Chapter 4. Coding systems. 4.1 Binary codes Gray (reflected binary) code

Size: px
Start display at page:

Download "Chapter 4. Coding systems. 4.1 Binary codes Gray (reflected binary) code"

Transcription

1 Chapter 4 Codin systems Codin systems define how information is mapped to numbers. Different codin systems try to store/transmit information more efficiently [Sec. 4.], or protect it from damae while it is stored/transmitted on unreliable media [Sec. 4.]. 4. Binary codes A binary code defines the mappin between the members of a set of symbols and their correspondin binary numbers. 4.. Gray (reflected binary) code Gray code is a non-positional, non-weihted binary encodin of numbers. It is a minimum-chane code, in which adjacent values differ by only one bit. Gray code is also called reflected binary code. A -bit Gray code consists of the diits and, in that order. Given an existin n-bit code (n ) the n +-bit code is constructed by repeatin the existin n codes in reverse order (hence reflected ), and then prependin s in front of the n oriinal codes and s in front of the n repeated and reflected codes [Fi. 4.]. To convert a n-bit binary number b to a Gray code representation, each bit i is formed by addin the correspondin bit b i and the bit immediately to its left b i+ usin modulo- addition. (There is an implicit to the left of the most sinificant bit in b.) To convert a n-bit Gray code representation to a binary number b, each bit b i (startin with the N binary Gray bit reflect -bit reflect Fiure 4.: Reflected binary code binary = implicit + Gray = + binary = Fiure 4.: Gray code conversion most sinificant) is formed by addin the previous result bit b i+ to the correspondin bit i usin modulo- addition. (There is an implicit to the left of the most sinificant bit in b.) Binary to Gray code conversion is equivalent to takin the bitwise exclusive or of the input with itself shifted riht one bit [Al. 4.]. Each bit in the output from Gray code to binary conversion is the result of a cumulative exclusive or between the correspondin input bit and all input bits to the left of it [Al. 4.]. -bit 5

2 Alorithm 4. Convertin from binary to Gray code input: a binary number b output: the Gray code representation of b function BINARYTOGRAY(b) return b (b rshift ). is exclusive or end function Alorithm 4. Convertin from Gray code to binary input: a Gray code representation output: the correspondin binary value b function GRAYTOBINARY() b repeat b b rshift.xrshift y is x shifted riht by y bits until = return b end function Minimum-chane codes have many practical applications; for example, in telemetry, error correction, electro-mechanical sensor desin, enetic alorithms, simplification of combinational diital circuits [Sec. 5..], and decouplin of clocks in sequential diital circuits [Sec. 5.6]. 4.. ASCII The American Standard Code for Information Interchane (ASCII), is a fixed-width binary code that maps the latin alphabet, arabic numerals, and some common punctuation symbols to a binary representation. Each code is seven bits wide. The most sinificant bit is normally zero, althouh it can be used for parity [Sec. 4..] or to indicate the use of an ASCII-compatible extended codin system such as UTF 8 [Sec. 4..5]. The followin table shows the hexadecimal code for each of the 8 ASCII symbols. most sinificant diit least sinificant diit A B C D E F NUL SOH STX ETX EOT ENQ ACK BEL BS HT NL VT NP CR SO SI DLE DC DC DC DC4 NAK SYN ETB CAN EM SUB ESC FS GS RS US SP! " # $ % & ( ) * +, -. / : ; < = >? A B C D E F G H I J K L M N O 5 P Q R S T U V W X Y Z [ \ ] ^ 6 a b c d e f h i j k l m n o 7 p q r s t u v w x y z { } ~ DEL The first codes, and the final code, are non-printin control codes that communicate with the device receivin the data [App. A]. 6

