10 views

Uploaded by aymanieee

Notes 01

save

- Soft Error Tolerant CAM
- Nec S5000
- Thesis 06
- FlexiPlusProdDescC2.3
- iDirect Evoluton Product Line Overview
- Robust Video Broadcasting Over 802.11 in Time Correlated Fading Channels
- Coding
- Middle Ware Configuration and Monitoring for Master Data Transfer From SRM to ECC
- IJAIEM-2013-06-30-119
- Lect2Channel Capacity
- 01678162
- Error detection and correction.ppt
- ds-cdm625
- Erasure Techniques in MRD Codes, by W. B. Vasantha Kandasamy, Florentin Smarandache, R. Sujatha, R. S. Raja Duray
- Advance Coding Theory v5.1-Lec-1 Introduction
- Elx Ds All Oc Ibmpower Ibm
- 13imagecompression-120321055027-phpapp02.pptx
- DC.doc
- 723_05072016_125900PM
- References.docx
- A Pseudo Lossless Image Compression Method
- Intelligent Frequency Hopping
- Data Hiding in Video Streaming by Code Word Substitution
- Crcdff
- Turbo Codes Decoding Apps (1)
- 001ab
- SkyEdge I I IP Brochure 2013-01-16
- Silicon Chip №4 2009
- Viterbi Algorithm Demystified
- Viterbi
- Integrating+Even+and+Odd+functions
- Lecture BSS
- Lecture 7
- Hfss Project

You are on page 1of 16

**EE 387 course information
**

◮

Instructor: John Gill, Packard 266

◮

Textbook: Algebraic Codes for Data Transmission by Richard Blahut

◮

Weekly homework, including occasional programming problems

◮

Midterm exam, in class, Monday, October 31, 9:00–10:20am

◮

Final exam, in class, Tuesday, December 8, 8:30–11:30am

◮

Class web page: http://www.stanford.edu/class/ee387

EE 387, September 21, 2015

Notes 1, Page 1

BCH and Reed-Solomon codes: definitions and properties 7. September 21. Linear block codes: matrices. Product codes. vector spaces. Cyclic codes: generator polynomials. syndromes.Textbook coverage Chapters 1 through 8 and 12 of Algebraic Codes for Data Transmission: 1. finite fields 3. shift registers 6. Introduction to error control codes 2. Page 2 . Implementation of Galois field arithmetic and shift register decoders 12. Introduction to algebra: groups. coding gain EE 387. 2015 Notes 1. Galois field structure and arithmetic 5. BCH and Reed-Solomon codes: decoders for errors and erasures 8. weight distributions 4. rings.

Communication systems The familiar communication system block diagram is shown below. EE 387. see EE 388. Source ∗ Source Encoder Encrypt Channel Encoder Modulator Channel Sink Source Decoder Decrypt Channel Decoder Noise ∗ Demodulator EE 387 covers only one part of communication systems: channel coding ◮ Design and analysis of block codes for error protection ◮ Algebraic rather than probabilistic techniques for decoding block codes Trellis. the source output and channel output are probabilistic. 2015 Notes 1. Page 3 . September 21. turbo. In communications theory. and LDPC codes are not covered.

Page 4 . public key.Other communication systems courses ◮ Source coding Data compression of digital data. channel errors cause error propagation. 2015 Notes 1. ◮ Lossless coding: Huffman codes. quantization of analog data. Music 422 ◮ Encryption Private key vs. Encryption works best with nonredundant plaintext. EE 376C. so good channel coding is very important Relevant courses: CS 255 EE 387. September 21. transform coding and motion estimation used in compressing images and video Relevant courses: EE 398A. Lempel-Ziv codes ◮ Lossy coding: vector quantization. so data compression improves security The output of a good encryption unit appears random. arithmetic coding.

Other communication systems courses (cont. EE 379 Advances in modulation schemes have resulted in significant improvements in communication rates and storage capacity. September 21.7) codes satisfy run-length constraints (“symbolic dynamics”): EE 392P (not offered) ◮ Modems: FSK. channel errors that the demodulator does not correct can result in error propagation and must be corrected by the channel decoder. Page 5 . GMSK. However. disk drives: 8-to-14 and RLL(1. PSK. EE 387.) ◮ Modulation Modulator generates waveforms suitable for transmission over a physical channel. ◮ AM: x(t) → (1 + ax(t)) sin 2πfc t : EE 279 ◮ CD-ROMs. and even fancier signal constellations: EE 359. 2015 Notes 1. QAM.

