MIT6 02F12 Chap02
MIT6 02F12 Chap02
MIT6 02F12 Chap02
C HAPTER 2
The theory of information developed by Claude Shannon (MIT SM 37 & PhD 40) in the late
1940s is one of the most impactful ideas of the past century, and has changed the theory
and practice of many elds of technology. The development of communication systems
and networks has beneted greatly from Shannons work. In this chapter, we will rst
develop the intution behind information and formally dene it as a mathematical quantity,
then connect it to a related property of data sources, entropy.
These notions guide us to efciently compress a data source before communicating (or
storing) it, and recovering the original data without distortion at the receiver. A key under
lying idea here is coding, or more precisely, source coding, which takes each symbol being
produced by any source of data and associates it with a codeword, while achieving several
desirable properties. (A message may be thought of as a sequence of symbols in some al
phabet.) This mapping between input symbols and codewords is called a code. Our focus
will be on lossless source coding techniques, where the recipient of any uncorrupted mes
sage can recover the original message exactly (we deal with corrupted messages in later
chapters).
2.1
One of Shannons brilliant insights, building on earlier work by Hartley, was to realize that
regardless of the application and the semantics of the messages involved, a general denition of
information is possible. When one abstracts away the details of an application, the task of
communicating something between two parties, S and R, boils down to S picking one of
several (possibly innite) messages and sending that message to R. Lets take the simplest
example, when a sender wishes to send one of two messagesfor concreteness, lets say
that the message is to say which way the British are coming:
1 if by land.
2 if by sea.
7
(Had the sender been a computer scientist, the encoding would have likely been 0 if
by land and 1 if by sea!)
Lets say we have no prior knowledge of how the British might come, so each of these
choices (messages) is equally probable. In this case, the amount of information conveyed
by the sender specifying the choice is 1 bit. Intuitively, that bit, which can take on one
of two values, can be used to encode the particular choice. If we have to communicate a
sequence of such independent events, say 1000 such events, we can encode the outcome
using 1000 bits of information, each of which species the outcome of an associated event.
On the other hand, suppose we somehow knew that the British were far more likely
to come by land than by sea (say, because there is a severe storm forecast). Then, if the
message in fact says that the British are coming by sea, much more information is being
conveyed than if the message said that that they were coming by land. To take another ex
ample, far more information is conveyed by my telling you that the temperature in Boston
on a January day is 75 F, than if I told you that the temperature is 32 F!
The conclusion you should draw from these examples is that any quantication of in
formation about an event should depend on the probability of the event. The greater the
probability of an event, the smaller the information associated with knowing that the event
has occurred. It is important to note that one does not need to use any semantics about the
message to quantify information; only the probabilities of the different outcomes matter.
2.1.1
Denition of information
Using such intuition, Hartley proposed the following denition of the information associ
ated with an event whose probability of occurrence is p:
I log(1/p) = - log(p).
(2.1)
This denition satises the basic requirement that it is a decreasing function of p. But so do
an innite number of other functions, so what is the intuition behind using the logarithm
to dene information? And what is the base of the logarithm?
The second question is easy to address: you can use any base, because loga (1/p) =
logb (1/p)/ logb a, for any two bases a and b. Following Shannons convention, we will use
base 2,1 in which case the unit of information is called a bit.2
The answer to the rst question, why the logarithmic function, is that the resulting de
nition has several elegant resulting properties, and it is the simplest function that provides
these properties. One of these properties is additivity. If you have two independent events
(i.e., events that have nothing to do with each other), then the probability that they both
occur is equal to the product of the probabilities with which they each occur. What we
would like is for the corresponding information to add up. For instance, the event that it
rained in Seattle yesterday and the event that the number of students enrolled in 6.02 ex
ceeds 150 are independent, and if I am told something about both events, the amount of
information I now have should be the sum of the information in being told individually of
the occurrence of the two events.
1
And we wont mention the base; if you see a log in this chapter, it will be to base 2 unless we mention
otherwise.
2
If we were to use base 10, the unit would be Hartleys, and if we were to use the natural log, base e, it would
be nats, but no one uses those units in practice.