3 4.. Unicode and UTF Unicode is a mappin of more than 8, characters (diits, puctuation, and symbols spannin 5 lanuaes and writin systems) to -bit code points (numbers) in the rane 6 FFFF 6. Most of the characters and symbols used in modern lanuaes have code points in the rane 6 FFFF 6 (the basic multilinual plane, BMP ) and fit into a 6- bit inteer. Code points in the rane 6 7E 6 correspond directly to the (non-control) ASCII characters. Code points in the rane 6 FFFF 6 (the supplemental planes) contain symbols for ancient lanuaes, mathematics, music notation, etc. Several encodins exist for Unicode, called Unicode Transformation Formats (UTF). The most common Unicode encodins are UTF, UTF 6, and UTF 8. UTF is a fixed-width encodin of Unicode in which each -bit code point is stored directly within a -bit inteer UTF 6 UTF 6 is a variable-width encodin of Unicode in which each -bit code point is represented as one or two 6-bit words. Code points in the basic multilinual plane can be represented directly as a sinle 6-bit word in the rane 6 FFFF 6. A code point in one of the supplemental planes ( 6 to FFFF 6 ) is encoded as two words. 6 is first subtracted from the code leavin a -bit number in the rane 6 FFFFF 6. The most sinificant ten bits of this result are added to D8 6 to create the hih surroate in the rane D8 6 DBFF 6. The least sinificant ten bits of the result are added to DC 6 to create the low surroate in the rane DC 6 DFFF 6. The code point is then stored or transmitted as the hih surroate followed by the low surroate. U+A (ASCII * ) UTF 6: A 6 U+65 (star symbol F ) UTF 6: 65 6 U+F (shootin star symbol ) F 6 6 = F 6 = D8 6 + = D8C 6 (hih surroate) DC 6 + = DF 6 (low surroate) UTF 6: D8C DF 6 Unicode does not assin any characters to code points in the rane D8 6 DFFF 6. There is no ambiuity between surroates and code points in the basic multilinual plane UTF 8 UTF 8 is an efficient, variable-width encodin of Unicode in which each -bit code point is represented usin between one and four 8-bit bytes. The first 8 code points ( 6 7F 6 ) are represented directly as a sinle 8-bit byte whose most sinificant bit is zero (makin UTF 8 a compatible superset of ASCII). Code points from 8 6 onwards are represented as a multibyte sequence in which each byte has its most sinificant bit set. The fist byte in an N-byte sequence has the most sinificant N bits set to, followed by a bit. The remainin bits encode the most sinificant 7

4 8 N bits of the code point. The next N bytes in the sequence have the most sinificant two bits set to, followed by the next six bits of the code point. number of bits code points byte byte byte byte F 6 xxxxxxx (5+6) 8 6 7FF 6 xxxxx xxxxxx 6 (4+6+6) 8 6 FFFF 6 xxxx xxxxxx xxxxxx (+6+6+6) 6 FFFF 6 xxx xxxxxx xxxxxx xxxxxx U+A (ASCII * ) UTF 8: A 6 U+65 (star symbol F ) 65 6 = UTF 8: E U+F (shootin star symbol ) F 6 = UTF 8: F8 9F 8C A 6 4. Source codin Source codin deals with encodin information efficiently, so that it requires less storae space or can be exchaned more rapidly. 4.. Huffman code Huffman codes are created by analysin a known messae text and constructin an optimal encodin specifically for that text. An alphabet is a set of symbols that can appear in a messae. Encodin beins by considerin the frequency of each alphabet symbol in the known messae. For the strin oolin, the alpbabet is {olin} with frequencies ranin from to. Dividin the frequency of a iven symbol by the total lenth of the strin ives the probability of that symbol appearin in the messae. f symbol P (s) l i n /8 o /8 /8 The code is constructed as a binary tree, from the bottom (leaves) up (towards the root), by repeatedly coalescin subtrees. Each subtree is labelled with the probability that a symbol within it will appear in the messae. An initial list of subtrees is created from the symbols of the alphabet, each of which becomes a leaf node labelled with its probability. The followin steps are then repeated find the two subtrees p and q havin the lowest probabilities; create a new subtree r with children p and q and probability P (r) =P (p)+p (q); remove p and q from, and insert r into, the list of subtrees until the list of subtrees contains only one element. The sinle subtree remainin in the list is the root of the Huffman encodin tree for the oriinal messae. 8

