Why Is Information Theory So Confusing?

AI Thread Summary
Understanding information theory is crucial for grasping network design concepts. It begins with the notion of a random variable, where entropy represents the average number of bits needed to transmit its value. Key questions in information theory include the usefulness of information, the requirements for communication over noisy channels, dependencies between pieces of information, and the ability to transform information. The definition of information varies widely, from textual messages to binary data transmitted over networks. Resources such as textbooks and online lecture notes can provide deeper insights into these concepts, with entropy addressing the usefulness of information, channel capacity discussing communication requirements, and mutual information exploring dependencies. A focused search for "Information Theory Lecture Notes" can yield valuable educational materials.
pr0xibus
Messages
2
Reaction score
0
Right guys i am on my 3rd year at uni doing computer network management & design, i have passed everything apart from network design and I am having to take a resit.

I don't understand information theory AT ALL.

They went over it in class but made no sense, i also asked the tutor to explain it to me but it still doesn't make any sense.

Can anyone help with this, website,pdf anything would be helpful

Cheers
 
Technology news on Phys.org
In order to understand information theory you first need to understand what a random variable is. The entropy of a random variable is the average number of bits required to transmit the value of that random variable from one point to another.

That's the basic idea, but you could try your book or wikipedia for more information.
 
Information theory attempts to ask certain questions like :
A] What does it mean for an information to be useful? How can I measure it?
B] Given that there is a noisy medium for this information to be communicated through, what should be the pre-requisites for this medium?
C] How can I find whether one information is dependent on the other? Can I measure it?
D] Can I transform one information into another and back?
etc.

As you can see, these questions are very general. The answer to these questions highly depend on how information gets defined. The very definition of information is very diverse. For example,
1] the text in this reply is information being passed from me to you OR
2] when alice sang to bob about einstein, the song is the information being passed from alice to bob OR
3] when I hit "post quick reply", there is a bunch of "binary data" being passed from my computer to PF server, enabling the message to appear on the board. The binary data is the information being passed from my computer to PF server.

The 3rd example shows the kind of information that you are interested in.

In your case, information can be non-rigorously defined as a set of binary bits being passed from one computer to another over a medium, which we simply call as network.

Now that we have defined information and its medium, we can start asking the questions that we gave earlier.

Your book should cover the answers to the above questions. Entropy should answer (A), channel capacity should answer (B), mutual information should answer (C) etc.

As for books, a short internet search for "Information Theory Lecture Notes" should yield with abundant material.

-- AI
P.S. -> I have taken certain liberties above (for e.g., I say entropy answers [A], wherein I should probably say entropy is one way of answering [A]), but I have taken those to avoid confusing you (any further than I might already have).
 
in a nutshell:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa contains less information than
sneuircheuictgduocrfuigfeuyoguetdoeuciah because it can be replaced by
a*35
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top