Effectiveness of Hamming Single Error Correction Codes Under Harsh Electromagnetic Disturbances
Effectiveness of Hamming Single Error Correction Codes Under Harsh Electromagnetic Disturbances
Abstract—Modern hi-tech systems rely heavily on communi- In previous work [10], the effectiveness of Cyclic Redun-
cation networks while operating in increasingly harsher electro- dancy Checks (CRCs) was investigated. Residing as a detection
magnetic conditions. To protect transmitted data from corruption, mechanism, it would generate up to 50% false positives under
Error Correcting Codes are widely used. In this paper, the
effectiveness of the Hamming code is evaluated under harsh the right conditions. False positives occur when the error
electromagnetic disturbances. Our simulations show that, under detection scheme assumes the data to be error free, while the
certain conditions, the impact of the introduced overhead cannot data differs from the originally sent data. This work considers
be compensated by the single error correcting capabilities of equally harsh environments, but studies error correction instead
the Hamming codes. Moreover, for specific bit and disturbance of detection. Furthermore, a transition is made from plane-wave
frequencies and for larger data sets, the use of a Hamming code
provides limited to no advantage. to reverberation room conditions.
Index Terms—Hamming Code, Electromagnetic Interference, Harsh and continuous electromagnetic disturbances can cause
Error Correction Code, Embedded Systems, Fault Tolerance, multiple upsets in the data. These disturbances are replicated
Resilience in an in-house built framework for simulating reverberation
room conditions. Different Hamming codes are considered,
I. I NTRODUCTION depending on the amount of data bits: 4, 11 or 26 bits. By
More and more electric, electronic and programmable elec- comparison to an unprotected baseline, whereby the data bits
tronic (E/E/PE) devices are being used in our everyday lives, are sent over the channel without any ECC, the effectiveness of
ranging from smartphones and laptops to systems fulfilling the different Hamming codes is investigated. The reverberation
mission- or safety-critical tasks. Applications such as au- chamber simulation framework is based on the Plane Wave
tonomous systems are being developed and, very often, robust Integral Representation for Reverberation Chambers [6].
communication channels are crucial. Communication channels The organization of this paper is as follows. The Hamming
in general are increasingly affected by Electromagnetic Inter- code is presented in Section II. The reverberation simulation
ference (EMI), most notably due to three trends: framework is described in Section III with the results given in
1) Internal voltages of the E/E/PE systems are constantly Section IV. Section V covers the conclusions of this work and
lowered to reduce power consumption and heat dissipa- the options for future work are presented in Section VI.
tion;
II. H AMMING C ODE
2) The decrease of the minimum feature sizes in order to in-
crease the transistor density, resulting in more processing The Hamming code is a linear, Single Error Correcting (SEC)
power per area and reduced heat generation; Code named after its inventor R.W. Hamming [5]. In mathemat-
3) Harsher ElectroMagnetic (EM) environments due to ev- ical terms, the code parameters are described by Equation (1),
ermore powerful and/or transmitting devices. where r is the number of redundancy (also called parity) bits,
The combination of these trends leads to a lowered intrinsic k the message (data bits) length and n the block (code word)
immunity to EMI, which is often perceived as voltages induced length. For further notation, these codes are abbreviated as
on the channel, possibly leading to bit errors. To revert these H[n, k, r].
corruptions, Error Detection Codes (EDCs) and Error Correc-
tion Codes (ECCs) have been used since the fifties [5]. By r > 2
adding redundant information, error detection and/or recovery k = 2r − r − 1 (1)
r
n=2 −1=k+r
is performed at receiver’s side. This methodology is known as
Forward Error Correction (FEC). A FEC code example is the In this work, three message length cases are considered:
Hamming Code [5]. 4, 11 and 26 bits of data, resulting in H[7,4,3], H[15,11,4]
and H[31,26,5], respectively. These are the smallest Hamming
codes for r ≥ 3. For r = 2 and k = 1, simple triplication is DATA ENCODER + DECODER DATA
obtained. As running example for the code generation, H[7,4,3]
is used, but each code is constructed in the same way. The codes EMI
dependent on the data bits. The data bits themselves fill Encode Data
the other positions.
2) Initialize the parity bits to zero. Determine Word Error
F E_inc < E_Inc_Max
3) The parity bits themselves are calculated by a specific Rate per E_inc
algorithm which starts from the back (at P 0). For the T
P i parity bit: skip 2i bits, check 2i bits, skip 2i bits, Loops = 0 E_Inc+5
P 0 = P 0 ⊕ D0 ⊕ D1 ⊕ D3
P 1 = P 1 ⊕ D0 ⊕ D2 ⊕ D3 (3) Figure 2: Framework Work Flow
P 2 = P 2 ⊕ D1 ⊕ D2 ⊕ D3
10−1 10−1
10−2 10−2
10−3 10−3
101 102 103 104 101 102 103 104
Einc (V/m) Einc (V/m)
(a) Fbit = 197 MHz, Femi =2200 MHz (b) Fbit = 197 MHz, Femi =4200 MHz
102 102
Baseline Baseline
Hamming Hamming
101 101
Word Error Rate (%)
100 100
10−1 10−1
10−2 10−2
10−3 10−3
101 102 103 104 101 102 103 104
Einc (V/m) Einc (V/m)
(c) Fbit = 211 MHz, Femi =1000 MHz (d) Fbit = 200 MHz, Femi =1000 MHz
102 102
Baseline Baseline
Hamming Hamming
101 101
Word Error Rate (%)
100 100
10−1 10−1
10−2 10−2
10−3 10−3
101 102 103 104 101 102 103 104
Einc (V/m) Einc (V/m)
(a) Fbit = 197 MHz, Femi =3400 MHz (b) Fbit = 200 MHz, Femi =3400 MHz
10−1 10−1
10−2 10−2
10−3 10−3
101 102 103 104 101 102 103 104
Einc (V/m) Einc (V/m)
(a) Fbit = 211 MHz, Femi =1800 MHz (b) Fbit = 1000 MHz, Femi =1000 MHz
Furthermore, for continuous EMI, other strategies such as in- Secondly, more ranges for Femi and Fbit will be evaluated.
