SlideShare a Scribd company logo
1 of 33
Lecture#13
Computer Communications
& Networks CS-576
Introduction
๏‚— Networks must be able to transfer data from one
device to another with complete accuracy.
๏‚— A System that can not guarantee that the data
received by one device is not identical to the data
transmitted by another device is essentially useless.
๏‚— Anytime data is transmitted from source to destination
,it gets corrupted on the way.
๏‚— Many factors including NOISE can alter or wipe out
one or more bits of a given data unit.
๏‚— Reliable systems have a mechanism for detecting and
correcting such errors
๏‚— Error detection and Correction is implemented
either at the data link layer or at the transport
layer.
Detection vs Correction
๏‚— Detection
๏‚— By detection, we only concentrate on finding an error.
๏‚— Least interest in count or solution
๏‚— Single bit error is same as burst error for detection.
๏‚— Correction
๏‚— By correction, we point out towards the solution of error.
๏‚— Number of error bits and size of data is important.
๏‚— Exact number of corrupted bits and their location.
๏‚— If we need to correct 1 bit error in 8-bit data, possible error locations
would be 8. For 2-bit, possibilities would be 28. For 3-bit possibilities
would be 56.
Imagine if 10-bits of data unit are corrupted, what would
happen???
Types of Errors
๏‚— Whenever an EM signal flows from one point to
the other, it is subject to unpredictable
interference from heat, magnetism and other
forms of electricity.
๏‚— This interference can change the shape or timing
of the signal
๏‚— If the signal is carrying encoded binary data, such
changes can alter the meaning of the data.
Single Bit
๏‚— In a single-bit error, a 0 is changed to a 1 or a 1 to a 0 .
๏‚— The term single bit error means that only one bit of a given data
unit(such as a byte , character or a packet) is changed form 1 to
0 or from 0 to 1.
๏‚— Figure shows the effect of a single bit error on a data unit.
๏‚— ASCII character 00000010(ASCII STX) is sent, meaning start of
text but 00001010(ASCII LF) is received , meaning line feed.
๏‚— Single bit errors are the least likely type of error in serial data
transmission.
๏‚— To see Why? Imagine a sender sends data at 1Mbps
๏‚— This means that each bit lasts only 1/1,000,000 seconds or 1
microsecond
Burst Errors
๏‚— The term burst error means that two or more bits in
the data unit have changed from 1 to 0 or from 0 to 1.
๏‚—
๏‚— Figure shows the effect of a burst error on a data unit
๏‚— In this case 0100010001000011 was sent but
0101110101000011 was received.
๏‚— Note that a burst error does not necessarily mean that
error occur in consecutive bits .
๏‚— The length of the burst is measured from the first
corrupted bit to the last corrupted bit
Burst Errors
๏‚— Some bits in b/w may not have been corrupted .
๏‚— Burst error is most likely to happen in a serial
transmission.
๏‚— The duration of the noise is normally longer than
the duration of a bit which means that when noise
affects data , it affects a set of bits
๏‚— The number of bits affected depends on the data
rate and duration of noise
๏‚— For example, if we are sending data at 1 Kbps, a
noise of 1/100 seconds can affect 10 bits
๏‚— If we are sending data at 1 Mbps, the same noise can
affect 10,000 bits
Error Detection
๏‚— Even if we know what type of errors can occur,
will we recognize one when we see it?
๏‚— If we have a copy of the intended Transmission
for comparison, of course we will.
๏‚— But what if we donโ€™t have a copy of the original
๏‚— Then we will have no way of knowing we have
received an error until we have decoded the
Transmission and failed to make sense of it. It
would be costly & slow.
๏‚— We need a mechanism that is Simple and
Completely objective.
Redundancy
๏‚— One error detection mechanism that would satisfy these
requirements would be to send every data unit twice
๏‚— The receiving device would then be able to do a bit-for-bit
comparison b/w two Transmissions.
๏‚— Any discrepancy will indicate an error and an appropriate error
Correction mechanism could be set in place.
๏‚— This system will be completely Accurate because the odds of error
affecting the same bits in both version will be infinitesimally small.
๏‚— But this system will be extra ordinarily SLOW.
๏‚— Not only will the transmission time double ,but the time it takes to
compare two data units is also added up.
๏‚— The concept of including extra information in the Transmission
solely for the purpose of comparison is good one.
๏‚— But instead of repeating the entire data stream, a shorter group of
bits may be appended to the end of each unit.
๏‚— This technique is called REDUNDANCY because the extra bit are
