Q
Problem solve Get help with specific problems with your technologies, process and projects.

# Hamming code

An 8 bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary...

value after encoding?

The given 8 bit byte with a binary value of 10101111 yields a parity value of 101001001111.

This is how you solve it:

1. Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
2. All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17, etc.)
```_ _ 1 _ 0 1 0 _ 1 1 1 1
```
3. Each parity bit calculates the parity for some of the bits in the code word. The position of the parity bit determines the sequence of bits that it alternately checks and skips.
Position 1: check 1 bit, skip 1 bit, check 1 bit, skip 1 bit, etc. (1,3,5,7,9,11,13,15,...)
Position 2: check 2 bits, skip 2 bits, check 2 bits, skip 2 bits, etc. (2,3,6,7,10,11,14,15,...)
Position 4: check 4 bits, skip 4 bits, check 4 bits, skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...)
Position 8: check 8 bits, skip 8 bits, check 8 bits, skip 8 bits, etc. (8-15,24-31,40-47,...)
Position 16: check 16 bits, skip 16 bits, check 16 bits, skip 16 bits, etc. (16-31,48-63,80-95,...)
Position 32: check 32 bits, skip 32 bits, check 32 bits, skip 32 bits, etc. (32-63,96-127,160-191,...)
etc.
4. Set a parity bit to 1 if the total number of ones in the positions it checks is odd. Set a parity bit to 0 if the total number of ones in the positions it checks is even.

Doing the calculations: Position 1 yields a value of 3, which is odd and therefore a 1. Positions 2, 4 and 8 equal 4, 2 and 4 respectively. So they each get a value of 0. Filling them in gets you:

```1 0 1 0 0 1 0 0 1 1 1 1
```

This question was answered by Kevin Wnek, IT Specialist for TechTarget.
Kevin has a degree in mechanical engineering from Northeastern University. Kevin enjoys digging into the bits and bytes that make up the computer industry. His hobbies include quantum physics and linear mathematics.

This was last published in April 2003

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

### 1 comment

Send me notifications when other members comment.
A video tutorial plz
Cancel

## SearchSDN

• ### Enterprises choose managed SD-WAN over DIY SD-WAN deployment

Enterprises prefer purchasing managed SD-WAN services, rather than taking the DIY SD-WAN deployment approach, according to recent...

• ### Consider the Ethernet option for primary SD-WAN connectivity

SD-WAN connectivity offers the ability to use a variety of links. While most enterprises opt to use cable or DSL as the primary ...

• ### SD-branch network concept as next stage of WAN connectivity

SD-branch uses SD-WAN technology to simplify the branch network. It integrates multiple network functions now housed in separate ...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Evaluate team collaboration tools to increase productivity

Organizations need to consider several factors when buying a team collaboration tool, including deployment options and security ...

• ### Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• ### Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

## SearchMobileComputing

• ### Android Enterprise Recommended touts quick security updates

Google's new program certifies devices that meet minimum hardware requirements, provide regular Android security updates and ...

• ### Make room for AI for mobile in the future

AI is one of the hottest new technologies in mobile. Evaluate the AI market and determine how your organization can take ...

• ### Five steps to effective usability testing for mobile apps

To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it...

## SearchDataCenter

• ### IBM Power9 servers seek market inroads to AI, cloud

IBM follows up its first Power9 server with a raft of systems designed to appeal to a wider array of markets -- most notably, AI ...

• ### Evaluate read-intensive and write-intensive SSD use cases

Consider write wear, performance and other factors when choosing between read-intensive, write-intensive and mixed-use ...

• ### Some hyper-converged infrastructure use cases pose pitfalls

Hyper-converged infrastructure adoption is skyrocketing, but that doesn't mean that the technology is the best choice for every ...

## SearchITChannel

• ### Verizon beefs up managed WLAN portfolio with analytics

Verizon is using technology from Mist to anchor a managed SD-WLAN service in an effort to extend its service footprint to ...

• ### Premier BPO gains cloud infrastructure in DinCloud buyout

Premier BPO has purchased DinCloud, a cloud services provider, in a move that acknowledges the increasing importance of scale in ...

• ### Anomali targets managed security service providers for global expansion

Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news ...

Close