The logarithmic denition provides us with the desired additivity because, given two
independent events A and B with probabilities pA and pB ,
IA + IB = log(1/pA ) + log(1/pB ) = log
2.1.2
1
1
= log
.
pA pB
P (A and B)
Examples
Suppose that were faced with N equally probable choices. What is the information re
ceived when I tell you which of the N choices occurred? Because the probability of each
choice is 1/N , the information is log2 (1/(1/N )) = log2 N bits.
Now suppose there are initially N equally probable and mutually exclusive choices,
and I tell you something that narrows the possibilities down to one of M choices from this
set of N . How much information have I given you about the choice?
Because the probability of the associated event is M/N , the information you have re
ceived is log2 (1/(M/N )) = log2 (N/M ) bits. (Note that when M = 1, we get the expected
answer of log2 N bits.)
Some examples may help crystallize this concept:
One ip of a fair coin
Before the ip, there are two equally probable choices: heads or tails. After the ip,
weve narrowed it down to one choice. Amount of information = log2 (2/1) = 1 bit.
Simple roll of two dice
Each die has six faces, so in the roll of two dice there are 36 possible combinations for
the outcome. Amount of information = log2 (36/1) = 5.2 bits.
Learning that a randomly chosen decimal digit is even
There are ten decimal digits; ve of them are even (0, 2, 4, 6, 8). Amount of informa
tion = log2 (10/5) = 1 bit.
Learning that a randomly chosen decimal digit 5
Five of the ten decimal digits are greater than or equal to 5. Amount of information
= log2 (10/5) = 1 bit.
Learning that a randomly chosen decimal digit is a multiple of 3
Four of the ten decimal digits are multiples of 3 (0, 3, 6, 9). Amount of information =
log2 (10/4) = 1.322 bits.
Learning that a randomly chosen decimal digit is even, 5, and a multiple of 3
Only one of the decimal digits, 6, meets all three criteria. Amount of information =
log2 (10/1) = 3.322 bits.
Learning that a randomly chosen decimal digit is a prime
Four of the ten decimal digits are primes2, 3, 5, and 7. Amount of information =
log2 (10/4) = 1.322 bits.
Learning that a randomly chosen decimal digit is even and prime
Only one of the decimal digits, 2, meets both criteria. Amount of information =
log2 (10/1) = 3.322 bits.
10
2.1.3
Entropy
Now that we know how to measure the information contained in a given event, we can
quantify the expected information in a set of possible outcomes or mutually exclusive events.
Specically, if an event i occurs with probability pi , 1 i N out of a set of N mutually
exclusive events, then the average or expected information is given by
H(p1 , p2 , . . . pN ) =
N
X
pi log(1/pi ).
(2.2)
i=1
H is also called the entropy (or Shannon entropy) of the probability distribution. Like
information, it is also measured in bits. It is simply the sum of several terms, each of which
is the information of a given event weighted by the probability of that event occurring. It
is often useful to think of the entropy as the average or expected uncertainty associated with
this set of events.
In the important special case of two mutually exclusive events (i.e., exactly one of the two
events can occur), occuring with probabilities p and 1 - p, respectively, the entropy
H(p, 1 - p) = -p log p - (1 - p) log(1 - p).
(2.3)
We will be lazy and refer to this special case, H(p, 1 - p) as simply H(p).
This entropy as a function of p is plotted in Figure 2-1. It is symmetric about p = 1/2,
with its maximum value of 1 bit occuring when p = 1/2. Note that H(0) = H(1) = 0;
although log(1/p) ! 1 as p ! 0, limp!0 p log(1/p) ! 0.
It is easy to verify that the expression for H from Equation (2.2) is always non-negative.
Moreover, H(p1 , p2 , . . . pN ) log N always.
2.2
Source Codes
We now turn to the problem of source coding, i.e., taking a set of messages that need to be
sent from a sender and encoding them in a way that is efcient. The notions of information
and entropy will be fundamentally important in this effort.
Many messages have an obvious encoding, e.g., an ASCII text le consists of sequence
of individual characters, each of which is independently encoded as a separate byte. There
are other such encodings: images as a raster of color pixels (e.g., 8 bits each of red, green
and blue intensity), sounds as a sequence of samples of the time-domain audio wave
form, etc. These encodings are ubiquitously produced and consumed by our computers
peripheralscharacters typed on the keyboard, pixels received from a digital camera or
sent to a display, and digitized sound samples output to the computers audio chip.
