For anybody not a secret the fact that the transmission of any message, information can be distorted, i.e. in the transmitted information possible appearance of incorrect data. Misrepresentation might occur under the influence of many diverse factors, but the most common are:
the emergence of the sending, the receiving device or the transmitter malfunctions related to hardware or software part;
- the presence of interference in the connection channel of communication that may be associated with malfunction due to damage and malfunctions due to the presence of external influences (intentional or unintentional).
To ensure the integrity of the information of a message in transit on different communication channels today use different technologies but the most common, popular, simple and easy means of protecting data from the effects of is error coding.
The History of information assurance at the transmission began with 1948, when it was published the famous work of C. Shannon "a Mathematical theory of communication". This article is the basis for the formation of such concepts as error-correction coding, which is coding for controlling errors and, if necessary, their correction.
From the article Shannon follows a stunning conclusion to build communication, to minimize the formation errors in the message, it is difficult and not economically feasible. Much easier and cheaper to use different methods of encoding information. At the same time Shannon did not specify any specific codes, but only to prove their existence.
Recommended
How to get out of "Skype" on the "Android" and not only
How to get out of "Skype" "Android"? This question bothers many users. The thing is that the messenger is not so difficult. But there are features that are only for mobile versions. To log out of Skype in this case more difficult than it seems. But i...
Kingo ROOT: how to use the program to gain administrative rights on Android
The Gadgets on the platform Android regained the lion's share of the market. Developers are continually perfecting the OS, trying to fit the needs of the users, but from year to year admit palpable mistake: forbid the owner to "stuffing" of his gadge...
How to get from Stormwind to Tanaris: practical tips
World of Warcraft is an iconic MMORPG, uniting millions of players around the world. There are many locations and puzzles, secret trails and larger, but rather dangerous paths. Sooner or later, every player chose the side of the Alliance, we have to ...
Types of information coding have been extensively studied in the fifties of the last century, however, the results did not bring any practical effect. The next decade was marked by the finding of a technique that would allow to create a complex of technologies to reduce the likelihood of formation of errors in the transmission of the message.
The First technology is called block codes and were mainly mathematical in nature. First error-correction coding in this form was introduced in 1950-ies when the block codes can correct only one error. Of course, such codes are ineffective, but because for a long time held a variety of research and development. The result was the creation of a class of codes that allowed you to monitor and correct multiple errors.
A particular technology, characterizing the error-correction coding, – trying to comprehend encoding and decoding, the appearance and correction of errors from the point of view of probability theory. As a result of long studies was created by class nebelkovykh codes, which are most widespread convolutional codes.
In the seventies of the last century, these two technologies were considered in a unified manner, resulting finally managed to get those codes, which led it in his article, Shannon. As a result of a variety of works have been proposed two schemes, which formed a family of codes and has provided the high ensure the integrity of the message while it is being transferred via communication channels.
That was the story of the formation of the error-correcting coding. Of course, today proposed a variety of schemes and concepts for the preservation of information during transmission, which is different functionals, redundancy, reliability, structure, efficiency and other key characteristics.
Article in other languages:
AR: https://tostpost.com/ar/cars/7586-what-is-the-exam-in-the-traffic-police.html
BE: https://tostpost.com/be/a-tamab-l/13550-shto-zh-uya-lyae-saboy-ekzamen-u-d-bdr.html
DE: https://tostpost.com/de/autos/13553-was-ist-eine-pr-fung-in-der-verkehrspolizei.html
ES: https://tostpost.com/es/coches/13560-que-es-un-examen-en-el-gbdd.html
HI: https://tostpost.com/hi/cars/7592-what-is-the-exam-in-the-traffic-police.html
JA: https://tostpost.com/ja/cars/7588-what-is-the-exam-in-the-traffic-police.html
KK: https://tostpost.com/kk/avtomobil-der/13553-b-l-b-ld-red-emtihan-gibdd.html
PL: https://tostpost.com/pl/samochody/13540-co-to-jest-egzamin-do-policji.html
PT: https://tostpost.com/pt/carros/13534-o-que-um-exame-de-pol-cia-de-tr-nsito.html
TR: https://tostpost.com/tr/arabalar/13556-nedir-bu-s-nav-traf-k-polisi.html
UK: https://tostpost.com/uk/avtomob-l/13550-scho-zh-yavlya-soboyu-spit-v-gibdd.html
ZH: https://tostpost.com/zh/cars/8252-what-is-the-exam-in-the-traffic-police.html
Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."
Related News
How to connect a single monitor to 2 computers right
If you regularly work with multiple computers or the power of your personal PC is not enough to implement the tasks, there are many options that can ease your life. Today we will talk about how to connect a single monitor to 2 com...
Three ways how to write vertically in "Word"
the Program "word" is considered to be the leader among all editors. It includes many tools for working with text and beyond. But sometimes, at first glance, the most simple actions in it are too pretentious.In this article, you w...
What to do if hacked "Instagram" - detailed instructions and solutions to problems
Today we are going to figure out what to do if hacked "Instagram". This social network is very popular among users. It is designed specifically for sharing photos and information. Because of the high interest online hackers often ...
How to crop video: tips, software and instructions
In this information article provides answers to the question: “How to trim video”? This material, with an overview of computer programs with which you can accomplish this rather simple operation is useful for users who...
Program for screenshots. Description of capabilities
Programs for screenshots from your computer screen or laptop there is a huge number, but not all of them easy to use, and besides there are paid versions that have poor and limited functionality. In today's article I would like to...
How to install the router - step-by-step guide
If you decided to install wi-fi at home, at work, or in any other place, then you definitely need to purchase a special device called a router, or a router. This is a special device that gives out wireless Internet access at a cer...
Comments (0)
This article has no comment, be the first!