redundant to the information and are discarded as soon as the
accuracy of Transmission has been determined.
๏‚— Once the data stream has been generated, it passes
through a device that analyzes it and adds on an
appropriately coded redundancy check.
๏‚— The data unit now enlarged by several bits (7) travels
over the link to the receiver. The receiver puts the
entire stream through a checking function.
๏‚— If the received bit stream passes the checking criteria,
the data portions accepted and the redundant bits are
discarded.
Types of Redundancy Checks
There are 4 types of redundancy checks used in data
communication:
โ€ข Vertical Redundancy Check (VRC)
โ€ข Longitudinal Redundancy Check (LRC)
โ€ข Cyclic Redundancy Check (CRC)
โ€ข Checksum
โ€ขFirst 3 are normally implemented in the physical layer
for use in data link layer
โ€ข Fourth is used by Upper layers
Types of Redundancy Checks
Vertical Redundancy Check (VRC)
๏‚— Most common and least expensive.
๏‚— Also called Parity Check.
๏‚— A redundant bit called parity bit is appended to every
data unit so that total number of 1โ€™s in the unit
becomes even including the parity bit.
๏‚— We want to Transmit the binary data unit 1100001
๏‚— Adding together the number of 1โ€™s gives us 3, an odd
number
๏‚— Before TX, we pass the data unit through a parity
generator, which counts the 1โ€™s and appends the parity
bit (1) to the end
Vertical Redundancy Check
(VRC)
๏‚— The total number of 1โ€™s is now 4, an even number.
๏‚— The system now transfers the entire expanded
across the network link.
๏‚— When it reaches its destination, the RX puts all 8
bits through an even parity checking function.
๏‚— If the RX sees 11100001, it counts four ones, an
even num passes.
๏‚— But what if the data unit has been damaged in
transit?
๏‚— What if instead of 11100001, receiver sees
11100101?
๏‚— When the parity checker counts the 1โ€™s, it gets 5 an
odd number.
๏‚— The receiver knows that an error has occurred
somewhere and therefore rejects the whole unit.
Vertical Redundancy Check
(VRC)
Vertical Redundancy Check
(VRC)
Performance of VRC
๏‚— VRC can detect all single bit errors
๏‚— In case of even-parity checking
๏‚— Can also detect Burst errors as long as the total number of
bits changed is ODD (1,3,5 etc )
๏‚— It can not detect errors if total number of errors is even
Vertical Redundancy Check
(VRC)
Longitudinal Redundancy
Check(LRC)
๏‚— In LRC, a block of bit is organized in a table(row and
column)
๏‚— For example instead of sending 32 bits, we organize them
in a table made of 4 rows and 8 columns
๏‚— We then calculate the Parity bit for each column and
create a new row of 8 bits which are the parity bits for the
whole block
๏‚— Note that the first parity bit in the 5th row is calculated
Longitudinal Red Check(LRC)
๏‚— The second parity bit is calculated based on all the second
bits and so on
๏‚— We then attach the 8 parity bits to the original data and
send them to the receiver
๏‚— Example
Longitudinal Red Check(LRC)
Cyclic Redundancy Check (CRC)
๏‚— Most powerful of checking techniques
๏‚— VRC and LRC are based on Addition
๏‚— CRC is based on Binary Division
๏‚— A sequence of redundant bits called CRC or CRC
remainder is appended to the end of the data unit so
that the resulting data unit becomes exactly divisible
by a second predetermined binary number.
๏‚— At its destination, the data unit is divided by the same
number .
๏‚— If at this step there is no remainder, the incoming data
unit is assumed to be intact and is therefore accepted.
๏‚— A remainder indicates that a data unit has been
damaged and therefore must be rejected.
Qualities of CRC
๏‚— To be valid the CRC must have two qualities:
๏‚— It must have exactly one less bit than the divisor
๏‚— Appending it to the end of the data must make
the resulting bit sequence exactly divisible by the
divisor
Qualities of CRC
The CRC Generator
The CRC Checker
๏‚— Functions exactly like CRC Generator
CHECKSUM
๏‚— Error detection method used by the Higher Layers
๏‚— Like VRC, LRC, CRC, Checksum is also based on the
concept of redundancy
๏‚— Oneโ€™s Complement
๏‚— Error detection method used by the Higher Layers
๏‚— Like VRC,LRC ,CRC, Checksum is also based on the
concept of redundancy
CHECKSUM
CHECKSUM
CHECKSUM
Checksum
EXAMPLE
๏‚— Suppose a block of 16 bits need to be sent: 10101001
00111001
10101001
00111001
----------------
11100010 Sum
00011101 Checksum
Sent pattern: 10101001 00111001 00011101
checksum
EXAMPLE
Segment 1 10101001
Segment 2 00111001
Checksum 00011101
----------------- ----------------
SUM 11111111
Complement 00000000
EXAMPLE
Segment1 10101111
Segment2 11111001
Checksum 00011101
Sum 11000110
Complement 00111001