5 . An initial list of subtrees is formed from the alphabet symbols, each labelled with its probability. l i n o. The smallest two subtrees (nodes for symbols l and i ) are coalesced into a new subtree. The two symbol nodes are removed from, and the new subtree is inserted into, the list. n o l i. The smallest two subtrees (nodes for symbols n and o ) are coalesced into a new subtree. The two symbol nodes are removed from, and the new subtree is inserted into, the list. l i n o 4. The smallest two subtrees (subtree for il and node for symbol ) are coalesced into a new subtree. n 5. The smallest two subtrees (for no and li ) are coalesced into a new subtree. Only one subtree remains, and the coalescin process is complete. The root of the final subtree will always have a probability of (in this example, 8/8). Labellin left and riht children with and, respectively, yields the Huffman encodin tree for the oriinal n o messae. Each symbol now has a binary code correspondin to the strin of or bits that label the path from the root of the tree to the symbol s leaf node. Less probable symbols were coalesced first, and have the lonest codes. More probable symbols were coalesced later, and have the shortest codes. The encodin is unambiuous (no code is a prefix of any other code). It is specific to the messae, so sender and receiver must both aree on the encodin tree bein used. The oriinal messae can now be encoded as a sequence of bits, or a sequence of bits decoded into the oriinal messae. o o l i n o 8 l l i i 5 5 symbol encodin n o l i Stored as 8-bit bytes, the 8-character example messae occupies 64 bits. Stored usin its Huffman encodin, the 8-character example messae occupies 8 bits, a compression ratio of 64 8 = Channel codin Channel codes are desined to protect information from damae when stored on, or transmitted over, unreliable media. Parity bits [Sec. 4..] and CRC codes [Sec. 4..4] are used to detect errors. Hammin codes [Sec. 4..5] are used to correct small errors. 9

6 4.. Parity bits A binary number with an even number of s has even parity. A binary number with an odd number of s has odd parity. A parity bit is transmitted (or stored) alon with a number to uarantee an expected parity. In a sequence of numbers that are expected to have even parity, any number with odd parity must be damaed. (Any number with even parity is either undamaed, or has suffered an even number of bit inversions.) number parity even odd odd even odd even parity expected data p error (five s) error (three s) odd parity expected data p error (four s) error (four s) These lateral parity bits reliably detect only sinle-bit errors. 4.. Lonitudinal parity A parity word is added to the end of a fixed-lenth block of data. Each bit is a lonitudinal parity bit, calculated for the bits in a specific position with the block of data. If each bit position is expected to have odd parity, any position with even parity must be damaed. even lonitudinal parity parity word odd lonitudinal parity parity word Only sinle-bit errors can be detected. 4.. Block parity Block parity combines lateral parity bits and lonitudinal parity words for each block of data. Knowin both the damaed word and the damaed bit position allows the error to be corrected.

7 even lateral parity data p odd parity word odd lateral parity data p even parity word Block parity can reliably correct only a sinle-bit error Cyclic Reduncancy Check A cyclic redundancy check (CRC) adds a redundant checksum to each block of data, calculated usin a cyclic divison alorithm. CRCs are particularly ood for detectin burst errors. Burst errors are contiuous sequences of many incorrect bits, frequently encountered in communication channels (because of noise) and physical storae media (because of material defects). CRCs operate on one block of bits at a time, e.., a sinle byte (8 bits) or an Ethernet packet (up to 5 bytes =,4 bits). The number of check bits is usually smaller than the block size (Ethernet packets have check bits). Usin N check bits, burst errors of up to N bits in lenth (and some patterns loner than N bits) can be reliably detected. To calculate N check bits the data block bits are used as a dividend, and divided numerically by a N +-bit divisor. (An 8-bit CRC therefore requires a 9-bit divisor.) The result is a quotient and a N-bit remainder. The quotient is discarded and the N remainder bits are used as the CRC check bits. Unsined binary lon division is used to calculate the remainder [Sec..4]. N s are first appended to the riht of the dividend (the oriinal data block), to hold the remainder. The dividend and N +-bit divisor are left-alined, and the followin steps repeated the divisor shifted riht, if necessary, until its most sinificant bit is alined with the most sinificant bit of the dividend; and the divisor is subtracted from the dividend usin modulo- arithmetic (borrows between adjacent bits are inored), includin any result to the riht of the dividend in the N remainder bits until the dividend becomes zero. The N bits to the riht of the dividend are the remainder, and can be used as the CRC check bits for the oriinal data. (Modulo- subtraction is equivalent to performin a bitwise exclusive-or between the dividend and the divisor [Sec. 5..], makin it very efficient. Note that the N remainder bits, formed by appendin N zeros to the riht of the dividend, are included in the subtraction operations but are not considered when checkin if the dividend has reached zero.) Calculatin a -bit CRC for a 6-bit data block usin a -bit divisor :

