SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Error Detection and
Correction
PRESENTED BY: ABDUL RAZAQUE
abdulrazaque15tc@gmail.com
Table of content
Introduction
Types of Errors
Detection vs correction
Error detection scheme
Error correction
Hamming distance
Linear block codes
Cyclic codes
Polynomials
Checksum
CRC
One’s Complement
References
Introduction
• Network must be able to transfer data from one device to another
with acceptable accuracy, so the system must guarantee the
transmitted data should be identical to received data.
• The data can be corrupted when transmitted from one hope to next
which can be detected by some applications.
• Data can be corrupted during transmission there are few
application that require to be error detected and corrected.
Types of Errors
• Whenever data is transmitted that subject to be unpredictable that causes
change in shape of signals, here we have discussed two types of errors
i. Single error: in single error only one bit of given data unit is changed
which either be from 0 to 1 or from 1 to 0
ii. Burst error: it means there are more than 2 data unit changed from 1 to 0
or 0 to 1
Single bit error
0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0
Burst error of length 8
0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1
0 0 1 0 1 0 1 0 1 1 1 0 0 0 0 1
Corrupted bits
Corrupted bits
• Burst error: the duration of noise is
normally longer than the duration of
1 bit which means that noise affects
data.
• The number of bits affected depends
on the data rate and duration for
noise.
Single bit error: single bit errors are
least likely type or error because their
duration or noise is normally longer
than duration of 1 bit.
Single type of errors are the least likely
type of error in serial data
transmission.
Detection Vs Correction
o The correction of errors is more difficult than the detection.
o In error detection we only see if any error is occurred. The answer will be yes/no.
o In error correction, we need to know the exact number corrupted bits with their
location in the message.
o For single error we need 8-bit data unit whereas for 2 errors we need to consider
28 possibilities, so for a long size messages it is difficult to find more than 10
errors in a data unit of 1000 bits.
Error detection scheme
• Some popular techniques of error detection are:
1. Simple parity check
2. Two dimensional parity check
3. Checksum
4. Cyclic redundancy check
Simple parity check
• It is the simplest technique for detecting
and correcting errors.
• The parity of 8-bits transmitted word can
be either even parity or odd parity
• Even parity: it means that the number of
1’s should be even (2,4,6).
• Odd parity: it means that the number of
1’s should be odd (1.3.5).
Two dimensional parity check
• In simple parity check bits are
calculated for each row. Parity
check bits are also calculated for
al columns, then both are sent
along with data.
• At the receiving end these are
compared with the parity bits
calculated on the received data.
Checksum
• For error detection by checksum data is divided into fixed size frames or
segments
• Sender’s End: The sender adds the segment using 1’s complement arithmetic to
get the sum. Then the sum is also complemented to get the checksum and send
it along with data frames.
• Receiver’s End: at the receiver side perform same as sender add the incoming
segments using 1’s complement to get the sum and then complements it.
• After this if result is zero the received frames are accepted, otherwise they are
discarded
Example
Cyclic redundancy check
• It is method of detecting errors in the
communication channel
• This is the most widely used in real life
applications.
• It can detect all odd errors, CRC uses
generator polynomial which is available
in both sender and receiver side
• An example generator polynomial is of
the form like x3 + x + 1. This generator
polynomial represents key 1011
Error Correction
• As already discussed that error detection is more difficult than error
detection, it involves the sufficient redundant data to the information being
sent to enable the receiver to both detect and correct errors.
• Error-correction codes can be divided into block codes and convolution
codes. Block codes work on blocks of data of a fixed-size (e.g. packets).
Convolutional codes work for bit streams of arbitrary length. They tend to
be more complex and more difficult to implement than block codes,
• Block codes are calculated for each individual frame or packet
independently of one-another, whereas convolutional codes encode the
entire data stream for a message as one long code word, and then transmit
the message in segments.
Hamming distance
• The hamming distance between two words (of the same size) is the number of
differences between the corresponding bits.
• It can be easily found if we apply XOR operation on the two words and count the
number of Is in the result.
• Minimum Hamming Distance:
• it is the smallest hamming distance between all possible pairs in a set of words.
Example
• Let us find the Hamming distance between two pairs of words.
1. The Hamming distance d(OOO, 011)
• The hamming distance is 2
•
2. The Hamming distance d(10101, 11110)
• The hamming distance is 3
000
011
011
10101
11110
01011
Minimum Hamming distance
• Example 10.6
Find the minimum Hamming distance of the coding scheme
Solution
We first find all the Hamming distances.
• We apply XOR GATE
d(00000, 01011) = 3 d(00000, 10101) =3
d(0l011, 11110) = 3 d(00000, 11110) = 4
d(10101, 11110) =3 d(01011, 10101) =4
The dmin in this case is 3
• To guarantee the detection of
up to s errors in all cases the
minimum hamming distance
in a block code must be
dmin= s+1.
• To guarantee the correction
of up to t errors in all cases,
the minimum hamming
distance in a block code
dmin = 2t+1.
• A code scheme has a Hamming distance dmin = 4. What is
the error detection and correction capability of this scheme?
Sol. For the detection of errors:
dmin= s+1
4=s+1
S=3, so it detect upto three errors
For the correction of errors
dmin = 2t+1
4=2t+1
t=1, it can correct upto one errors
Linear block codes
• In the linear block codes, the parity bits and message bits have a linear
combination, which means that the resultant code word is the linear combination
of any two code words
• CYCLIC CODES: Cyclic codes are used for error correction. They are mainly
used to correct double errors and burst errors.
• The cyclic property of code words is that any cyclic-shift of a code word is also a
code word. Cyclic codes follow this cyclic property.
References
• Digital communication and networking by behroz frouzan 4th edition.
• Data and computer communications by William stalling 4th edition