Information Theory The Source and Channel Coding Theorems imply the following: ◮ Reliable communication can be achieved at any rate below the capacity of the communication channel — in the limit for large amounts of data. without loss of reliability or efficiency — in principle. ◮ The communication problem can be broken down into the separate components shown in the above diagram. ◮ The net effect is to increase the rate at which reliable data is delivered. In EE 387 we will study how to achieve reliable communication with reasonable block sizes and feasible decoding complexity. September 21. but reduces the error rate when the redundancy is used to correct errors. ◮ This redundancy lowers the raw data rate.Relevant results from EE 376A. ◮ We add controlled redundancy to data transmitted over the channel. EE 387. 2015 Notes 1. Page 6 .

Error control classification The error control problem can be classified in several ways. analog (“soft”) ◮ Type of error control coding: detection vs. ◮ Type of errors: how much clustering — random. probabilistic The first two classifications are used to select a coding scheme according to the last three classifications. EE 387. catastrophic ◮ Type of modulator output: digital (“hard”) vs. Page 7 . September 21. convolutional ◮ Type of decoder: algebraic vs. correction ◮ Type of codes: block vs. 2015 Notes 1. burst.

Mod n1 . September 21. . . . 2015 Notes 1. EE 387. m2 . .) Important special case: i. m ˆ 2. channel has raw error rate Pr(xi 6= yi ). . Channel Dem m1 . . n2 . x2 .Error rate Consider the channel + modulator portion of the communication diagram. y1 . Page 8 . The raw error rate is the fraction of incorrect output symbols. y2 .d. Noise is the difference between received and transmitted symbols: n i = y i − xi ⇒ y i = xi + n i . n 1X lim Pr(xi 6= yi ) n→∞ n i=1 (This definition assumes that the demodulator output is hard data. . Channel Decoder m ˆ 1. . .i. . . . . . . Noise Channel Encoder x1 .

Burst: noise event causes a contiguous sequence of unreliable symbols. Random: independent noise symbols.16) code is used. is needed because packets are hopelessly corrupted. 2. Symbol error probability may change over time. Example: ethernet collisions. a single raw error may affect 16 data bits.d. Page 9 . September 21. 3.i. or Bernoulli. Example: when a (17. Catastrophic: channel becomes unusable for a period of time comparable to or longer than a data packet. perhaps i. EE 387. Retransmission. 1. Some causes of burst noise: ◮ Noise event is larger in duration or physical size than one symbol ◮ Error propagation may occur because of demodulator design. Each noise event affects isolated symbols. 2015 Notes 1.Noise clustering Channel noise can be classified by the dependence between noise events. perhaps at a much later time.

the bit error is reduced to about 10−9 .960) code with 40 check bits for every 1000-bit codeword can correct four errors per block.5% for checksums). After decoding. 1970). EE 387. error distribution requires a random error correcting code.5% for retransmision. We lose (and require retransmission of) one packet in 200. that is. Encode packets with 25-bit checksum. Redundancy: 1. 0. Redundancy: 4%. ◮ An i. Page 10 .Decoding complexity for three types of error clustering For raw error rate 10−4 .d. say (5000. September 21.. the cost of error protection decreases as errors change from random to burst. 2015 Notes 1. Redundancy: 1% (0. a (1000.4975). ◮ One catastrophe of length 100 or more. then we can use a single burst error correcting code. ◮ If burst errors have length 10. For example. we expect 100 errors per 106 bits.5%. one burst every 105 bits.g. For a fixed bit error rate. e. parameters (2000.i.

Lost data may be unfortunate. frames. Solution: checksums are included in messages (packets. If any part of the message is altered. maximum a posteriori ). Error correction is more complex than error detection. wrong data may be disastrous. Use redundancy in encoded message to estimate from the received data (senseword) what message was actually sent. September 21. Page 11 . “Proof”: ECC can be used for detection as follows: reject a message if any correction is needed. 2015 Notes 1. then the checksum is not valid (with high probability). EE 387. ◮ (Forward) error correction (FEC or ECC). sectors). The best estimate is typically the message that is “closest” to the senseword.Types of error protection ◮ Error detection Goal: avoid accepting faulty data. Optimal estimate is message that is most probable given what is received (MAP.

data data Encoder (systematic) Encoder (general) codeword data checks There is no memory betwen blocks.Types of error protecting codes ◮ Block codes Data is blocked into k-vectors of information digits. An encoding in which the information digits appear unchanged in the codewords is called systematic. The encoding of each data block is independent of past and future blocks. then encoded into n-digit codewords (n ≥ k) by adding p = n − k redundant check digits. September 21. Page 12 . 2015 Notes 1. EE 387.