8 dividend (oriinal data) bits ######## remainder (CRC) bits modulo- subtraction ( XOR operation) transmitted data (includin CRC) = = new dividend = alin divisor with MS dividend bit = alin divisor with MS dividend bit = dividend is zero, remainder (CRC) = The interity of the data can be verified by performin the same division, usin the received CRC bits as the initial remainder before performin the division. If the data was undamaed, the remainder bits (on completion of the division operation) will be zero. Burst errors of N bits or less in the data will enerate a non-zero remainder. = = = = dividend, remainder = ) no error A -bit burst error, forcin the third and fourth bits to zero, enerates a non-zero remainder: two-bit burst error ## = = = = = non-zero remainder ) error! Transmission and reception of the 6-bit data block usin a -bit CRC with divisor proceeds as follows:

9 CRC eneration 4..5 Hammin code! network transmission (or store and retrieve) CRC verification no error Hammin code is a form of parity that allows correction of sinle-bit errors and detection of double-bit errors, while bein more efficient than block parity. To enerate a Hammin code for a N-bit block of data: number the code bit positions in binary, startin from any bit position whose number is a power of two (,, 4, 8, etc.) is a parity bit p i all other bit positions are data bits d j stop numberin code bits when all N data bits have received a numbered position consider the binary number of each parity bit p n (a power of two, n ) all code bit positions whose binary number has bit n set to are to be included in the parity calculation for p n all other code bit positions are excluded from the calculation of p n Each data bit will be included in the calculation of a unique combination of two or more parity bits. bit number: content: p p d p 4 d d d 4 p 8 d 5 d 6 d 7 d 8 d 9 d d p 6 d d d 4 d 5 d 6 p p p 4 p 8 p 6 parity coverae (The pattern continues in the obvious way, for as many bit positions as are required.) Even or odd parity can be used. Usin even parity, the Hammin code for the 8-bit block is constructed as follows:

10 bit number: content: p p p 4 p 8 p p p 4 p 8 parity coverae Final code: When data is received, if all parity bits are correct then there is no error. Otherwise the sum of the bit positions of the incorrect parity bits identify the erroneous bit. If the bit in position 9 were to be damaed, parity bits p and p 8 would be incorrect, indicatin a problem with bit position +8=9. If the bit in position 4 were to be damaed, parity bit p 4 would be incorrect, indicatin a problem with bit position 4 (the parity bit p 4 itself). 4

Source coding and compression

Source coding and compression Computer Mathematics Week 5 Source coding and compression College of Information Science and Engineering Ritsumeikan University last week binary representations of signed numbers sign-magnitude, biased

More information

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS Chapter 1. 1.1. INTRODUCTION Digital computers have brought about the information age that we live in today. Computers are important tools because they can locate and process enormous amounts of information

More information

Chapter 3. Information Representation

Chapter 3. Information Representation Chapter 3 Information Representation Instruction Set Architecture APPLICATION LEVEL HIGH-ORDER LANGUAGE LEVEL ASSEMBLY LEVEL OPERATING SYSTEM LEVEL INSTRUCTION SET ARCHITECTURE LEVEL 3 MICROCODE LEVEL

More information

Positional Number System

Positional Number System Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.

More information

Fundamentals of Programming (C)

Fundamentals of Programming (C) Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems

More information

Data Representation and Binary Arithmetic. Lecture 2

Data Representation and Binary Arithmetic. Lecture 2 Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize

More information

CPS 104 Computer Organization and Programming Lecture-2 : Data representations,

CPS 104 Computer Organization and Programming Lecture-2 : Data representations, CPS 104 Computer Organization and Programming Lecture-2 : Data representations, Sep. 1, 1999 Dietolf Ramm http://www.cs.duke.edu/~dr/cps104.html CPS104 Lec2.1 GK&DR Fall 1999 Data Representation Computers

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize two

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified slides by Chris Wilcox, Colorado State University How do we represent data in a computer?!

More information

Bits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices.

Bits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices. Bits and Bytes 1 A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices. A byte is a sequence of 8 bits. A byte is also the fundamental unit of storage

More information

User s Manual. Xi3000 Scanner. Table of Contents

User s Manual. Xi3000 Scanner. Table of Contents Xi3000 Scanner User s Manual Table of Contents Restore Default Settings... 1 Exit Setup without Changes... 1 Configure Through RS232... 1 List Setting... 1 Buzzer Settings... 2 Reading Redundancy Setting...

