Math Model On Error Detection and Correction
Math Model On Error Detection and Correction
net/publication/341453705
CITATIONS READS
2 832
3 authors, including:
All content following this page was uploaded by Poornachandra Prakash on 18 May 2020.
Mukunda D S1, Poornachandra prakash2, Manoj kumar P A3, Pavan kalyan V4, Prof.Pavan
kumar E5
1-5Department of Electronics and Communication, Sai Vidya Institute of Technology, Bengaluru, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract
Communication is a powerful tool that aids us to connect
with people. In today’s world digital communication has
made our life much easier. But in the process of digital
communication, the messages transmitted are often
vulnerable to noise. In other words, the information signal
sent from the transmitter gets corrupted even before
receiving back at the receiver. Hence the receiver must be
Fig 1: Error in digital system
capable of detecting the random error bits added to the
original data. These random error bits are due to
In digital transmission these errors are called as bit
environmental interferences and physical defects or even
errors. These bit errors are likely to occur in the memory
due to technology scaling and variations in parameters
of the digital circuits. Memories are the most important
and noise levels.
component for storing as well as retrieving any digital
data that are needed at particular time (Shobha & Kavya,
This paper describes mathematical error
2015, p. 1). Types of embedded memory include ROM,
detection/correction models (techniques) that can be
SRAM, DRAM, flash memory etc. Based on error
utilized to protect the system against various types of
impacting on memory, there are 2 types,
errors. These detection/correction models have their own
performance, complexity levels and requires a lot of effort
Soft errors
to achieve the maximum efficiency in the digital
transmission. This paper enumerates many error detection Hard errors
and correction math models that allow reliable delivery of
Soft errors are transient and consist of a bit flip in the
digital data across unreliable communication channels.
memory without permanent effect on the storing
capacity to store the data.
Keywords: bit flip, errors memory, error detection and These errors are typically caused by high energy
correction, parity, hamming code. neutrons generated by collision of cosmic rays with
atoms in the atmosphere. The error is soft because the
circuit/device is not permanently damaged by this
INTRODUCTION radiation. The frequency of soft error occurrence soft
error rate depends on the way in which the device is
In most cases, we assume that the digital circuits are manufactured and the location in which they operate.
more immune to noise and they process the information
correctly. But there are interferences which affects Errors that persist in the memory are called hard errors.
occasionally the value of the digital signal. In digital If the device/memory is affected by these types of hard
system, the analog signals will manipulate themselves errors, it loses all its capability to store the data and can
into digital bits they are often called as Digital stream. no longer be used for read/write operation. A read
These interferences which arise will change the value of operation will always yield to 0 or 1 value regardless the
the sequence from logic 0 to 1 or from logic 1 to logic 0. previous bit value written. These errors are caused by
We sometimes prosaically call this a bit flip (Ashenden, the manufacturing defects or from the electrical
2008, p. 58) . This change in the position of the bits leads malfunctions after prolonged use.
to catastrophic errors in the output.
If signal is carrying binary encoded data, any change, can
During transmission, when the input data is not matched alter the meaning of the data (Shobha & Kavya, 2015, p.
with the output data, it is termed as error. 1). Based on this change of data during transmission,
there are two types of errors,
Fig below, illustrates the occurrence of error in the Single bit error
encoder and decoder of the digital system: Burst error
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2568
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
Single bit error means only one bit is changed from bit 0 constitute to a code and are called Error detecting codes
to bit 1 or from bit 1 to bit 0 (“Computer Network | Error and the technique is called Error detection.
Detection - javatpoint,” n.d.). Occurrence of these errors
is parallel communication as data is transferred bitwise Some popular techniques for error detection are:
in single line and that single line can be corrupted. 1.One dimensional Parity check
2. Two-dimensional Parity check
Fig below shows occurrence of single burst error: 3. Cyclic redundancy check
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2569
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
Figure below illustrates the generation of a parity bit for Drawbacks of parity
data written to DRAM: parity, indicating either an even
or an odd number of ‘1’ bits in the data [2] The problem of using parity technique to check for
errors is that it only allows us to detect a single bit flip in
a code word, it does not allow us to identify which bit is
flipped, nor does it allow us to detect an even number of
bit flips (Ashenden, 2008, p. 240). If the interference
(error) flips two, four, six, or any even number of bits
parity is preserved, so we miss that error (Ashenden,
2008, p. 240). However, in practical applications, the
probability of changing of multiple bits is extremely less.
If the application requires only detecting the error,
parity method is most suitable.
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2570
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
The methodology is described as below: Single bit error correction is a method of correction
single bit error.
Burst error correction is a method of correction of burst
error.
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2571
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
2. Baudot code
This code is invented in 1870 by Emile Baudot; this code
uses 5 elements to represent the alphabet. This is most
commonly used in teleprinters.
3. Hollerith code
This was developed by Herman Hollerith in 1896. It is
also called as punched card codes, because the 12-bit
code is punched on card for transmitting information.
4. ASCII Code
American Standard Code for Information Interchange
(1&1 IONOS Inc., 2020) is most commonly used
alphanumeric code. This was invented in 1967. ASCII
code is 7-bit code, it has 128 characters. They are 26 Fig 12: Hamming encoder and Decoder
lower case letter, 26 upper case letter, 33 special
characters and symbols, 33 control characters and 10 Hamming codes are calculated using matrices. These
digits. matrices are code generator matrix (G), parity matrix (P)
and parity check matrix (H).
5. EBCDIC Code
Extended Binary Coded Decimal Interchange code was Generator matrix (G): It is a matrix whose rows form
first developed by the company called IBM. It is 8-bit basics for a linear code (Hamming code).
code, it can represent 256 characters. They are 26 lower
case letter, 26 upper case letter, 33 special characters Parity matrix (P): It is a matrix which describes the linear
and symbols, 33 control characters and 10 digits. In relations that the code must satisfy.
EBCDIC code numbers are represented by 8421.
Parity check matrix (H): The parity matrix along with the
6. UNICODE Identity matrix is termed as parity check matrix.
The drawback of ASCII code and EBCDI codes are, they
do not suit to all languages and they do not have enough The computation of Hamming codes using code
generator matrix and parity check matrix is as illustrated
characters to represent each and every data. This is
in the below example: Ex: The parity check bits of a (7, 4)
overcome by UNICODE. UNICODE uses different
characters to represent every number and it is LBC are given below, the data bits to be sent are 1101.
compatible with all languages and it can represent all Find the hamming code constructed at the encoder and
decoder. [3]
types of data. It is 16-bit code; it can represent 65536
different characters.
Where D= data
G=generator matrix
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2572
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
Encoding:
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2573
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2574
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
CONCLUSION
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2575
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072
ACKNOWLEDGMENT
REFERENCES
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2576