Mathematical Theory of Communication

Mathematical Theory of Communication

University of Pennsylvania ScholarlyCommons Departmental Papers (ASC) Annenberg School for Communication 2009 Mathematical Theory of Communication Klaus Krippendorff University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/asc_papers Part of the Communication Technology and New Media Commons Recommended Citation (OVERRIDE) Krippendorff, K. (2009). Mathematical theory of communication. In S. W. Littlejohn & K. A. Foss (Eds.), Encyclopedia of communication theory (pp. 614-618). Los Angeles, CA: Sage. Retrieved from http://repository.upenn.edu/asc_papers/169 This is the corrected version of the original entry. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/asc_papers/169 For more information, please contact [email protected]. Mathematical Theory of Communication Disciplines Communication Technology and New Media Comments This is the corrected version of the original entry. This book chapter is available at ScholarlyCommons: https://repository.upenn.edu/asc_papers/169 Corrected pages 614-618 in S. W. Littlejohn & K. A. Foss (Eds.). Encyclopedia of Communication Theory . Los Angeles: Sage, 2009. MATHEMATICAL THEORY and two different messages should provide more information than either by itself.. OF COMMUNICATION To define quantities associated with selecting messages, in his 2nd theorem, Shannon proved that Claude Shannon’s mathematical theory of the logarithm function was the only one that communication concerns quantitative limits of conforms to the above intuitions. Logarithms mediated communication. The theory has a history increase monotonically with the number of in cryptography and of measuring telephone traffic. alternatives available for selection, and are additive Paralleling work by U.S. cybernetician Norbert when alternatives are multiplicative. While the base Wiener and Soviet logician Andrei N. Kolmogorov, of this logarithm is arbitrary, Shannon set it to two, the theory was first published after declassification thereby acknowledging that the choice among two in 1948. Due to Wilbur Schramm’s initiative, it equally likely alternatives—answering a yes or no appeared in 1949 as a book with a brief commentary question or turning a switch on or off—is the most by Warren Weaver. The theory provided a scientific elementary choice conceivable. His basic measure, foundation to the emerging discipline of called entropy H is communication but is now recognized as addressing only parts of the field. H( X ) px log2 px xX For Shannon, “the fundamental problem of communication is reproducing at one point either where px is the probability of message x occurring in exactly or approximately a message selected at the set of possible messages X. The minus sign another point” (Shannon & Weaver, 1949, p. 3). assures that entropies are positive quantities. With Shannon did not want to confound his theory by NX as the size of the set X of possible messages, H’s psychological issues and considered meanings range is irrelevant to the problem of using, analyzing, and 0 ≤ H(X) ≤ log2NX. designing mediated communication. The key to Shannon’s theory is that messages are distinguished H averages the number of binary choices needed by selecting them from a set of possible messages – to select one message from a larger set, or the whatever criteria determine that choice. His theory number of binary digits, bits for short, needed to has 22 theorems and seven appendices. Its basic enumerate that set. H is interpretable as a measure idea is outlined as follows. of uncertainty, variation, disorder, ignorance, or lack of information. When alternatives are equally likely, The Basic Measure No alternative = no choice, px=1 and H = 0 bits Arguably, informed choices are made to a degree better than chance and selecting a correct answer Two alternatives from among many possible answers to a question is = one binary choice, px=0.5 and H = 1 bit more difficult and requires more information than Four alternatives selecting one from among few. For example, = two binary choices, px=0.25 and H = 2 bits guessing the name of a person is more difficult than guessing its gender. So, its name would provide Eight alternatives more information than its gender, the former often = three binary choices, px=0.125 and H = 3 bits implying information about the latter. Intuitively, … communication that eliminates all alternatives N alternatives conveys more information than one that leaves some = log2N binary choices, px=1/N and H = log2N bits of them uncertain. Furthermore, two identical messages should provide the information of any one 2N alternatives –N = N binary choices, px=2 and H = N bits. Entropies and Communication T(S:R) = H(R) – HS(R), the uncertainty at receiver The additivity