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Decimal Numbers The position of each digit in a weighted

More information

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;

More information

Number System (Different Ways To Say How Many) Fall 2016

Number System (Different Ways To Say How Many) Fall 2016 Number System (Different Ways To Say How Many) Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/

More information

Fundamentals of Programming

Fundamentals of Programming Fundamentals of Programming Lecture 2 Number Systems & Arithmetic Lecturer : Ebrahim Jahandar Some Parts borrowed from slides by IETC1011-Yourk University Common Number Systems System Base Symbols Used

More information

Numbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras

Numbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras Numbers and Computers Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras 1 Think of a number between 1 and 15 8 9 10 11 12 13 14 15 4 5 6 7 12 13 14 15 2 3 6 7 10 11 14 15

More information

DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes

DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes 1 DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes 2 Data Types DATA REPRESENTATION Information that a Computer

More information

Number Systems Base r

Number Systems Base r King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 2 Fundamentals of Computer Engineering Term 22 Dr. Ashraf S. Hasan Mahmoud Rm 22-44 Ext. 724 Email: ashraf@ccse.kfupm.edu.sa 3/7/23

More information

Xi2000-BT Series Configuration Guide

Xi2000-BT Series Configuration Guide U.S. Default Settings Sequence Reset Scanner Xi2000-BT Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA

More information

Configuration Manual PULSAR C CCD SCANNER. Table of Contents

Configuration Manual PULSAR C CCD SCANNER. Table of Contents Table of Contents PULSAR C CCD SCANNER Configuration Manual Metrologic Instruments GmbH Dornier Strasse 2 82178 Puchheim Germany Tel +49 89 890190 Fax +49 89 89019200 www.europe.metrologic.com Metrologic

More information

ASSIGNMENT 5 TIPS AND TRICKS

ASSIGNMENT 5 TIPS AND TRICKS ASSIGNMENT 5 TIPS AND TRICKS linear-feedback shift registers Java implementation a simple encryption scheme http://princeton.edu/~cos26 Last updated on /26/7 : PM Goals OOP: implement a data type; write

More information

Chapter 2 Number System

Chapter 2 Number System Chapter 2 Number System Embedded Systems with ARM Cortext-M Updated: Tuesday, January 16, 2018 What you should know.. Before coming to this class Decimal Binary Octal Hex 0 0000 00 0x0 1 0001 01 0x1 2

More information

Survey on Error Control Coding Techniques

Survey on Error Control Coding Techniques Survey on Error Control Codin Techniques Suriya.N 1 SNS Collee of Enineerin, Department of ECE, surikala@mail.com S.Kamalakannan 2 SNS Collee of Enineerin, Department of ECE, kamalakannan.ap@mail.com Abstract

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified by Chris Wilcox, S. Rajopadhye Colorado State University How do we represent data

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

The Binary Number System

The Binary Number System The Binary Number System Robert B. Heckendorn University of Idaho August 24, 2017 Numbers are said to be represented by a place-value system, where the value of a symbol depends on where it is... its place.

More information

Universal Asynchronous Receiver Transmitter Communication

Universal Asynchronous Receiver Transmitter Communication Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission

More information

Number Representations

Number Representations Simple Arithmetic [Arithm Notes] Number representations Signed numbers Sign-magnitude, ones and twos complement Arithmetic Addition, subtraction, negation, overflow MIPS instructions Logic operations MIPS

More information

PureScan - ML1. Configuration Guide. Wireless Linear Imager Wireless Laser scanner - 1 -

PureScan - ML1. Configuration Guide. Wireless Linear Imager Wireless Laser scanner - 1 - PureScan - ML1 Wireless Linear Imager Wireless Laser scanner Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 Chapter 2

More information

5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital

5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital Chapter 8: Bits and the "Why" of Bytes: Representing Information Digitally Digitizing Discrete Information Fluency with Information Technology Third Edition by Lawrence Snyder Copyright 2008 Pearson Education,

More information

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example The Basics Binary Numbers Part Bit of This and a Bit of That What is a Number? Base Number We use the Hindu-Arabic Number System positional grouping system each position represents a power of Binary numbers

More information

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc. 9 February 2011 CSE-1520R Test #1 [7F] w/ answers p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The

More information

Number Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers

Number Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers Outline of Introduction Administrivia What is computer architecture? What do computers do? Representing high level things in binary Data objects: integers, decimals, characters, etc. Memory locations (We

More information

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc. 9 February 2011 CSE-1520R Test #1 [B4] p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The exam is closed

