SlideShare ist ein Scribd-Unternehmen logo
1 von 34
UNIT-05
ERROR CORRECTION & ERROR DETECTION
JAIN POLYTECHNIC BELGAVI
Presented by:
SHRINIVAS NAIK Lect/EC
MTech (DIGITAL COMMUNICATION)
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
CONTENTS
• INTRODUCTION
• TYPES OF ERRORS
• ERROR DETECTION
• REDUNDANCY
• ERROR CORRECTION
 Data can be corrupted during
transmission. For reliable communication,
errors must be detected and corrected.
 Error detection and correction are
implemented either at data link layer or
the transport layer of the OSI model.
INTRODUCTION
TYPES OF ERRORS
 Single bit error :-
-Only one bit in the data unit has
changed.
 Burst error :-
-It means that two or more bits in the
data unit has changed.
0 0 0 0 1 0 1 0
0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1
Single bit Error
0 changed to 1
Received
0 0 0 0 0 0 1 0
Sent
Burst Error
Sent
Received
Bits corrupted by Burst Error
ERROR DETECTION
 Error detecting code is to include only
enough redundancy to allow the receiver
to deduce that an error occurred, but not
which error, and have it request a re-
transmission.
 Error detection uses the concept of
redundancy, which means adding extra
bits for detecting error at the destination.
Redundancy
 Instead of repeating the entire data
stream, a shorter group of bits may be
appended to the end of each unit. This
technique is called Redundancy because
the extra bit are redundant to the
information. They are discarded as soon
as the accuracy of the transmission has
been determined.
 There are basically four types of
redundancy checks. They are:
1. VRC (Vertical Redundancy Check).
2. LRC (Longitudinal Redundancy Check).
3. CRC (Cyclical Redundancy Check).
ERROR DETECTION
 VERTICAL REDUNDUNCY CHECK
 LONGITUDINAL REDUNDANCY CHECK
 CYCLIC REDUNDANCY CHECK
VERTICAL
REDUNDANCY CHECK
It is also known as parity check
It is least expensive mechanism for error
detection
In this technique,the redundant bit called
parity bit is appended to every data unit
so that the total number of 1s in the unit
becomes even (including parity bit)
VERTICAL
REDUNDANCY CHECK
Checking function
Is total number of
1s even ?
Receiver
1100001 | 1 Even – parity
generator
1
1100001 Data
VRC
Sender
 Example :
1110110 1101111 1110010
- After adding the parity bit 11101101
11011110 11100100
VERTICAL REDUNDANCY
CHECK
 VRC can detect all single – bit errors
 It can detect burst errors if the total
number of errors in each data unit is odd.
 VRC can not detect errors where the total
number of bits changed is even.
VERTICAL REDUNDANCY
CHECK
LONGITUDINAL REDUNDANCY CHECK(LRC)
In this method , a block of bits is
organized in table(rows and columns)
calculate the parity bit for each column
and the set of this parity bit is also
sending with original data.
From the block of parity we can check
the redundancy.
LRC Example
11100111 1101101 00111001 10101001 10101010
11100111
11011101
00111001
10101001
11100111 11011101 00111001 10101001
LRC 10101010
Original data plus
LRC
LRC Example
Suppose the following block is sent :
10101001 00111001 11011101 11100111 10101010
(LRC)
However,it is hit by burst of length eight and
some bits are corrupted (Yellow bits are
changed) :
10100011 10001001 11011101 11100111 10101010
(LRC)
When the receiver checks the LRC,some of the
bits are not
follow even parity rule and whole block is
discarded (the non matching bits are shown in
red ) :
Advantage :
-> LRC of n bits can easily detect burst
error of n bits.
Disadvantage :
-> If two bits in one data units are damaged