All these encodings involve a sequence of xed-length symbols, each of which can be
easily manipulated independently. For example, to nd the 42nd character in the le, one
11
just looks at the 42nd byte and interprets those 8 bits as an ASCII character. A text le
containing 1000 characters takes 8000 bits to store. If the text le were HTML to be sent
over the network in response to an HTTP request, it would be natural to send the 1000
bytes (8000 bits) exactly as they appear in the le.
But lets think about how we might compress the le and send fewer than 8000 bits. If
the le contained English text, wed expect that the letter e would occur more frequently
than, say, the letter x. This observation suggests that if we encoded e for transmission
using fewer than 8 bitsand, as a trade-off, had to encode less common characters, like x,
using more than 8 bitswed expect the encoded message to be shorter on average than the
original method. So, for example, we might choose the bit sequence 00 to represent e and
the code 100111100 to represent x.
This intuition is consistent with the denition of the amount of information: commonly
occurring symbols have a higher pi and thus convey less information, so we need fewer
bits to encode such symbols. Similarly, infrequently occurring symbols like x have a lower
pi and thus convey more information, so well use more bits when encoding such sym
bols. This intuition helps meet our goal of matching the size of the transmitted data to the
information content of the message.
The mapping of information we wish to transmit or store into bit sequences is referred
to as a code. Two examples of codes (xed-length and variable-length) are shown in Fig
ure 2-2, mapping different grades to bit sequences in one-to-one fashion. The xed-length
code is straightforward, but the variable-length code is not arbitrary, and has been care
fully designed, as we will soon learn. Each bit sequence in the code is called a codeword.
When the mapping is performed at the source of the data, generally for the purpose
of compressing the data (ideally, to match the expected number of bits to the underlying
12
entropy), the resulting mapping is called a source code. Source codes are distinct from
channel codes we will study in later chapters. Source codes remove redundancy and com
press the data, while channel codes add redundancy in a controlled way to improve the error
resilience of the data in the face of bit errors and erasures caused by imperfect communi
cation channels. This chapter and the next are about source codes.
This insight about encoding common symbols (such as the letter e) more succinctly than
uncommon symbols can be generalized to produce a strategy for variable-length codes:
Send commonly occurring symbols using shorter codewords (fewer bits), and
send infrequently occurring symbols using longer codewords (more bits).
Wed expect that, on average, encoding the message with a variable-length code would
take fewer bits than the original xed-length encoding. Of course, if the message were all
xs the variable-length encoding would be longer, but our encoding scheme is designed to
optimize the expected case, not the worst case.
Heres a simple example: suppose we had to design a system to send messages con
taining 1000 6.02 grades of A, B, C and D (MIT students rarely, if ever, get an F in 6.02 ^).
Examining past messages, we nd that each of the four grades occurs with the probabilities
shown in Figure 2-2.
Grade
A
Probability
1/3
Fixed-length Code
00
Variable-length Code
10
1/2
01
1/12
10
110
1/12
11
111
Figure 2-2: Possible grades shown with probabilities, xed- and variable-length encodings
With four possible choices for each grade, if we use the xed-length encoding, we need
2 bits to encode a grade, for a total transmission length of 2000 bits when sending 1000
grades.
Fixed-length encoding for BCBAAB: 01 10 01 00 00 01 (12 bits)
With a xed-length code, the size of the transmission doesnt depend on the actual
messagesending 1000 grades always takes exactly 2000 bits.
Decoding a message sent with the xed-length code is straightforward: take each pair
of received bits and look them up in the table above to determine the corresponding grade.
Note that its possible to determine, say, the 42nd grade without decoding any other of the
gradesjust look at the 42nd pair of bits.
Using the variable-length code, the number of bits needed for transmitting 1000 grades
depends on the grades.
Variable-length encoding for BCBAAB: 0 110 0 10 10 0 (10 bits)
If the grades were all B, the transmission would take only 1000 bits; if they were all Cs
and Ds, the transmission would take 3000 bits. But we can use the grade probabilities
13
2.3
Ideally wed like to design our compression algorithm to produce as few bits as possible:
just enough bits to represent the information in the message, but no more. Ideally, we
will be able to use no more bits than the amount of information, as dened in Section 2.1,
contained in the message, at least on average.
Specically, the entropy, dened by Equation (2.2), tells us the expected amount of in
formation in a message, when the message is drawn from a set of possible messages, each
occurring with some probability. The entropy is a lower bound on the amount of informa
tion that must be sent, on average, when transmitting data about a particular choice.
