In most communication system convolutional encoders are used and AWGN introduces errors during transmission. In this paper all error detecting and error correcting mechanisms are studied and best mechanism on the basis of accuracy, complexity and power consumption is selected. Error detection and correction mechanisms are vital and numerous techniques exist for reducing the effect of bit - errors and trying to ensure that the receiver eventually gets an error free version of the packet. In order to protect memories against MCUs as well as SEUs is to make use of advanced Error detecting and correcting codes that can correct more than one error per word. There should be tradeoff between complexity of hardware and power consumption in decoder. Index Term:- Error correcting codes, error detecting codes, hamming codes, block codes INTRODUCTION: Error detection and correction mechanisms are vital and numerous techniques exist for reducing the effect of bit -errors and trying to ensure that the receiver eventually gets an error free version of the packet. The major techniques used are error detection with Automatic Repeat Request, Forward Error Correction and hybrid forms. Forward Error Correction is the method of transmitting error correction information along with the message. To prevent soft errors from causing data corruption, memories are typically protected with error correction codes. Error correcting codes (ECCs) are commonly used to protect against soft errors and thereby enhance system reliability and data integrity. Single error detecting and single error correcting codes are used for this purpose, these codes are able to correct single bit errors and detect double bit errors in a codeword. The code is often designed first with the goal of minimizing the gap from Shannon capacity and attaining the target error probability. ECC protects against undetected data corruption, and is used in computers where such corruption is unacceptable, as with some scientific and financial computing applications and as file servers. ECC also reduces the number of crashes, particularly unacceptable in multi-user server applications and maximum-availability systems. Error detection is most commonly realized using a suitable hash function (or checksum algorithm). A hash function adds a fixed-length tag to a message, which enables receivers to verify the delivered message by recomputing the tag and comparing it with the one provided.
[1]
C. E. SHANNON,et al.
A mathematical theory of communication
,
1948,
MOCO.
[2]
Eiji Fujiwara.
Code Design for Dependable Systems: Theory and Practical Applications
,
2006
.
[3]
S. A. Hariprasad,et al.
AN EFFICIENT VITERBI DECODER
,
2012
.
[4]
Mark F. Flanagan,et al.
Multiple Cell Upset Correction in Memories Using Difference Set Codes
,
2012,
IEEE Transactions on Circuits and Systems I: Regular Papers.
[5]
K. Gray.
Adding error-correcting circuitry to ASIC memory
,
2000
.
[6]
Sugato Basu,et al.
Reducing power consumption in memory ECC checkers
,
2004
.
[7]
Cecilia Metra,et al.
Power consumption of fault tolerant codes: the active elements
,
2003,
9th IEEE On-Line Testing Symposium, 2003. IOLTS 2003..