and two bits in exactly same position in
another data unit are also damaged , the
LRC checker will not detect the error.
CYCLIC REDUNDANCY CHECK
(CRC)
 In this method , a sequence of redundant bits ,
called the CRC or the CRC remainder, is appended to the end of
the unit so that the resulting data unit become exactly divisible
by a second, predetermined binary number. At its destination ,
the incoming data unit is divided by the same number. If at this
step there is no remainder ,the data unit assume to be correct
and is accepted, otherwise it indicate that data unit has been
damaged in transmission and therefore must be rejected.
The redundancy bits is used by CRC are derived by dividing the
data unit by a predetermined divisor. The remainder is the
CRC.
19
 CRC generator and checker
DATA CRC
REMAINDER CRC
DATA CRC DIVIS0R
DATA 00…0
DIVISOR
Zero accept Nonzero
reject
N bits
N+1 bits
N bits
Receiver Sender
Divisor
The divisor is determined according to the
algebraic polynomial.
for e.g.
A polynomial is
X^7 + x^5 + x^2 + x
+ 1 generation of divisor from
polynomial
X^7 + X^5 + X^2 + X +
1
X^4 X^3
1 0 1 0 0 1 1 1
X^6
A polynomial should be selected
according to the following rule:-
3. It should not be divisible by x.
4. It should be divisible by x+1.
Example :-
 The CRC generator at sender end :
1 1 0 1
1 1 1 1 0 1
0 0 01 0 0 1 0 0
1 1 0 1
1 0 0 0
1 1 0 1
1 0 1 0
1 1 0 1
1 1 1 0
1 1 0 1
0 1 1 0
0 0 0 0
1 1 0 0
1 1 0 1
0 001 22
The CRC checker at receiver end :
1 1 0 1
1 1 1 1 0 1
0 0 11 0 0 1 0 0
1 1 0 1
1 0 0 0
1 1 0 1
1 0 1 0
1 1 0 1
1 1 1 0
1 1 0 1
0 1 1 0
0 0 0 0
1 1 0 1
1 1 0 1
0 0 0 0 23
ERROR CORRECTION
 Error correcting code is to include enough
redundant information along with each block of
data sent to enable the receiver to deduce what
the transmitted character must have been.
 Error Correction must be handled in two ways :
- When an error is discovered, the receiver
can have the sender retransmit the entire
data unit.
- Receiver can use an error correcting code,
which automatically corrects certain errors.
 There are two types of Error Correcting
techniques :
1. Single bit error correction.
2. Burst error correction.
 Error Correction can be done with the help
of HAMMING CODE.
HAMMING CODE
 It is a technique developed by
R.W.Hamming.
 Hamming code can be applied to data
units of any length and uses the
relationship between data and redundancy
bits. For eg.
 A 7 bit ASCII code requires 4 Redundancy
bits that can be added to the end of the
data unit or interspersed with the original
data bits.
 These bits are placed in positions 1,2,4
and 8. We refer to these bits as r1,r2,r4
and r8.
d d d r d d d r d r r
Redundancy Bits
Positions of Redundancy Bits in Hamming Code
11 10 9 8 7 6 5 4 3 2 1
 In the Hamming code, each r bit is the VRC bit
for one combination of data bits :
- r1 is the one combination of data bits.
- r2 is another combination of data bits.
and so on.
 The combination used to calculate each of the
four values for a 7 bit data sequence are as
follows :
- r1 : bits 1,3,5,7,9,11.
- r2 : bits 2,3,6,7,10,11.
- r4 : bits 4,5,6,7.
- r8 : bits 8,9,10,11.
30
1 0 0 1 1 0 1
1 0 0 1 1 0 1 1
1 0 0 1 1 0 1 0 1
1 0 0 1 1 0 0 1 0 1
1 0 0 1 1 1 0 0 1 0 1
Data : 1 0 0 1 1 0 1
Data
Adding r1
Adding r2
Adding r4
Adding r8
11 10 9 8 7 6 5 4 3 2 1
Code:1 0 01 1 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
Sent
Received
1 0 0 1 1 1 0 0 1 0 1
Error
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
0 1 1 1The bit in position 7 is in error
Error detection and correction unit-05