What happens if we violate this lower bound, i.e., we send fewer bits on average than
called for by Equation (2.2)? In this case the receiver will not have sufcient information
and there will be some remaining ambiguityexactly what ambiguity depends on the
encoding, but to construct a code of fewer than the required number of bits, some of the
choices must have been mapped into the same encoding. Thus, when the recipient receives
one of the overloaded encodings, it will not have enough information to unambiguously
determine which of the choices actually occurred.
Equation (2.2) answers our question about how much compression is possible by giving
us a lower bound on the number of bits that must be sent to resolve all ambiguities at the
recipient. Reprising the example from Figure 2-2, we can update the gure using Equation
(2.1).
Using Equation (2.2) we can compute the expected information content when learning of
a particular grade:
N
X
i=1
pi log2 (
1
1
1
1
1
) = ( )(1.58) + ( )(1) + ( )(3.58) + ( )(3.58) = 1.626 bits
pi
3
2
12
12
So encoding a sequence of 1000 grades requires transmitting 1626 bits on the average. The
14
Grade
A
pi
1/3
log2 (1/pi )
1.58 bits
1/2
1 bit
1/12
3.58 bits
1/12
3.58 bits
Figure 2-3: Possible grades shown with probabilities and information content.
variable-length code given in Figure 2-2 encodes 1000 grades using 1667 bits on the aver
age, and so doesnt achieve the maximum possible compression. It turns out the example
code does as well as possible when encoding one grade at a time. To get closer to the lower
bound, we would need to encode sequences of gradesmore on this idea below.
Finding a good codeone where the length of the encoded message matches the infor
mation content (i.e., the entropy)is challenging and one often has to think outside the
box. For example, consider transmitting the results of 1000 ips of an unfair coin where
the probability of a head is given by pH . The expected information content in an unfair
coin ip can be computed using Equation (2.3):
pH log2 (1/pH ) + (1 - pH ) log2 (1/(1 - pH ))
For pH = 0.999, this entropy evaluates to .0114. Can you think of a way to encode 1000
unfair coin ips using, on average, just 11.4 bits? The recipient of the encoded message
must be able to tell for each of the 1000 ips which were heads and which were tails. Hint:
with a budget of just 11 bits, one obviously cant encode each ip separately!
In fact, some effective codes leverage the context in which the encoded message is be
ing sent. For example, if the recipient is expecting to receive a Shakespeare sonnet, then
its possible to encode the message using just 8 bits if one knows that there are only 154
Shakespeare sonnets. That is, if the sender and receiver both know the sonnets, and the
sender just wishes to tell the receiver which sonnet to read or listen to, he can do that using
a very small number of bits, just log2 154 bits if all the sonnets are equi-probable!
2.4
Why Compression?
15
Over error-prone links with non-negligible bit error rates, compressing messages be
fore they are channel-coded using error-correcting codes can help improve through
put because all the redundancy in the message can be designed in to improve error
resilience, after removing any other redundancies in the original message. It is better
to design in redundancy with the explicit goal of correcting bit errors, rather than
rely on whatever sub-optimal redundancies happen to exist in the original message.
Compression is traditionally thought of as an end-to-end function, applied as part of the
application-layer protocol. For instance, one might use lossless compression between a
web server and browser to reduce the number of bits sent when transferring a collection of
web pages. As another example, one might use a compressed image format such as JPEG
to transmit images, or a format like MPEG to transmit video. However, one may also ap
ply compression at the link layer to reduce the number of transmitted bits and eliminate
redundant bits (before possibly applying an error-correcting code over the link). When
applied at the link layer, compression only makes sense if the data is inherently compress
ible, which means it cannot already be compressed and must have enough redundancy to
extract compression gains.
The next chapter describes two compression (source coding) schemes: Huffman Codes
and Lempel-Ziv-Welch (LZW) compression.
Acknowledgments
Exercises
1. Several people at a party are trying to guess a 3-bit binary number. Alice is told that
the number is odd; Bob is told that it is not a multiple of 3 (i.e., not 0, 3, or 6); Charlie
is told that the number contains exactly two 1s; and Deb is given all three of these
clues. How much information (in bits) did each player get about the number?