of H gives rise to a calculus of R minus noise communication. For a sender S and a receiver R one = H(S) – HR(S), the uncertainty at sender S can measure three basic entropies. minus equivocation 1. The uncertainty of messages s at sender S, = H(S) + H(R) – H(SR), the sum of the occurring with probability ps uncertainties at S and R minus the total H( S ) p log p . sS s 2 s = H(SR) – HS(R) – HR(S), the total uncertainty minus noise and equivocation 2. The uncertainty of messages r at receiver R, The algebraic relationships between these occurring with probability pr quantities are visualized in the center of Figure 1. H( R ) p log p . rR r 2 r Accordingly, 3. The total uncertainty of s-r pairs of messages in Communication is the extent a sender is able a S×R table, occurring with probability psr to limit the receiver’s choices, and H( SR ) p log p . Information is the extent a receiver knows the sS rR sr 2 sr sender’s choices. These lead to the sender-unrelated uncertainty Both are interpretations of the same quantity, entering a communication channel, colloquially T(S:R), the amount of information transmitted. Both called noise, and expressed as: express differences between two uncertainties, with and without knowing the choices made at the other HS ( R ) H( SR ) H( S ), point of a communication channel. They increase the uncertainty in the sender lost due to with the number of choices or the improbability of simplifications or omissions during communication, the alternatives reduced in the cause of transmission. called equivocation, and expressed as T(S:R) quantifies a symmetrical relationship, not the property of a message. HR( S ) H( SR ) H( R ). and the amount of information transmitted between sender and receiver, which can be obtained in at least four ways: Relation to Thermodynamics Cryptographers pursue two tasks, (1) finding a code to decipher intercepted messages whose apparent The well-known second law of thermodynamics gibberish is presumed to transmit valuable states that for any closed system, utilizable energy information, and (2) developing codes by which differences such as of temperature, pressure, and messages with sensitive information may be chemical potential decrease over time. Only outside intercepted by unauthorized persons but cannot be resources may counteract this natural tendency. read by them. During WWII, Shannon proposed Thermodynamic processes converge to a state of unbreakable codes, now outdated and replaced by maximum entropy at which all utilizable energy is pairs of encoding and decoding algorithms whose exhausted and everything stops. Shannon’s theory reconstruction exceeds computational limits. of communication has been considered a more general formulation of this law. It states that noise Hence, the mathematical theory of or disorder can only increase, in communication communication also addresses limits on the ability terms eroding information, i.e., the ability of the to find codes to reproduce a sender’s originals. As receiver to relate what is received to what was sent. such, the transmission of choices and the Without outside intervention, the process converges reproduction of original messages are prerequisites to where only noise prevails, equivocation has of all mediated communication. The readability of irrecoverably omitted all details of the original, and reproduced messages is a cultural issue, however, communication has ceased. One can experience the and goes beyond the theory. To understand each beginning of this process by repeatedly others’ messages, communicators must be literate in photographing a photograph or making Xerox copies each others’ language communities. of Xerox copies ad infinitum. After each iteration, the grain of an image becomes rougher, distinctions Redundancy become blurred, ultimately disappear, and the chance to recover the original becomes increasingly Redundancy or inefficient transmission is the unlikely. difference between the capacity of a communication channel and how much of it is utilized Coding R(S:R) = Max[T(S:R)] – T(S:R). Figure 1 distinguishes between the transmission of Redundancy may be due to (1) unused channel information and the reproduction of original capacity, (2) duplicate transmission of messages, and messages. Transmission involves translating (3) restrictions on the set of possible messages, for messages from one medium to another, not example, by a grammar or specialized vocabulary. necessarily readable along its way. For example, the Redundancy seems wasteful but is of considerable signals that transmit a document to a fax machine importance in human communication. may be overheard without making sense, yet they Much of Shannon’s theory concerns the ability convey all

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us