More Related Content

What's hot

Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network LayerAhtesham Ullah khan
ย 
Data link layer
Data link layer Data link layer
Data link layer Mukesh Chinta
ย 
Network software
Network softwareNetwork software
Network softwareSakthiVinoth78
ย 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer NetworkAhtesham Ullah khan
ย 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
ย 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
ย 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
ย 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
ย 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
ย 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
ย 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
ย 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog TransmissionsTechiNerd
ย 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
ย 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
ย 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
ย 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layerAlisha Korpal
ย 
Ethernet
EthernetEthernet
EthernetMihika Shah
ย 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionSaikrishna Tanguturu
ย 

What's hot (20)

Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
ย 
Wired LANs
Wired LANsWired LANs
Wired LANs
ย 
Data link layer
Data link layer Data link layer
Data link layer
ย 
Network software
Network softwareNetwork software
Network software
ย 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
ย 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
ย 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
ย 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
ย 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
ย 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
ย 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
ย 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
ย 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
ย 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog Transmissions
ย 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
ย 
Internetworking
InternetworkingInternetworking
Internetworking
ย 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
ย 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layer
ย 
Ethernet
EthernetEthernet
Ethernet
ย 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
ย 

Similar to CS-576 Lecture on Computer Network Error Detection

Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.pptMsSJeyalakshmiVelsUn
ย 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).pptBezaAlem2
ย 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.pptKumarVaibhav100
ย 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
ย 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.pptPawanRaj48
ย 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
ย 
error detection.ppt
error detection.ppterror detection.ppt
error detection.pptJayaprasanna4
ย 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2sharmilas38
ย 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
ย 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
ย 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
ย 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
ย 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail descriptionBathshebaparimala
ย 
CODING.ppt
CODING.pptCODING.ppt
CODING.pptMortadha96
ย 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorialSwapnadeep Reloaded
ย 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
ย 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
ย 

Similar to CS-576 Lecture on Computer Network Error Detection (20)

Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
ย 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
ย 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
ย 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
ย 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
ย 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
ย 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
ย 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
ย 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
ย 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
ย 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ย 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ย 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
ย 
Sak
SakSak
Sak
ย 
Data link layer
Data link layerData link layer
Data link layer
ย 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
ย 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
ย 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
ย 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
ย 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
ย 

More from Anwal Mirza

Training & development
Training & developmentTraining & development
Training & developmentAnwal Mirza
ย 
Training and dev
Training and devTraining and dev
Training and devAnwal Mirza
ย 
Testing and selection
Testing and selectionTesting and selection
Testing and selectionAnwal Mirza
ย 
Strategic planning
Strategic planningStrategic planning
Strategic planningAnwal Mirza
ย 
Recruitment
RecruitmentRecruitment
RecruitmentAnwal Mirza
ย 
Job analysis
Job analysisJob analysis
Job analysisAnwal Mirza
ย 
Interviewing
Interviewing Interviewing
Interviewing Anwal Mirza
ย 
Hrm ppt ch. 01
Hrm ppt ch. 01Hrm ppt ch. 01
Hrm ppt ch. 01Anwal Mirza
ย 
Hrm challenges
Hrm challengesHrm challenges
Hrm challengesAnwal Mirza
ย 
Firstpage
FirstpageFirstpage
FirstpageAnwal Mirza
ย 
Hci scanrio-exercise
Hci scanrio-exerciseHci scanrio-exercise
Hci scanrio-exerciseAnwal Mirza
ย 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principalsAnwal Mirza
ย 
Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Anwal Mirza
ย 
Hci user centered design 11
Hci user centered design 11Hci user centered design 11
Hci user centered design 11Anwal Mirza
ย 
Hci lec 5,6
Hci lec 5,6Hci lec 5,6
Hci lec 5,6Anwal Mirza
ย 
Hci lec 4
Hci lec 4Hci lec 4
Hci lec 4Anwal Mirza
ย 
Hci lec 1 & 2
Hci lec 1 & 2Hci lec 1 & 2
Hci lec 1 & 2Anwal Mirza
ย 
Hci interace affects the user lec 8
Hci interace affects the user lec 8Hci interace affects the user lec 8
Hci interace affects the user lec 8Anwal Mirza
ย 
Hci evaluationa frame work lec 14
Hci evaluationa frame work lec 14Hci evaluationa frame work lec 14
Hci evaluationa frame work lec 14Anwal Mirza
ย 
Hci design collaboration lec 9 10
Hci  design collaboration lec 9 10Hci  design collaboration lec 9 10
Hci design collaboration lec 9 10Anwal Mirza
ย 

