light Light will always take the fastest route between two places.

MAT199: Math Alive Error corretcing and compression Ian Griffiths Mathematical Institute, University of Oxford, Department of Mathematics, Princeton University

MAT199: Math Alive Error corretcing and compression Ian Griffiths Mathematical Institute, University of Oxford, Department of Mathematics, Princeton University correcting

We can represent the five-digit code pictorially: Here we have marked each codeword with a different box (oval, double oval, solid rectangle, dashed rectangle). The codewords and errors don’t overlap, but don’t cover the whole space either.

The Hamming code

Summary of lecture 5 We wish to correct for one-bit errors using the minimum amount of extra memory. We define a perfect code as one in which the total number codes achievable (either correct or one-bit corrupted) is equal to the total available number of code combinations. The Hamming code is a perfect code. Things that we didn’t talk about: Chicken Nuggets. Oops. Sorry!

Error correction Check digits – U.S. Postal Service money order

Error correction Check digits – U.S. Postal Service money order This number is the remainder when we add the other ten numbers together and divide by 9

Error correction and encoding Check digits - ISBNs This number is solely to check for errors

Error correction and encoding Universal Product Codes (U.P.C.)

Error correction and encoding Universal Product Codes (U.P.C.) Other things that use check digits include: Bank routing numbers Airline tickets QR Codes

Binary encoding – CDs The audio information on a CD is encoded in ridges on the disc which are read by a laser.

Binary encoding – CDs The audio information on a CD is encoded in ridges on the disc which are read by a laser. The data is coded using a Reed-Soloman code. The laser may misread a bump so there need to be error-correcting codes to handle single-bit errors. To solve this problem, extra data bits are added that allow the drive to detect single-bit errors and correct these.

Summary of lecture 6 Parity addition: = = = = 0 The Hamming code is a perfect code that can be used to detect and correct for errors. It does this by parity adding various combinations of the seven digits. Ideas in binary counting can allow us to work out a lot more than we might expect – for example working out what colour hat we are all wearing. As always, the song is relevant to today’s lecture. Enjoy

Why we need error correcting on CDs…

Binary encoding – data compression In data compression binary codes are assigned in a way that minimizes the number of digits required, by choosing short codes for the most frequently occurring data.

Binary encoding – data compression A compression algorithm converts data that is easy to use into a format that is easy to transport. A common compression algorithm is a zip file. When this is uncompressed the file is unzipped you recover the original information. In data compression binary codes are assigned in a way that minimizes the number of digits required, by choosing short codes for the most frequently occurring data.

Binary encoding – data compression A compression algorithm converts data that is easy to use into a format that is easy to transport. A common compression algorithm is a zip file. When this is uncompressed the file is unzipped you recover the original information. In some cases not all of the information is recovered from the encoding. In such cases the data is returned only approximately to its original state: In data compression binary codes are assigned in a way that minimizes the number of digits required, by choosing short codes for the most frequently occurring data.

Binary encoding – data compression A compression algorithm converts data that is easy to use into a format that is easy to transport. A common compression algorithm is a zip file. When this is uncompressed the file is unzipped you recover the original information. In some cases not all of the information is recovered from the encoding. In such cases the data is returned only approximately to its original state: e.g., Joint Photographic Expert Group (jpeg) files and Motion Picture Expert Group (mpeg) files. (Graphics interchange format (gif) files recover all original information upon decoding.) In data compression binary codes are assigned in a way that minimizes the number of digits required, by choosing short codes for the most frequently occurring data.

The Voyager 1 space probe is now the most distant human-made object from Earth at almost 10 billion miles away. The Voyager 1 space probe

The Voyager 1 space probe is now the most distant human-made object from Earth at almost 10 billion miles away. The probe is still transmitting information. The signal reached is now one hundred quintillion times weaker than when it was only a mile away ( times weaker). The Voyager 1 space probe

The Voyager 1 space probe is now the most distant human-made object from Earth at almost 10 billion miles away. The probe is still transmitting information. The signal reached is now one hundred quintillion times weaker than when it was only a mile away ( times weaker). The total power used by the transmitter is less than one eighth of an electric kettle. The signal can still be decoded because of error-correction schemes. The Voyager 1 space probe

Summary of lecture 7 The Reed Solomon code is used to correct for errors in CDs. This is highly efficient in correcting for many consecutive errors, and is actually used in transmitting data from the Voyager spacecraft. Data compression can be lossless (no information is lost following compression and recovery) or lossy (some information is lost but nothing that is detrimental). Zip files use lossless data compression. Mp3s use lossy data compression. I am not very good at understanding text message acronyms…

American Express Traveler’s Checks

Add together the first nine digits: = Divide this number by 9 and take the remainder: Subtract this number from 9: If there are no errors then this is your final digit – this is a check digit.