) ◮ Convolutional codes Time-invariant encoding scheme: each n-bit codeword block depends on current information digits and on the past m n-bit information blocks The parameter m is called the memory order. September 21. EE 387. mi mi−1 c1i = mi c2i = mi + mi−1 For this rate 1/2 convolutional code. this is the number of bits that the decoder must consider. m = 1 and n = 2. Page 13 . The constraint length is (m + 1)n. 2015 Notes 1.Types of error protecting codes (cont. Here is the simplest convolutional code. Exercise: determine the error correction ability and a decoding method for the above convolutional code.

ground-based decoders). DVDs. short blocklength). WiFi. correction for burst errors).32/V. ◮ Modems.90 use trellis codes.Error control applications ◮ Planetary probes (Gaussian noise. 72-bit DIMMs for correction). V. ◮ Memory subsystems (9-bit SIMMs for detection. September 21. ◮ Datacomm networks (Ethernet. V. Page 14 . In many systems. EE 387.42 uses error detection with retransmission. ◮ Computer buses (high speed. Bluetooth) (usually error detection only). ◮ CDs. the possibility of errors is ignored. WAN. DATs. ◮ Magnetic disks and tapes (detection for soft errors. FDDI. minidisks. 2015 Notes 1. Digital sound needs ECC! ◮ Satellite TV.

◮ Choosing a good coding scheme may be difficult because error characteristics are not known. 2015 Notes 1. EE 387. September 21. ◮ Some applications use multiple coding techniques. The R-S code corrects burst errors introduced by the convolutional code.Coding schemes The above examples exhibit a range of data rates. Common solution: use methods that correct multiple classes of errors. Page 15 . One approach to combining codes is call concatenated codes. ◮ A common combination uses an inner convolutional code and an outer Reed-Solomon block code. error rates. ◮ Packet or frame has checksum (CRC) in addition to FEC redundancy. ◮ No single error protection scheme works for all applications. block sizes. Disadvantage: may not be “optimal” for any particular environment.

Concatenated code example Super Encoder Outer Encoder Super Decoder Inner Encoder Raw Channel Inner Decoder Outer Decoder Super Channel ◮ The outer code protects 400 24-bit symbol using 4 check symbols. This (29. This (404. Exercise: analyze the performance of this concatenated code. Page 16 . 2015 Notes 1. 24) binary block code can correct a single error in a 29-bit inner channel codeword. 400) code can correct up to two symbol errors. ◮ The outer code corrects short burst errors as well as most miscorrections made by the inner code. ◮ The inner code corrects random bit errors using 5 check bits for each 24 information bits. September 21. EE 387.

- Soft Error Tolerant CAMUploaded bysathyanarayanan_sure
- Nec S5000Uploaded byesdrasferraz
- Thesis 06Uploaded bywoodksd
- FlexiPlusProdDescC2.3Uploaded byMadeline Curry
- iDirect Evoluton Product Line OverviewUploaded byGin Cliver Silvano Al Dia
- Robust Video Broadcasting Over 802.11 in Time Correlated Fading ChannelsUploaded bykhajarasool_sk
- CodingUploaded byベラ ジェーク
- Middle Ware Configuration and Monitoring for Master Data Transfer From SRM to ECCUploaded byMadhu Kiran
- IJAIEM-2013-06-30-119Uploaded byeditorijaiem
- Lect2Channel CapacityUploaded byFatima Ahsan
- 01678162Uploaded byhimanshu.xlnc1444
- Error detection and correction.pptUploaded bySamyuktaAdepu
- ds-cdm625Uploaded byKrishankant Jingar
- Erasure Techniques in MRD Codes, by W. B. Vasantha Kandasamy, Florentin Smarandache, R. Sujatha, R. S. Raja DurayUploaded byscience2010
- Advance Coding Theory v5.1-Lec-1 IntroductionUploaded byNikesh Bajaj
- Elx Ds All Oc Ibmpower IbmUploaded byOvidiu Manolescu
- 13imagecompression-120321055027-phpapp02.pptxUploaded byTripathi Vina
- DC.docUploaded bysvkarthik83
- 723_05072016_125900PMUploaded byOla Gf Olamit
- References.docxUploaded byRahul Sharmaa
- A Pseudo Lossless Image Compression MethodUploaded bySindhya Jayaram
- Intelligent Frequency HoppingUploaded byUmar Abbas Babar
- Data Hiding in Video Streaming by Code Word SubstitutionUploaded byEditor IJRITCC
- CrcdffUploaded byMichael
- Turbo Codes Decoding Apps (1)Uploaded byvasantha priyanka
- 001abUploaded bysfofoby
- SkyEdge I I IP Brochure 2013-01-16Uploaded byp3dr0java
- Silicon Chip №4 2009Uploaded byMateja Radičević
- Viterbi Algorithm DemystifiedUploaded byssrsh82
- ViterbiUploaded byineedausername101