More from Anwal Mirza (20)

Training & development
Training & developmentTraining & development
Training & development
ย 
Training and dev
Training and devTraining and dev
Training and dev
ย 
Testing and selection
Testing and selectionTesting and selection
Testing and selection
ย 
Strategic planning
Strategic planningStrategic planning
Strategic planning
ย 
Recruitment
RecruitmentRecruitment
Recruitment
ย 
Job analysis
Job analysisJob analysis
Job analysis
ย 
Interviewing
Interviewing Interviewing
Interviewing
ย 
Hrm ppt ch. 01
Hrm ppt ch. 01Hrm ppt ch. 01
Hrm ppt ch. 01
ย 
Hrm challenges
Hrm challengesHrm challenges
Hrm challenges
ย 
Firstpage
FirstpageFirstpage
Firstpage
ย 
Hci scanrio-exercise
Hci scanrio-exerciseHci scanrio-exercise
Hci scanrio-exercise
ย 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principals
ย 
Hci user interface-design principals lec 7
Hci user interface-design principals lec 7Hci user interface-design principals lec 7
Hci user interface-design principals lec 7
ย 
Hci user centered design 11
Hci user centered design 11Hci user centered design 11
Hci user centered design 11
ย 
Hci lec 5,6
Hci lec 5,6Hci lec 5,6
Hci lec 5,6
ย 
Hci lec 4
Hci lec 4Hci lec 4
Hci lec 4
ย 
Hci lec 1 & 2
Hci lec 1 & 2Hci lec 1 & 2
Hci lec 1 & 2
ย 
Hci interace affects the user lec 8
Hci interace affects the user lec 8Hci interace affects the user lec 8
Hci interace affects the user lec 8
ย 
Hci evaluationa frame work lec 14
Hci evaluationa frame work lec 14Hci evaluationa frame work lec 14
Hci evaluationa frame work lec 14
ย 
Hci design collaboration lec 9 10
Hci  design collaboration lec 9 10Hci  design collaboration lec 9 10
Hci design collaboration lec 9 10
ย 

Recently uploaded

VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130 Available With Roomdivyansh0kumar0
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN โ˜
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Standkumarajju5765
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
ย 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
ย 
Low Rate Call Girls Kolkata Avani ๐ŸคŒ 8250192130 ๐Ÿš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani ๐ŸคŒ  8250192130 ๐Ÿš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani ๐ŸคŒ  8250192130 ๐Ÿš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani ๐ŸคŒ 8250192130 ๐Ÿš€ Vip Call Girls Kolkataanamikaraghav4
ย 
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130 Available With Roomdivyansh0kumar0
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130 Available With Roomdivyansh0kumar0
ย 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
ย 
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts serviceChennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts servicesonalikaur4
ย 

Recently uploaded (20)

VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum ๐Ÿ‘‰ 8250192130 Available With Room
ย 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
ย 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
ย 
Low Rate Call Girls Kolkata Avani ๐ŸคŒ 8250192130 ๐Ÿš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani ๐ŸคŒ  8250192130 ๐Ÿš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani ๐ŸคŒ  8250192130 ๐Ÿš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani ๐ŸคŒ 8250192130 ๐Ÿš€ Vip Call Girls Kolkata
ย 
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar ๐Ÿ‘‰ 8250192130 Available With Room
ย 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur ๐Ÿ‘‰ 8250192130 Available With Room
ย 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts serviceChennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
Chennai Call Girls Porur Phone ๐Ÿ† 8250192130 ๐Ÿ‘… celebrity escorts service
ย 