terleaving might prove useful. However, when the EMI persists Building on the increased research of Femi and Fbit , WER-
beyond the interleaving time interval, other measure must be curve characterization will be attempted.
taken as well. As a third option, more ECCs can be simulated and verified.
In essence, the used technique must be able to overcome the Migrating beyond Hamming codes, multi-bit ECCs are to be
induced overhead in terms of correction before usefulness can simulated. Line coding is another variable to consider. Besides
be claimed. However, each code has its limits and needs careful NRZ-L, a multitude of encoding schemes exist, for example
consideration. Manchester-encoding.
V. C ONCLUSIONS R EFERENCES
This paper presented the effectiveness of Hamming codes [1] R.C. Bose and D.K. Ray-Chaudhuri. On a class of error correcting binary
group codes. Information and Control, Elsevier, 3(1):68–79, March 1960.
operating in harsh EM environments. Resulting from our in- [2] A. Degraeve and D. Pissoort. Study of the effectiveness of spatially em-
house built framework, multiple conclusions could be drawn. diverse redundant systems under plane-wave illumination. In Proc. Asia-
In terms of WER, it is possible to achieve a slightly increased Pacific Int. Symp. Electromagnetic Compatibility (APEMC), volume 01,
pages 211–213, May 2016.
performance. The results show a difference in WER of the [3] A. Degraeve and D. Pissoort. Study of the effectiveness of spatially em-
Hamming code compared to unprotected transmissions. The diverse redundant systems under reverberation room conditions. In Proc.
results showed that special consideration is in order when IEEE Int. Symp. Electromagnetic Compatibility (EMC), pages 374–378,
July 2016.
the disturbance frequency is an integer multiple of the bit [4] P. M. Ebert and S. Y. Tong. Convolutional reed-solomon codes. The Bell
frequency. In practice this can arise as harmonics of the System Technical Journal, 48(3):729–742, March 1969.
sending frequency of another, similar device. At this point, [5] R. W. Hamming. Error detecting and error correcting codes. The Bell
System Technical Journal, 29(2):147–160, April 1950.
for large disturbances, the code words are easily transformed [6] D. A. Hill. Plane wave integral representation for fields in reverber-
into all-one or all-zero data words. Those code words are ation chambers. IEEE Transactions on Electromagnetic Compatibility,
then regarded as correct by the receiver. The effectiveness 40(3):209–217, August 1998.
[7] Kent Rosengren and Per-Simon Kildal. Study of distributions of modes
of the implemented Hamming code significantly drops under and plane waves in reverberation chambers for the characterization of
these conditions. Moreover, those harsh disturbances introduce antennas in a multipath environment. Microwave and Optical Technology
multiple bit errors, to which a Hamming code is not the best Letters, 30(6):386–391, 2001.
[8] A. Sanchez-Macian, P. Reviriego, and J. A. Maestro. Hamming sec-daed
solution. Harsh electromagnetic environments clearly show the and extended Hamming sec-ded-taed codes through selective shortening
limits (and operational conditions) of the Hamming code. In and bit placement. IEEE Transactions on Device and Materials Reliabil-
operational systems, increased efforts are needed to protect ity, 14(1):574–576, March 2014.
[9] F. Vanhee, D. Pissoort, J. Catrysse, G. A. E. Vandenbosch, and G. G. E.
the transmitted data from corruption. Examples thereof are Gielen. Efficient reciprocity-based algorithm to predict worst case induced
Double or Triple Error Correction (DEC/TEC) Codes, possibly disturbances on multiconductor transmission lines due to incoming plane
supplemented with interleaving of data. waves. IEEE Transactions on Electromagnetic Compatibility, 55(1):208–
216, February 2013.
VI. F UTURE W ORK [10] J. Van Waes, J. Lannoo, A. Degraeve, D. Vanoost, D. Pissoort, and
J. Boydens. Effectiveness of cyclic redundancy checks under harsh
This work only considered one specific data stream as noted electromagnetic disturbances. In Proc. Int. Symp. Electromagnetic Com-
in Equation (9). In future work, the same comparisons will need patibility - EMC EUROPE, pages 1–6, September 2017.
to be made to verify the claims are applicable to all data sets.