American Express Traveler’s Checks Add together the first nine digits: =30. Divide this number by 9 and take the remainder: 3. Subtract this number from 9: 9-3=6. If there are no errors then this is your final digit – this is a check digit.

Airline tickets

Divide the ten digit number (without the final check digit) by 7 and take the remainder:

Airline tickets Divide the ten digit number (without the final check digit) by 7 and take the remainder: = remainder. 7

Airline tickets Divide the ten digit number (without the final check digit) by 7 and take the remainder: = remainder. 7 The remainder is the check digit.

American banking system

For a routing number a 1 a 2 a 3 a 4 a 5 a 6 a 7 a 8 a 9 calculate: 7a 1 + 3a 2 + 9a 3 + 7a 4 + 3a 5 + 9a 6 + 7a 7 + 3a 8

American banking system For a routing number a 1 a 2 a 3 a 4 a 5 a 6 a 7 a 8 a 9 calculate: 7a 1 + 3a 2 + 9a 3 + 7a 4 + 3a 5 + 9a 6 + 7a 7 + 3a 8 Take the remainder when you divide by 10 and this is the check digit.

American banking system For a routing number a 1 a 2 a 3 a 4 a 5 a 6 a 7 a 8 a 9 calculate: 7a 1 + 3a 2 + 9a 3 + 7a 4 + 3a 5 + 9a 6 + 7a 7 + 3a 8 Take the remainder when you divide by 10 and this is the check digit. In example above, 7x1 + 3x2 + 9x1 + 7x3 + 3x0 + 9x1 + 7x5 + 3x7 = = 10 remainder 8 10

American banking system For a routing number a 1 a 2 a 3 a 4 a 5 a 6 a 7 a 8 a 9 calculate: 7a 1 + 3a 2 + 9a 3 + 7a 4 + 3a 5 + 9a 6 + 7a 7 + 3a 8 Take the remainder when you divide by 10 and this is the check digit. In example above, 7x1 + 3x2 + 9x1 + 7x3 + 3x0 + 9x1 + 7x5 + 3x7 = = 10 remainder 8 Check digit is 8. 10

The barcode encodes the numbers beneath it. In this example the barcode reads: separator left side: separator right side: separator Universal Product Codes (barcodes) Separator The binary code is then decoded using the following decryption:

Other uses for barcodes

ISBNs Check digit

ISBNs Check digit In ISBN codes we add the first number times 10, the second times 9, and so on: 10x3+9x8+8x8+7x0+6x5+5x3+4x1+3x0+2x1=217

ISBNs Check digit In ISBN codes we add the first number times 10, the second times 9, and so on: 10x3+9x8+8x8+7x0+6x5+5x3+4x1+3x0+2x1=217 We then divide this number by 11 and take the remainder 217/11=19 remainder 8.

ISBNs Check digit In ISBN codes we add the first number times 10, the second times 9, and so on: 10x3+9x8+8x8+7x0+6x5+5x3+4x1+3x0+2x1=217 We then divide this number by 11 and take the remainder 217/11=19 remainder 8. We then subtract this number from 11 to get our check digit, 3.

ISBNs What errors can we detect? We can detect ALL single errors. We can detect ALL transpositions.

ISBNs What errors can we detect? We can detect ALL single errors. We can detect ALL transpositions. The only inconvenience is if the check digit turns out to be 10 (double figures). In this case we write X for the check digit.

The ZIP bar code The ZIP bar code consists of 52 long and short bars at the bottom of a letter. The bars at the start and the end are just guard lines.

The ZIP bar code Every group of five digits encodes one digit using the following code:

The ZIP bar code Every group of five digits encodes one digit using the following code: This gives, in the previous example, the ZIP+4 code

The ZIP bar code Every group of five digits encodes one digit using the following code: This gives, in the previous example, the ZIP+4 code The 1 is a check digit. This makes sure the sum of all the digits is an exact multiple of 10. (In this case the sum of the digits is 40.)

The ZIP bar code There is also additional error correction: each group of five bars has exactly two long and three short bars.

The ZIP bar code There is also additional error correction: each group of five bars has exactly two long and three short bars. If you have an incorrect digit you can use the sum of the other digits to work out what this should be (by ensuring the sum of all digits is an exact multiple of 10).

The ZIP bar code There is also additional error correction: each group of five bars has exactly two long and three short bars. If you have an incorrect digit you can use the sum of the other digits to work out what this should be (by ensuring the sum of all digits is an exact multiple of 10). More recent codes use 12 digits rather than 10, though the sum still adds up to an exact multiple of 10.