SlideShare ist ein Scribd-Unternehmen logo
1 von 20
DATA COMMUNICATIONS &
NETWORKING
                LECTURE-
20

          Course Instructor : Sehrish Rafiq
          Department Of Computer Science
          University Of Peshawar
LECTURE OVERVIEW
 Error detection
 Parity Check

 Simple Parity Check

 Two Dimensional Parity Check

 Performance of each
ERROR DETECTION
ERROR DETECTION METHODS
REDUNDANCY
   The concept of including extra information in the
    transmission for error detection is called
    redundancy.

   Instead of repeating the entire data stream,a
    shorter group of bits may be appended to the end
    of each unit.

   The technique is called redundancy because the
    extra bits are redundant to the information.
REDUNDANCY
   These extra bits are discarded as soon as the
    accuracy of the transmission has been
    determined.

   All Error Detection mechanisms use the concept
    of redundancy which means adding extra bits for
    detecting errors.
REDUNDANCY
ERROR DETECTION METHODS
PARITY CHECK
   The most common and least expensive
    mechanism for error detection is the parity
    check.

   Parity checking can be
   simple
     OR
   two-dimensional.
SIMPLE PARITY CHECK
                   OR
     VERTICAL REDUNDANCY CHECK(VRC)
 In this technique, the redundant bit called a
  parity bit.
 A parity bit is added to every data unit so that
  the total number of 1s in the unit(including the
  parity bit) becomes even(or odd).
EVEN PARITY CONCEPT
Example
 1
Suppose the sender wants to send the word world. In
ASCII the five characters are coded as
1110111 1101111 1110010 1101100
1100100
   w           o         r            l         d
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
EXAMPLE 1 CONTINUED…
   Now suppose the word world in Example 1 is received
    by the receiver without being corrupted in transmission.


   11101110 11011110 11100100 11011000 11001001
      w            o           r           l          d
   The receiver counts the 1s in each character and comes
    up with even numbers (6, 6, 4, 4, 4). The data are
    accepted.
EXAMPLE 1 CONTINUED…
   Now suppose the word world in Example 1 is corrupted
    during transmission.
   11111110 11011110 11101100 11011000 11001001
   The receiver counts the 1s in each character and comes
    up with even and odd numbers (7, 6, 5, 4, 4). The
    receiver knows that the data are corrupted, discards
    them, and asks for retransmission.
PERFORMANCE OF VRC OR SIMPLE
       PARITY CHECK
   Simple parity check can detect all single-bit
    errors.

   It can also detect burst errors as long as the total
    number of bits changed is odd.

   It cannot detect burst errors where the number of
    bits changed is even.
TWO DIMENSIONAL PARITY CHECK
                  OR
    LONGITUDINAL REDUNDANCY CHECK
 In this method a block of bits is organized in a
  table(rows and columns).
 First we calculate the parity bit for each data
  unit.
 Then the data is organized in to a table.

 Then a parity bit for each column is calculated.

 This creates a new row.

 This new row contains the parity bits for the
  whole block.
 Then this new row is attached to the original
  data and sent to the receiver.
TWO-DIMENSIONAL PARITY OR
          LRC
Example 2
Suppose the following block is sent:
10101001 00111001 11011101 11100111
10101010


However, it is hit by a burst noise of length 8, and some
bits are corrupted.
10100011 10001001 11011101 11100111
10101010


When the receiver checks the parity bits, some of the bits
do not follow the even-parity rule and the whole block is
PERFORMANCE OF LRC
 A redundancy of n bits can detect a burst error of
  n bits.
 A burst error of more than n bits is also detected
  with a very high probability .(99.97%)
 However if 2 bits in one data unit are damaged
  and two bits in exactly the same positions in
  another data unit are also damaged ,the checker
  will not detect the error.
ENOUGH FOR TODAY!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 

Was ist angesagt? (20)

Error control
Error controlError control
Error control
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Serial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionSerial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmission
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Data link layer
Data link layer Data link layer
Data link layer
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 

Andere mochten auch

Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
Huawei Technologies
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 

Andere mochten auch (20)

Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Even odd parity
Even odd parityEven odd parity
Even odd parity
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
Ch10
Ch10Ch10
Ch10
 
Parity bits
Parity bitsParity bits
Parity bits
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Checksum 101
Checksum 101Checksum 101
Checksum 101
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Ch 10
Ch 10Ch 10
Ch 10
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 

Ähnlich wie Lecture 20

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
Mahesh Kumar Attri
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
BeniamTekeste
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Error detection.
Error detection.Error detection.
Error detection.
Wasim Akbar
 

Ähnlich wie Lecture 20 (20)

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
network
networknetwork
network
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection.
Error detection.Error detection.
Error detection.
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
 

Mehr von Sehrish Rafiq

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 

Mehr von Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Lecture 20

  • 1. DATA COMMUNICATIONS & NETWORKING LECTURE- 20 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. LECTURE OVERVIEW  Error detection  Parity Check  Simple Parity Check  Two Dimensional Parity Check  Performance of each
  • 5. REDUNDANCY  The concept of including extra information in the transmission for error detection is called redundancy.  Instead of repeating the entire data stream,a shorter group of bits may be appended to the end of each unit.  The technique is called redundancy because the extra bits are redundant to the information.
  • 6. REDUNDANCY  These extra bits are discarded as soon as the accuracy of the transmission has been determined.  All Error Detection mechanisms use the concept of redundancy which means adding extra bits for detecting errors.
  • 9. PARITY CHECK  The most common and least expensive mechanism for error detection is the parity check.  Parity checking can be  simple OR  two-dimensional.
  • 10. SIMPLE PARITY CHECK OR VERTICAL REDUNDANCY CHECK(VRC)  In this technique, the redundant bit called a parity bit.  A parity bit is added to every data unit so that the total number of 1s in the unit(including the parity bit) becomes even(or odd).
  • 12. Example 1 Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 w o r l d The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001
  • 13. EXAMPLE 1 CONTINUED…  Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.  11101110 11011110 11100100 11011000 11001001  w o r l d  The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
  • 14. EXAMPLE 1 CONTINUED…  Now suppose the word world in Example 1 is corrupted during transmission.  11111110 11011110 11101100 11011000 11001001  The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
  • 15. PERFORMANCE OF VRC OR SIMPLE PARITY CHECK  Simple parity check can detect all single-bit errors.  It can also detect burst errors as long as the total number of bits changed is odd.  It cannot detect burst errors where the number of bits changed is even.
  • 16. TWO DIMENSIONAL PARITY CHECK OR LONGITUDINAL REDUNDANCY CHECK  In this method a block of bits is organized in a table(rows and columns).  First we calculate the parity bit for each data unit.  Then the data is organized in to a table.  Then a parity bit for each column is calculated.  This creates a new row.  This new row contains the parity bits for the whole block.  Then this new row is attached to the original data and sent to the receiver.
  • 18. Example 2 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 10100011 10001001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is
  • 19. PERFORMANCE OF LRC  A redundancy of n bits can detect a burst error of n bits.  A burst error of more than n bits is also detected with a very high probability .(99.97%)  However if 2 bits in one data unit are damaged and two bits in exactly the same positions in another data unit are also damaged ,the checker will not detect the error.