CS-576 Lecture on Computer Network Error Detection

  • 2. Introduction ๏‚— Networks must be able to transfer data from one device to another with complete accuracy. ๏‚— A System that can not guarantee that the data received by one device is not identical to the data transmitted by another device is essentially useless. ๏‚— Anytime data is transmitted from source to destination ,it gets corrupted on the way. ๏‚— Many factors including NOISE can alter or wipe out one or more bits of a given data unit. ๏‚— Reliable systems have a mechanism for detecting and correcting such errors ๏‚— Error detection and Correction is implemented either at the data link layer or at the transport layer.
  • 3. Detection vs Correction ๏‚— Detection ๏‚— By detection, we only concentrate on finding an error. ๏‚— Least interest in count or solution ๏‚— Single bit error is same as burst error for detection. ๏‚— Correction ๏‚— By correction, we point out towards the solution of error. ๏‚— Number of error bits and size of data is important. ๏‚— Exact number of corrupted bits and their location. ๏‚— If we need to correct 1 bit error in 8-bit data, possible error locations would be 8. For 2-bit, possibilities would be 28. For 3-bit possibilities would be 56. Imagine if 10-bits of data unit are corrupted, what would happen???
  • 4. Types of Errors ๏‚— Whenever an EM signal flows from one point to the other, it is subject to unpredictable interference from heat, magnetism and other forms of electricity. ๏‚— This interference can change the shape or timing of the signal ๏‚— If the signal is carrying encoded binary data, such changes can alter the meaning of the data.
  • 5. Single Bit ๏‚— In a single-bit error, a 0 is changed to a 1 or a 1 to a 0 . ๏‚— The term single bit error means that only one bit of a given data unit(such as a byte , character or a packet) is changed form 1 to 0 or from 0 to 1. ๏‚— Figure shows the effect of a single bit error on a data unit. ๏‚— ASCII character 00000010(ASCII STX) is sent, meaning start of text but 00001010(ASCII LF) is received , meaning line feed. ๏‚— Single bit errors are the least likely type of error in serial data transmission. ๏‚— To see Why? Imagine a sender sends data at 1Mbps ๏‚— This means that each bit lasts only 1/1,000,000 seconds or 1 microsecond
  • 6. Burst Errors ๏‚— The term burst error means that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1. ๏‚— ๏‚— Figure shows the effect of a burst error on a data unit ๏‚— In this case 0100010001000011 was sent but 0101110101000011 was received. ๏‚— Note that a burst error does not necessarily mean that error occur in consecutive bits . ๏‚— The length of the burst is measured from the first corrupted bit to the last corrupted bit
  • 7. Burst Errors ๏‚— Some bits in b/w may not have been corrupted . ๏‚— Burst error is most likely to happen in a serial transmission. ๏‚— The duration of the noise is normally longer than the duration of a bit which means that when noise affects data , it affects a set of bits ๏‚— The number of bits affected depends on the data rate and duration of noise ๏‚— For example, if we are sending data at 1 Kbps, a noise of 1/100 seconds can affect 10 bits ๏‚— If we are sending data at 1 Mbps, the same noise can affect 10,000 bits
  • 8. Error Detection ๏‚— Even if we know what type of errors can occur, will we recognize one when we see it? ๏‚— If we have a copy of the intended Transmission for comparison, of course we will. ๏‚— But what if we donโ€™t have a copy of the original ๏‚— Then we will have no way of knowing we have received an error until we have decoded the Transmission and failed to make sense of it. It would be costly & slow. ๏‚— We need a mechanism that is Simple and Completely objective.
  • 9. Redundancy ๏‚— One error detection mechanism that would satisfy these requirements would be to send every data unit twice ๏‚— The receiving device would then be able to do a bit-for-bit comparison b/w two Transmissions. ๏‚— Any discrepancy will indicate an error and an appropriate error Correction mechanism could be set in place. ๏‚— This system will be completely Accurate because the odds of error affecting the same bits in both version will be infinitesimally small. ๏‚— But this system will be extra ordinarily SLOW. ๏‚— Not only will the transmission time double ,but the time it takes to compare two data units is also added up. ๏‚— The concept of including extra information in the Transmission solely for the purpose of comparison is good one. ๏‚— But instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. ๏‚— This technique is called REDUNDANCY because the extra bit are redundant to the information and are discarded as soon as the accuracy of Transmission has been determined.