More information

CHW 261: Logic Design

CHW 261: Logic Design CHW 261: Logic Design Instructors: Prof. Hala Zayed Dr. Ahmed Shalaby http://www.bu.edu.eg/staff/halazayed14 http://bu.edu.eg/staff/ahmedshalaby14# Slide 1 Slide 2 Slide 3 Digital Fundamentals CHAPTER

More information

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme 2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme repeated (integer) division by two. Example: What is

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Computer is a binary digital system. Digital system: finite number of symbols Binary (base two) system: has two states: 0 and 1 Basic unit of information is the

More information

CS341 *** TURN OFF ALL CELLPHONES *** Practice NAME

CS341 *** TURN OFF ALL CELLPHONES *** Practice NAME CS341 *** TURN OFF ALL CELLPHONES *** Practice Final Exam B. Wilson NAME OPEN BOOK / OPEN NOTES: I GIVE PARTIAL CREDIT! SHOW ALL WORK! 1. Processor Architecture (20 points) a. In a Harvard architecture

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point

More information

UNIT 2 NUMBER SYSTEM AND PROGRAMMING LANGUAGES

UNIT 2 NUMBER SYSTEM AND PROGRAMMING LANGUAGES UNIT 2 NUMBER SYSTEM AND PROGRAMMING LANGUAGES Structure 2.0 Introduction 2.1 Unit Objectives 2.2 Number Systems 2.3 Bits and Bytes 2.4 Binary Number System 2.5 Decimal Number System 2.6 Octal Number System

More information

Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School

Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions Mr. Dave Clausen La Cañada High School Vocabulary Variable- A variable holds data that can change while the program

More information

Under the Hood: Data Representation. Computer Science 104 Lecture 2

Under the Hood: Data Representation. Computer Science 104 Lecture 2 Under the Hood: Data Representation Computer Science 104 Lecture 2 Admin Piazza, Sakai Up Everyone should have access Homework 1 Posted Due Feb 6 PDF or Plain Text Only: No Word or RTF Recommended: Learn

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

Hardware. ( Not so hard really )

Hardware. ( Not so hard really ) Hardware ( Not so hard really ) Introduction to Computers What is a computer? Why use a computer anyway? Do they have limitations? What s next? A bit of history Mechanical Early 1614 1643 1673 Abacus Slide

More information

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Pradip Vallathol and Junaid Khalid Midterm Examination 1 In Class (50 minutes) Friday, September

More information

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Junaid Khalid and Pradip Vallathol Midterm Examination 1 In Class (50 minutes) Friday, September

More information

Table of Contents Sleep Settings How to Configure the Scanner. 7 Chapter 2 System Setup

Table of Contents Sleep Settings How to Configure the Scanner. 7 Chapter 2 System Setup Table of Contents Chapter 1 System Information 1.1 Setup Scanner with PC 1.2 Setup Scanner with Mobile Device 1.3 Configure ios On-Screen Keyboard 1.4 Memory Mode 3 4 4 5 1.5 Sleep Settings 6 1.6 How to

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

Lecture (09) x86 programming 8

Lecture (09) x86 programming 8 Lecture (09) x86 programming 8 By: Dr. Ahmed ElShafee 1 Basic Input Output System BIOS BIOS refers to a set of procedures or functions that enable the programmer have access to the hardware of the computer.

More information

CPSC 301: Computing in the Life Sciences Lecture Notes 16: Data Representation

CPSC 301: Computing in the Life Sciences Lecture Notes 16: Data Representation CPSC 301: Computing in the Life Sciences Lecture Notes 16: Data Representation George Tsiknis University of British Columbia Department of Computer Science Winter Term 2, 2015-2016 Last updated: 04/04/2016

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 1 Modified by Yuttapong Jiraraksopakun Floyd, Digital Fundamentals, 10 th 2008 Pearson Education ENE, KMUTT ed 2009 Analog Quantities Most natural quantities

More information

Variables and data types

Variables and data types Programming with Python Module 1 Variables and data types Theoretical part Contents 1 Module overview 4 2 Writing computer programs 4 2.1 Computer programs consist of data and instructions......... 4 2.2

More information

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey 4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 ANNOUNCEMENTS TA Office Hours (ITE 334): Genaro Hernandez, Jr. Mon 10am 12noon Roshan Ghumare Wed 10am 12noon Prof.

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

Review of Number Systems

Review of Number Systems Review of Number Systems The study of number systems is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a digital computer.