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
CRC Error coding technique
CRC Error coding techniqueCRC Error coding technique
CRC Error coding technique
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
 
Check sum
Check sumCheck sum
Check sum
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Multiplexer and DeMultiplexer
Multiplexer and DeMultiplexerMultiplexer and DeMultiplexer
Multiplexer and DeMultiplexer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Data link layer
Data link layer Data link layer
Data link layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Transport layer
Transport layer Transport layer
Transport layer
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 

Ähnlich wie Error detection and correction

New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesanandhakrishnankv
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.pptAnnymus
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxMahabubAlam97
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxArunVerma37053
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfBalasubramanian699229
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdfkenilpatel65
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.pptDrPreethiD1
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeskysunilyadav
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.pptMsSJeyalakshmiVelsUn
 

Ähnlich wie Error detection and correction (20)

CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
 

Mehr von Abdul Razaq

National anthem of pakistan mcqs
National anthem of pakistan mcqs National anthem of pakistan mcqs
National anthem of pakistan mcqs Abdul Razaq
 
Applications of information theory in communication engineering
Applications of information theory in communication engineeringApplications of information theory in communication engineering
Applications of information theory in communication engineeringAbdul Razaq
 
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORKTHE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORKAbdul Razaq
 
Pulse code modulation and Demodulation
Pulse code modulation and DemodulationPulse code modulation and Demodulation
Pulse code modulation and DemodulationAbdul Razaq
 
Introduction to Telecommunication
Introduction to TelecommunicationIntroduction to Telecommunication
Introduction to TelecommunicationAbdul Razaq
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM ArchitectureAbdul Razaq
 
PEMRA REGULATION
PEMRA REGULATIONPEMRA REGULATION
PEMRA REGULATIONAbdul Razaq
 

Mehr von Abdul Razaq (8)

FINAL EXAM.pptx
FINAL EXAM.pptxFINAL EXAM.pptx
FINAL EXAM.pptx
 
National anthem of pakistan mcqs
National anthem of pakistan mcqs National anthem of pakistan mcqs
National anthem of pakistan mcqs
 
Applications of information theory in communication engineering
Applications of information theory in communication engineeringApplications of information theory in communication engineering
Applications of information theory in communication engineering
 
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORKTHE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
 
Pulse code modulation and Demodulation
Pulse code modulation and DemodulationPulse code modulation and Demodulation
Pulse code modulation and Demodulation
 
Introduction to Telecommunication
Introduction to TelecommunicationIntroduction to Telecommunication
Introduction to Telecommunication
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
PEMRA REGULATION
PEMRA REGULATIONPEMRA REGULATION
PEMRA REGULATION
 

Kürzlich hochgeladen

Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdfKamal Acharya
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfKamal Acharya
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
Object Oriented Programming OOP Lab Manual.docx
Object Oriented Programming OOP Lab Manual.docxObject Oriented Programming OOP Lab Manual.docx
Object Oriented Programming OOP Lab Manual.docxRashidFaridChishti
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Prakhyath Rai
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdfKamal Acharya
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdfKamal Acharya
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Lovely Professional University
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Object Oriented Programming OOP Lab Manual.docx
Object Oriented Programming OOP Lab Manual.docxObject Oriented Programming OOP Lab Manual.docx
Object Oriented Programming OOP Lab Manual.docx
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
 