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionSaikrishna Tanguturu
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy checkSaleh Alrkiyan
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionSaba Rathinam
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and CorrectionTarjMehta1
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codesRevathi Subramaniam
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)sonangrai
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Attributes of output primitive(line attributes)
Attributes of output primitive(line attributes)Attributes of output primitive(line attributes)
Attributes of output primitive(line attributes)shalinikarunakaran1
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N CorrectionAnkan Adhikari
 

Was ist angesagt? (20)

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 
Check sum
Check sumCheck sum
Check sum
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
HDLC
HDLCHDLC
HDLC
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Error control coding
Error control codingError control coding
Error control coding
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Attributes of output primitive(line attributes)
Attributes of output primitive(line attributes)Attributes of output primitive(line attributes)
Attributes of output primitive(line attributes)
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Ähnlich wie Error detection and correction unit-05

computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfBalasubramanian699229
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentationAhmedMuhumed2
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunicationUmme habiba
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module IIAjit Nayak
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET Journal
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
Error detection.
Error detection.Error detection.
Error detection.Wasim Akbar
 

Ähnlich wie Error detection and correction unit-05 (20)

computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
K034066071
K034066071K034066071
K034066071
 
Error detection.
Error detection.Error detection.
Error detection.
 

Kürzlich hochgeladen

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

Error detection and correction unit-05

  • 1. UNIT-05 ERROR CORRECTION & ERROR DETECTION JAIN POLYTECHNIC BELGAVI Presented by: SHRINIVAS NAIK Lect/EC MTech (DIGITAL COMMUNICATION) DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
  • 2. CONTENTS • INTRODUCTION • TYPES OF ERRORS • ERROR DETECTION • REDUNDANCY • ERROR CORRECTION
  • 3.  Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.  Error detection and correction are implemented either at data link layer or the transport layer of the OSI model. INTRODUCTION
  • 4. TYPES OF ERRORS  Single bit error :- -Only one bit in the data unit has changed.  Burst error :- -It means that two or more bits in the data unit has changed.
  • 5. 0 0 0 0 1 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1 Single bit Error 0 changed to 1 Received 0 0 0 0 0 0 1 0 Sent Burst Error Sent Received Bits corrupted by Burst Error
  • 6. ERROR DETECTION  Error detecting code is to include only enough redundancy to allow the receiver to deduce that an error occurred, but not which error, and have it request a re- transmission.  Error detection uses the concept of redundancy, which means adding extra bits for detecting error at the destination.
  • 7. Redundancy  Instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called Redundancy because the extra bit are redundant to the information. They are discarded as soon as the accuracy of the transmission has been determined.
  • 8.
  • 9.  There are basically four types of redundancy checks. They are: 1. VRC (Vertical Redundancy Check). 2. LRC (Longitudinal Redundancy Check). 3. CRC (Cyclical Redundancy Check).
  • 10. ERROR DETECTION  VERTICAL REDUNDUNCY CHECK  LONGITUDINAL REDUNDANCY CHECK  CYCLIC REDUNDANCY CHECK
  • 11. VERTICAL REDUNDANCY CHECK It is also known as parity check It is least expensive mechanism for error detection In this technique,the redundant bit called parity bit is appended to every data unit so that the total number of 1s in the unit becomes even (including parity bit)
  • 12. VERTICAL REDUNDANCY CHECK Checking function Is total number of 1s even ? Receiver 1100001 | 1 Even – parity generator 1 1100001 Data VRC Sender
  • 13.  Example : 1110110 1101111 1110010 - After adding the parity bit 11101101 11011110 11100100 VERTICAL REDUNDANCY CHECK
  • 14.  VRC can detect all single – bit errors  It can detect burst errors if the total number of errors in each data unit is odd.  VRC can not detect errors where the total number of bits changed is even. VERTICAL REDUNDANCY CHECK