More information

Logic and Computer Design Fundamentals. Chapter 1 Digital Computers and Information

Logic and Computer Design Fundamentals. Chapter 1 Digital Computers and Information Logic and Computer Design Fundamentals Chapter 1 Digital Computers and Information Overview Digital Systems and Computer Systems Information Representation Number Systems [binary, octal and hexadecimal]

More information

Exercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014

Exercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014 Exercises Software Development I 03 Data Representation Data types, range of values, ernal format, literals October 22nd, 2014 Software Development I Wer term 2013/2014 Priv.-Doz. Dipl.-Ing. Dr. Andreas

More information

Digital Fundamentals

Digital Fundamentals Digital Fundamentals Tenth Edition Floyd Chapter 2 2009 Pearson Education, Upper 2008 Pearson Saddle River, Education NJ 07458. All Rights Reserved Quiz 2 Agenda Lecture: Chapter 2 (2-7 through 2-11):

More information

Unit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation

Unit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation 3.1 3.2 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.3 3.4 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based

More information

EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART) EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: Introduction To understand and apply USART command for sending and receiving data Universal Serial Asynchronous

More information

2D BARCODE SCANNER CA-SC-20200B

2D BARCODE SCANNER CA-SC-20200B D BARCODE SCANNER CA-SC-B Quick Start Guide Getting Familiar with Your Device Thank you for choosing Capture Bar Code Scanner. All Devices deliver world-class performance for a broad range of applications

More information

BARCODE SCANNER. Configuration Guide - 1 -

BARCODE SCANNER. Configuration Guide - 1 - BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 1.3 How to set up the parameter - II 4 Chapter 2 System

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART) EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: To understand and apply USART command for sending and receiving data Introduction Universal Serial Asynchronous

More information

marson MT8200S 2D Handheld Scanner User Manual V / 6 / 25 - I -

marson MT8200S 2D Handheld Scanner User Manual V / 6 / 25 - I - marson MT8200S 2D Handheld Scanner User Manual V1.1 2018 / 6 / 25 - I - Table of Contents 1 Gettting Started...1 1.1 Introduction...1 1.2 Configuring MT8200S...1 1.2.1 Barcode Configurability...1 1.2.2

More information

Chapter 8. Characters and Strings

Chapter 8. Characters and Strings Chapter 8 Characters and s OJECTIVES After you have read and studied this chapter, you should be able to Declare and manipulate data of the char data type. Write string processing programs using and uffer

More information

Oberon Data Types. Matteo Corti. December 5, 2001

Oberon Data Types. Matteo Corti. December 5, 2001 Oberon Data Types Matteo Corti corti@inf.ethz.ch December 5, 2001 1 Introduction This document is aimed at students without any previous programming experience. We briefly describe some data types of the

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

NC-1200 BARCODE SCANNER. Configuration Guide - 1 -

NC-1200 BARCODE SCANNER. Configuration Guide - 1 - NC-1200 BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter-i 3 1.3 How to set up the parameter II 4 1.4 Resetting

More information

EE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

EE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL 3. 3. EE 9 Unit 3 Binary Representation Systems ANALOG VS. DIGITAL 3.3 3. Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world

More information

D I G I T A L C I R C U I T S E E

D I G I T A L C I R C U I T S E E D I G I T A L C I R C U I T S E E Digital Circuits Basic Scope and Introduction This book covers theory solved examples and previous year gate question for following topics: Number system, Boolean algebra,

More information

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent? CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,

More information

S-Series Sensor ASCII Protocol v8.1.0

S-Series Sensor ASCII Protocol v8.1.0 S-Series Sensor v8.1.0 Legend: ADR Node/Slave Address TIME STAT Status Byte ERR CTRL Control Byte SP # POS Position DATA TARG Target CHAR VEL Velocity OFF SN CODE PAR # Serial Number Security Code Parameter

More information

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web Internet Gambling Investigations Architecture of the World Wide Web Ω Objectives During this session we will discuss: The term world wide web User interaction on the world wide web The purpose of gateways

More information

Number Systems II MA1S1. Tristan McLoughlin. November 30, 2013

Number Systems II MA1S1. Tristan McLoughlin. November 30, 2013 Number Systems II MA1S1 Tristan McLoughlin November 30, 2013 http://en.wikipedia.org/wiki/binary numeral system http://accu.org/index.php/articles/18 http://www.binaryconvert.com http://en.wikipedia.org/wiki/ascii

