Fig 4 - uploaded by Ronnie Serfa Juan
Content may be subject to copyright.

Context in source publication

Context 1
... with power of 2 such as 2 0 , 2 1 , 2 2 , 2 3 and so on are dedicated only for redundant bits, and the rest are designated for input bit streams. Then, the required redundant bits will be calculated. When all redundant bits are determined, the necessary stuffed bits will be inserted before transmission. The proposed architecture is presented in Fig. 4. The input data bit streams from SOF to control bits will be fed to DLC detector. This detector determines the number of data bits to identify the needed redundant bit 'r'. Then, these data will be the inputs of the redundant bit controller. And it will compute for the necessary redundant bits. The redundant bit generator is a ...

Citations

... Therefore, the effect of Hamming code is difficult to be tested in the real world unless special hardware is first manufactured. Therefore, we have observed that Hamming code has been used in smart grid [7], CAN [8] and tele robotic system [9], all of which belong to a small private system rather than a wider protocol. ...
Preprint
Full-text available
Communication in poor network environment is always a difficult problem, since troubles such as bit errors and packet loss may often occur. It is generally believed that it is impossible to transmit data both accurately and efficiently in this case. However, this paper provides a method to transmit data efficiently on the line where bit error may occur by utilizing Hamming code principle. If the sender adds a small amount of redundant data to the data to be sent, the receiver can self-correct them when an error is detected. This approach takes advantage of the value of packets with errors, which should have been discarded, reduce the number of re-transmissions and improve transmission efficiency. Based on this method, this paper designs a custom protocol which works in the data link layer and network layer. Finally, this paper verifies the protocol through mathematical simulation.
... For 8-bit data we need 4 redundant bits as per the above condition. Therefore, the transmitting bit stream is a b c d p8 e f g p4 h p2 p1 Now P1 = h ^ g^ e^ d ^ b ( 1,3,5,7,9,11) = 1 P2 = h ^ f ^ e ^ c^ b (2,3,6,7,10,11) = 1 P4 = e ^ f ^ g ^ a (4, 5, 6, 7, 12) = 1 P8 = a ^ b ^ c ^ d (8,9,10,11,12) =0 Therefore, the parity bits are placed in the transmitting bit stream at p1, p2, p4, p8 positions and transmitted through the channel to the destination as (001101001111). The algorithmic steps are illustrated in Fig.3. ...
Conference Paper
Full-text available
In digital communications, errors occur very frequently because of the noise present in the transmission channel. When the digital data is transmitted, bits get corrupted due to various reasons. To avoid the corruption of transmitting data, fault diagnosis methods are used. These methods make the reliable delivery of transmitted bits over the communication channels. The usage of these techniques will add redundant bits in addition with actual information bits. The addition of redundant bits affects the bandwidth, signal power, latency and baud rate. Therefore, it is a challenging task in advanced communication systems like 4G and 5G. In this scenario, the proposed paper addresses the analysis of error detection and correction methods that are suitable for 4G and 5G communications. These techniques are implemented with Verilog HDL and experimented with Xilinx Vivado software tools and Artix 7 FPGA.