Error detection and correction

  • 1. Error Detection and Correction PRESENTED BY: ABDUL RAZAQUE abdulrazaque15tc@gmail.com
  • 2. Table of content Introduction Types of Errors Detection vs correction Error detection scheme Error correction Hamming distance Linear block codes Cyclic codes Polynomials Checksum CRC One’s Complement References
  • 3. Introduction • Network must be able to transfer data from one device to another with acceptable accuracy, so the system must guarantee the transmitted data should be identical to received data. • The data can be corrupted when transmitted from one hope to next which can be detected by some applications. • Data can be corrupted during transmission there are few application that require to be error detected and corrected.
  • 4. Types of Errors • Whenever data is transmitted that subject to be unpredictable that causes change in shape of signals, here we have discussed two types of errors i. Single error: in single error only one bit of given data unit is changed which either be from 0 to 1 or from 1 to 0 ii. Burst error: it means there are more than 2 data unit changed from 1 to 0 or 0 to 1
  • 5. Single bit error 0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 Burst error of length 8 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 0 1 0 1 0 1 0 1 1 1 0 0 0 0 1 Corrupted bits Corrupted bits
  • 6. • Burst error: the duration of noise is normally longer than the duration of 1 bit which means that noise affects data. • The number of bits affected depends on the data rate and duration for noise. Single bit error: single bit errors are least likely type or error because their duration or noise is normally longer than duration of 1 bit. Single type of errors are the least likely type of error in serial data transmission.
  • 7. Detection Vs Correction o The correction of errors is more difficult than the detection. o In error detection we only see if any error is occurred. The answer will be yes/no. o In error correction, we need to know the exact number corrupted bits with their location in the message. o For single error we need 8-bit data unit whereas for 2 errors we need to consider 28 possibilities, so for a long size messages it is difficult to find more than 10 errors in a data unit of 1000 bits.
  • 8. Error detection scheme • Some popular techniques of error detection are: 1. Simple parity check 2. Two dimensional parity check 3. Checksum 4. Cyclic redundancy check
  • 9. Simple parity check • It is the simplest technique for detecting and correcting errors. • The parity of 8-bits transmitted word can be either even parity or odd parity • Even parity: it means that the number of 1’s should be even (2,4,6). • Odd parity: it means that the number of 1’s should be odd (1.3.5).
  • 10. Two dimensional parity check • In simple parity check bits are calculated for each row. Parity check bits are also calculated for al columns, then both are sent along with data. • At the receiving end these are compared with the parity bits calculated on the received data.
  • 11. Checksum • For error detection by checksum data is divided into fixed size frames or segments • Sender’s End: The sender adds the segment using 1’s complement arithmetic to get the sum. Then the sum is also complemented to get the checksum and send it along with data frames. • Receiver’s End: at the receiver side perform same as sender add the incoming segments using 1’s complement to get the sum and then complements it. • After this if result is zero the received frames are accepted, otherwise they are discarded
  • 13. Cyclic redundancy check • It is method of detecting errors in the communication channel • This is the most widely used in real life applications. • It can detect all odd errors, CRC uses generator polynomial which is available in both sender and receiver side • An example generator polynomial is of the form like x3 + x + 1. This generator polynomial represents key 1011
  • 14. Error Correction • As already discussed that error detection is more difficult than error detection, it involves the sufficient redundant data to the information being sent to enable the receiver to both detect and correct errors. • Error-correction codes can be divided into block codes and convolution codes. Block codes work on blocks of data of a fixed-size (e.g. packets). Convolutional codes work for bit streams of arbitrary length. They tend to be more complex and more difficult to implement than block codes, • Block codes are calculated for each individual frame or packet independently of one-another, whereas convolutional codes encode the entire data stream for a message as one long code word, and then transmit the message in segments.
  • 15. Hamming distance • The hamming distance between two words (of the same size) is the number of differences between the corresponding bits. • It can be easily found if we apply XOR operation on the two words and count the number of Is in the result. • Minimum Hamming Distance: • it is the smallest hamming distance between all possible pairs in a set of words.
  • 16. Example • Let us find the Hamming distance between two pairs of words. 1. The Hamming distance d(OOO, 011) • The hamming distance is 2 • 2. The Hamming distance d(10101, 11110) • The hamming distance is 3 000 011 011 10101 11110 01011
  • 17. Minimum Hamming distance • Example 10.6 Find the minimum Hamming distance of the coding scheme Solution We first find all the Hamming distances. • We apply XOR GATE d(00000, 01011) = 3 d(00000, 10101) =3 d(0l011, 11110) = 3 d(00000, 11110) = 4 d(10101, 11110) =3 d(01011, 10101) =4 The dmin in this case is 3
  • 18. • To guarantee the detection of up to s errors in all cases the minimum hamming distance in a block code must be dmin= s+1. • To guarantee the correction of up to t errors in all cases, the minimum hamming distance in a block code dmin = 2t+1. • A code scheme has a Hamming distance dmin = 4. What is the error detection and correction capability of this scheme? Sol. For the detection of errors: dmin= s+1 4=s+1 S=3, so it detect upto three errors For the correction of errors dmin = 2t+1 4=2t+1 t=1, it can correct upto one errors
  • 19. Linear block codes • In the linear block codes, the parity bits and message bits have a linear combination, which means that the resultant code word is the linear combination of any two code words • CYCLIC CODES: Cyclic codes are used for error correction. They are mainly used to correct double errors and burst errors. • The cyclic property of code words is that any cyclic-shift of a code word is also a code word. Cyclic codes follow this cyclic property.
  • 20. References • Digital communication and networking by behroz frouzan 4th edition. • Data and computer communications by William stalling 4th edition