More information

MYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes

MYcsvtu Notes DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes Hamming Codes 1. DATA REPRESENTATION Information that a Computer

More information

3.1. Unit 3. Binary Representation

3.1. Unit 3. Binary Representation 3.1 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.2 3.3 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based on discrete

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Connecting UniOP to Datalogic Barcode Readers

Connecting UniOP to Datalogic Barcode Readers Connecting UniOP to Datalogic Barcode Readers This Technical Note contains the information needed to connect UniOP to Datalogic Barcode Scanners. Contents 1. Introduction...1 2. Designer setup...1 2.1

More information

CHAPTER 2 Data Representation in Computer Systems

CHAPTER 2 Data Representation in Computer Systems CHAPTER 2 Data Representation in Computer Systems 2.1 Introduction 37 2.2 Positional Numbering Systems 38 2.3 Decimal to Binary Conversions 38 2.3.1 Converting Unsigned Whole Numbers 39 2.3.2 Converting

More information

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent? CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,

More information

Digital Representation

Digital Representation Special guests today: Informatics students: Benji Schwartz-Gilbert Ryan Musgrave DevynJones Announcements Why is BYTE spelled with a Y? Why "BYTE" The Engineers at IBM were looking for a word for a quantity

More information

Simple Data Types in C. Alan L. Cox

Simple Data Types in C. Alan L. Cox Simple Data Types in C Alan L. Cox alc@rice.edu Objectives Be able to explain to others what a data type is Be able to use basic data types in C programs Be able to see the inaccuracies and limitations

More information

Experiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program.

Experiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program. Experiment 3 Introduction: In this experiment the students are exposed to the structure of an assembly language program and the definition of data variables and constants. Objectives: Assembly language

More information

EE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

EE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL EE 9 Unit Binary Representation Systems ANALOG VS. DIGITAL Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world is based on discrete

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

Coding Theory. Networks and Embedded Software. Digital Circuits. by Wolfgang Neff

Coding Theory. Networks and Embedded Software. Digital Circuits. by Wolfgang Neff Coding Theory Networks and Embedded Software Digital Circuits by Wolfgang Neff Coding (1) Basic concepts Information Knowledge about something Abstract concept (just in mind, can not be touched) Data Representation

More information

SPM90 MODBUS PROTOCOL AND REGISTER LIST V1.0

SPM90 MODBUS PROTOCOL AND REGISTER LIST V1.0 SPM90 MODBUS PROTOCOL AND REGISTER LIST V1.0 目 录 1. Introduction... 1 1.1 Purpose of the Communication Protocol... 1 1.2 Version of Communication Protocol... 1 2. Detailed Description of the SPM90 Modbus

More information

MK D Imager Barcode Scanner Configuration Guide

MK D Imager Barcode Scanner Configuration Guide MK-5500 2D Imager Barcode Scanner Configuration Guide V1.4 Table of Contents 1 Getting Started... 3 1.1 About This Guide... 3 1.2 Barcode Scanning... 3 1.3 Factory Defaults... 3 2 Communication Interfaces...

More information

FD-011WU. 2D Barcode Reader User Guide V1.6CC

FD-011WU. 2D Barcode Reader User Guide V1.6CC FD-011WU 2D Barcode Reader User Guide V1.6CC Table of Contents 1 Getting Started... 1 1.1 Factory Defaults... 1 2 Communication Interfaces...2 2.1 TTL-232 Interface... 2 2.2 Baud Rate... 3 2.3 Data Bit

More information

Problem Max. Points Act. Points Grader

Problem Max. Points Act. Points Grader Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2007-12-12 Dr. Jürgen Schönwälder Duration: 90 minutes Final Examination The Jacobs University s Code of Academic Integrity applies

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Imperial College London Department of Computing

Imperial College London Department of Computing Imperial College London Department of Computing Architecture SELF-STUDY NOTES January 2018 Integers and Characters (1) Self-Study Welcome to the Computer Architecture course. These notes cover basic topics

More information

MOBILE THERMAL PRINTER

MOBILE THERMAL PRINTER MOBILE THERMAL PRINTER MODEL CMP-30 series ESC Command Manual Rev. 1.00 TABLE OF CONTENTS 1. Command Description... 6 2. Commands... 7 HT... 7 LF... 7 CR... 8 FF... 8 CAN... 8 DLE EOT... 9 DLE ENQ... 12

More information

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images  Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images

More information