  • 15. LONGITUDINAL REDUNDANCY CHECK(LRC) In this method , a block of bits is organized in table(rows and columns) calculate the parity bit for each column and the set of this parity bit is also sending with original data. From the block of parity we can check the redundancy.
  • 16. LRC Example 11100111 1101101 00111001 10101001 10101010 11100111 11011101 00111001 10101001 11100111 11011101 00111001 10101001 LRC 10101010 Original data plus LRC
  • 17. LRC Example Suppose the following block is sent : 10101001 00111001 11011101 11100111 10101010 (LRC) However,it is hit by burst of length eight and some bits are corrupted (Yellow bits are changed) : 10100011 10001001 11011101 11100111 10101010 (LRC) When the receiver checks the LRC,some of the bits are not follow even parity rule and whole block is discarded (the non matching bits are shown in red ) :
  • 18. Advantage : -> LRC of n bits can easily detect burst error of n bits. Disadvantage : -> If two bits in one data units are damaged and two bits in exactly same position in another data unit are also damaged , the LRC checker will not detect the error.
  • 19. CYCLIC REDUNDANCY CHECK (CRC)  In this method , a sequence of redundant bits , called the CRC or the CRC remainder, is appended to the end of the unit so that the resulting data unit become exactly divisible by a second, predetermined binary number. At its destination , the incoming data unit is divided by the same number. If at this step there is no remainder ,the data unit assume to be correct and is accepted, otherwise it indicate that data unit has been damaged in transmission and therefore must be rejected. The redundancy bits is used by CRC are derived by dividing the data unit by a predetermined divisor. The remainder is the CRC.
  • 20. 19  CRC generator and checker DATA CRC REMAINDER CRC DATA CRC DIVIS0R DATA 00…0 DIVISOR Zero accept Nonzero reject N bits N+1 bits N bits Receiver Sender
  • 21. Divisor The divisor is determined according to the algebraic polynomial. for e.g. A polynomial is X^7 + x^5 + x^2 + x + 1 generation of divisor from polynomial X^7 + X^5 + X^2 + X + 1 X^4 X^3 1 0 1 0 0 1 1 1 X^6
  • 22. A polynomial should be selected according to the following rule:- 3. It should not be divisible by x. 4. It should be divisible by x+1.
  • 23. Example :-  The CRC generator at sender end : 1 1 0 1 1 1 1 1 0 1 0 0 01 0 0 1 0 0 1 1 0 1 1 0 0 0 1 1 0 1 1 0 1 0 1 1 0 1 1 1 1 0 1 1 0 1 0 1 1 0 0 0 0 0 1 1 0 0 1 1 0 1 0 001 22
  • 24. The CRC checker at receiver end : 1 1 0 1 1 1 1 1 0 1 0 0 11 0 0 1 0 0 1 1 0 1 1 0 0 0 1 1 0 1 1 0 1 0 1 1 0 1 1 1 1 0 1 1 0 1 0 1 1 0 0 0 0 0 1 1 0 1 1 1 0 1 0 0 0 0 23
  • 25. ERROR CORRECTION  Error correcting code is to include enough redundant information along with each block of data sent to enable the receiver to deduce what the transmitted character must have been.  Error Correction must be handled in two ways : - When an error is discovered, the receiver can have the sender retransmit the entire data unit. - Receiver can use an error correcting code, which automatically corrects certain errors.
  • 26.  There are two types of Error Correcting techniques : 1. Single bit error correction. 2. Burst error correction.  Error Correction can be done with the help of HAMMING CODE.
  • 27. HAMMING CODE  It is a technique developed by R.W.Hamming.  Hamming code can be applied to data units of any length and uses the relationship between data and redundancy bits. For eg.
  • 28.  A 7 bit ASCII code requires 4 Redundancy bits that can be added to the end of the data unit or interspersed with the original data bits.  These bits are placed in positions 1,2,4 and 8. We refer to these bits as r1,r2,r4 and r8.
  • 29. d d d r d d d r d r r Redundancy Bits Positions of Redundancy Bits in Hamming Code 11 10 9 8 7 6 5 4 3 2 1
  • 30.  In the Hamming code, each r bit is the VRC bit for one combination of data bits : - r1 is the one combination of data bits. - r2 is another combination of data bits. and so on.  The combination used to calculate each of the four values for a 7 bit data sequence are as follows : - r1 : bits 1,3,5,7,9,11. - r2 : bits 2,3,6,7,10,11. - r4 : bits 4,5,6,7. - r8 : bits 8,9,10,11.
  • 31. 30 1 0 0 1 1 0 1 1 0 0 1 1 0 1 1 1 0 0 1 1 0 1 0 1 1 0 0 1 1 0 0 1 0 1 1 0 0 1 1 1 0 0 1 0 1 Data : 1 0 0 1 1 0 1 Data Adding r1 Adding r2 Adding r4 Adding r8 11 10 9 8 7 6 5 4 3 2 1 Code:1 0 01 1 1 0 0 1 0 1
  • 32. 1 0 0 1 0 1 0 0 1 0 1 Sent Received 1 0 0 1 1 1 0 0 1 0 1 Error
  • 33. 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 0 1 1 1The bit in position 7 is in error