2. After careful data collection, Alyssa P. Hacker observes that the probability of
HIGH or LOW trafc on Storrow Drive is given by the following table:
If the Red Sox are playing
If the Red Sox are not playing
(a) If it is known that the Red Sox are playing, then how much information in bits
is conveyed by the statement that the trafc level is LOW. Give your answer as
a mathematical expression.
(b) Suppose it is known that the Red Sox are not playing. What is the entropy
of the corresponding probability distribution of trafc? Give your answer as a
mathematical expression.
3. X is an unknown 4-bit binary number picked uniformly at random from the set of
all possible 4-bit numbers. You are given another 4-bit binary number, Y , and told
16
that X (the unknown number) and Y (the number you know) differ in precisely two
positions. How many bits of information about X have you been given?
4. In Blackjack the dealer starts by dealing 2 cards each to himself and his opponent:
one face down, one face up. After you look at your face-down card, you know a total
of three cards. Assuming this was the rst hand played from a new deck, how many
bits of information do you have about the dealers face down card after having seen
three cards?
5. The following table shows the undergraduate and MEng enrollments for the School
of Engineering:
Course (Department)
I (Civil & Env.)
II (Mech. Eng.)
III (Mat. Sci.)
VI (EECS)
X (Chem. Eng.)
XVI (Aero & Astro)
Total
# of students
121
389
127
645
237
198
1717
% of total
7%
23%
7%
38%
13%
12%
100%
(a) When you learn a randomly chosen engineering students department you get
some number of bits of information. For which student department do you get
the least amount of information?
(b) After studying Huffman codes in the next chapter, design a Huffman code to
encode the departments of randomly chosen groups of students. Show your
Huffman tree and give the code for each course.
(c) If your code is used to send messages containing only the encodings of the de
partments for each student in groups of 100 randomly chosen students, what is
the average length of such messages?
6. Youre playing an online card game that uses a deck of 100 cards containing 3 Aces,
7 Kings, 25 Queens, 31 Jacks and 34 Tens. In each round of the game the cards are
shufed, you make a bet about what type of card will be drawn, then a single card
is drawn and the winners are paid off. The drawn card is reinserted into the deck
before the next round begins.
(a) How much information do you receive when told that a Queen has been drawn
during the current round?
(b) Give a numeric expression for the information content received when learning
about the outcome of a round.
(c) After you learn about Huffman codes in the next chapter, construct a variablelength Huffman encoding that minimizes the length of messages that report the
outcome of a sequence of rounds. The outcome of a single round is encoded as
A (ace), K (king), Q (queen), J (jack) or X (ten). Specify your encoding for each
of A, K, Q, J and X.
17
(d) Again, after studying Huffman codes, use your code from part (c) to calculate
the expected length of a message reporting the outcome of 1000 rounds (i.e., a
message that contains 1000 symbols)?
(e) The Nevada Gaming Commission regularly receives messages in which the out
come for each round is encoded using the symbols A, K, Q, J, and X. They dis
cover that a large number of messages describing the outcome of 1000 rounds
(i.e., messages with 1000 symbols) can be compressed by the LZW algorithm
into les each containing 43 bytes in total. They decide to issue an indictment
for running a crooked game. Why did the Commission issue the indictment?
7. Consider messages made up entirely of vowels (A, E, I, O, U ). Heres a table of prob
abilities for each of the vowels:
l
A
E
I
O
U
Totals
pl
0.22
0.34
0.17
0.19
0.08
1.00
log2 (1/pl )
2.18
1.55
2.57
2.40
3.64
12.34
pl log2 (1/pl )
0.48
0.53
0.43
0.46
0.29
2.19
(a) Give an expression for the number of bits of information you receive when
learning that a particular vowel is either I or U .
(b) After studying Huffman codes in the next chapter, use Huffmans algorithm
to construct a variable-length code assuming that each vowel is encoded indi
vidually. Draw a diagram of the Huffman tree and give the encoding for each
of the vowels.
(c) Using your code from part (B) above, give an expression for the expected length
in bits of an encoded message transmitting 100 vowels.
(d) Ben Bitdiddle spends all night working on a more complicated encoding algo
rithm and sends you email claiming that using his code the expected length in
bits of an encoded message transmitting 100 vowels is 197 bits. Would you pay
good money for his implementation?
MIT OpenCourseWare
http://ocw.mit.edu
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.