  • 10. ๏‚— Once the data stream has been generated, it passes through a device that analyzes it and adds on an appropriately coded redundancy check. ๏‚— The data unit now enlarged by several bits (7) travels over the link to the receiver. The receiver puts the entire stream through a checking function. ๏‚— If the received bit stream passes the checking criteria, the data portions accepted and the redundant bits are discarded.
  • 11. Types of Redundancy Checks There are 4 types of redundancy checks used in data communication: โ€ข Vertical Redundancy Check (VRC) โ€ข Longitudinal Redundancy Check (LRC) โ€ข Cyclic Redundancy Check (CRC) โ€ข Checksum โ€ขFirst 3 are normally implemented in the physical layer for use in data link layer โ€ข Fourth is used by Upper layers
  • 13. Vertical Redundancy Check (VRC) ๏‚— Most common and least expensive. ๏‚— Also called Parity Check. ๏‚— A redundant bit called parity bit is appended to every data unit so that total number of 1โ€™s in the unit becomes even including the parity bit. ๏‚— We want to Transmit the binary data unit 1100001 ๏‚— Adding together the number of 1โ€™s gives us 3, an odd number ๏‚— Before TX, we pass the data unit through a parity generator, which counts the 1โ€™s and appends the parity bit (1) to the end
  • 14. Vertical Redundancy Check (VRC) ๏‚— The total number of 1โ€™s is now 4, an even number. ๏‚— The system now transfers the entire expanded across the network link. ๏‚— When it reaches its destination, the RX puts all 8 bits through an even parity checking function. ๏‚— If the RX sees 11100001, it counts four ones, an even num passes. ๏‚— But what if the data unit has been damaged in transit? ๏‚— What if instead of 11100001, receiver sees 11100101? ๏‚— When the parity checker counts the 1โ€™s, it gets 5 an odd number. ๏‚— The receiver knows that an error has occurred somewhere and therefore rejects the whole unit.
  • 16. Vertical Redundancy Check (VRC) Performance of VRC ๏‚— VRC can detect all single bit errors ๏‚— In case of even-parity checking ๏‚— Can also detect Burst errors as long as the total number of bits changed is ODD (1,3,5 etc ) ๏‚— It can not detect errors if total number of errors is even
  • 18. Longitudinal Redundancy Check(LRC) ๏‚— In LRC, a block of bit is organized in a table(row and column) ๏‚— For example instead of sending 32 bits, we organize them in a table made of 4 rows and 8 columns ๏‚— We then calculate the Parity bit for each column and create a new row of 8 bits which are the parity bits for the whole block ๏‚— Note that the first parity bit in the 5th row is calculated
  • 19. Longitudinal Red Check(LRC) ๏‚— The second parity bit is calculated based on all the second bits and so on ๏‚— We then attach the 8 parity bits to the original data and send them to the receiver ๏‚— Example
  • 21. Cyclic Redundancy Check (CRC) ๏‚— Most powerful of checking techniques ๏‚— VRC and LRC are based on Addition ๏‚— CRC is based on Binary Division ๏‚— A sequence of redundant bits called CRC or CRC remainder is appended to the end of the data unit so that the resulting data unit becomes exactly divisible by a second predetermined binary number. ๏‚— At its destination, the data unit is divided by the same number . ๏‚— If at this step there is no remainder, the incoming data unit is assumed to be intact and is therefore accepted. ๏‚— A remainder indicates that a data unit has been damaged and therefore must be rejected.
  • 22. Qualities of CRC ๏‚— To be valid the CRC must have two qualities: ๏‚— It must have exactly one less bit than the divisor ๏‚— Appending it to the end of the data must make the resulting bit sequence exactly divisible by the divisor
  • 25. The CRC Checker ๏‚— Functions exactly like CRC Generator
  • 26. CHECKSUM ๏‚— Error detection method used by the Higher Layers ๏‚— Like VRC, LRC, CRC, Checksum is also based on the concept of redundancy ๏‚— Oneโ€™s Complement
  • 27. ๏‚— Error detection method used by the Higher Layers ๏‚— Like VRC,LRC ,CRC, Checksum is also based on the concept of redundancy CHECKSUM
  • 31. EXAMPLE ๏‚— Suppose a block of 16 bits need to be sent: 10101001 00111001 10101001 00111001 ---------------- 11100010 Sum 00011101 Checksum Sent pattern: 10101001 00111001 00011101 checksum
  • 32. EXAMPLE Segment 1 10101001 Segment 2 00111001 Checksum 00011101 ----------------- ---------------- SUM 11111111 Complement 00000000
  • 33. EXAMPLE Segment1 10101111 Segment2 11111001 Checksum 00011101 Sum 11000110 Complement 00111001

Editor's Notes

  1. To determine the possibility of error: n!/k!(n-k)! where n= no. of bits sent, & k= no. of corrupted bits.