SlideShare a Scribd company logo
1 of 31
â—ŹOver fiber or high quality copper the error rate is much
lower so error detection and retransmission is usually more
efficient there for dealing with the occasional error.
â—ŹThere are three different types of error detecting codes.
â—Ź parity
â—Źchecksums
â—ŹCyclic Redundancy Check (CRCs)
Error Detection and Correction
Error Detecting Codes
Parity
â—Ź In parity error detecting code a single parity bit is
appended to the data.
â—ŹThe parity bit is chosen so that the number of bits in the
codeword is even (or Odd).
â—ŹThis is equivalent to computing the (even) parity bit as the
modulo 2 sum or XOR of the data bits.
â—ŹFor example, when 1011010 is sent in even parity a bit is
added to the end to make it 10110100.
Error Detection and Correction
Error Detecting Codes
Parity
â—Ź With Odd parity 1011010 becomes 10110101.
â—Ź It can detect upto single bit errors.
â—Ź One difficulty with this scheme is that a single parity bit
can only reliably detect a single bit error in the block.
â—ŹThis problem is solved by if each block to be sent is
regarded as a rectangular matrix n bits wide and k bits
high.
â—ŹIf we compute and send one parity bit for each row, upto k
bit errors will be detected.
Error Detection and Correction
Error Detecting Codes
Parity
â—Ź In interleaving method we will compute a parity bit for
each of the n columns and send all the data bits as k rows,
sending the rows from top to bottom and the bits in each
row from left to right.
â—ŹWhen burst error of length n=7 occurs the bits that are in
error are spread across different columns.
â—ŹAtmost 1 bit in each of the n columns will be affected so
the parity bits on those columns wil detect the error.
Error Detection and Correction
Error Detecting Codes
Parity
â—Ź The burst of length n+1 will pass undetected.
â—ŹIf the block is badly garbled by a long burst or by multiple
shorter bursts the probability that any of the n columns will
have the correct parity by accident is 0.5.
Error Detection and Correction
Error Detecting Codes
Error Detection and Correction
Error Detecting Codes
Interleaving of parity bits to detect a burst error.
CheckSum
â—Ź The second kind of error detecting code the checksum is
closely related to group of parity bits.
â—ŹThe checksums are based on the sum of the data bits of
the message.
â—ŹThe checksum is usually placed at the end of the message
as the complement of the sum function.
â—ŹOne example of a checksum is the 16 bit Internet
checksum used on all Internet packets as part of the IP
protocol.
Error Detection and Correction
Error Detecting Codes
CheckSum
â—Ź The checksum is a sum of the message bits divided into
16 bit words.
â—ŹThe Internet checksum is computed in one's complement
arithmetic.
â—ŹIn one's complement arithmetic a negative number is the
bitwise complement of its positive counterpart.
â—ŹModern computers run two's complement arithmetic in
which a negative number is the one's complement plus one.
Error Detection and Correction
Error Detecting Codes
Error Detection and Correction
Error Detecting Codes
Fletcher's checksum
â—Ź This method includes a positional component adding the
product of the data and its position to the running sum.
â—ŹThis provides stronger detection of changes in the position
of data.
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹCRC is also known as a polynomial code.
â—ŹPolynomial codes are based upon treating bit string as
representations of polynomial with coefficients of 0 and 1
only.
â—Ź A K-bit frame is regarded as the coefficent list for a
polynomial with k terms ranging from xk-1 to x0.
â—ŹFor example 110001 has 6 bits and is represented as
1x5+1X4+0x3+0x2+0x1+1.
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹCRC is also known as a polynomial code.
â—ŹPolynomial codes are based upon treating bit string as
representations of polynomial with coefficients of 0 and 1
only.
â—Ź A K-bit frame is regarded as the coefficent list for a
polynomial with k terms ranging from xk-1 to x0.
â—ŹFor example 110001 has 6 bits and is represented as
1x5+1X4+0x3+0x2+0x1+1.
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹBoth addition and subtraction are identical to exclusive
OR.
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹWhen the polynomial code method is employed the sender
and receiver must agree upon a generator polynomial G(x)
in advance.
â—ŹTo computer the CRC for some frame with m bits
corresponding to the polynomial M(x).
â—ŹThe idea is to append a CRC to the end of the frame in
such a way that the polynomial represented by the
chceksummed frame is divisible by G(x).
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹWhen the receiver gets the checksummed frame, it tries
dividing it by G(x).
â—ŹIf there is a remainder there has been a transmission error.
â—ŹThe algorithm for computing CRC
â—Ź Let r be the degree of G(x). Append r zero bits to the low
order end of the frame so it now contains m+r bits and
corresponding to the polynomial xrM(x).
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—ŹDivde the bit string corresponding to G(x) into the bit string
corresponding to xrM(x), using modulo 2 division.
â—ŹSubtract the remainder from the bit string corresponding
to xrM(x) using modulo 2 subtraction.The result is the
checksummed frame to be transmitte.call its polynomial
T(x).
â—ŹFor example a frame 1101011111 using the generator
G(x)=x4+x+1
Error Detection and Correction
Error Detecting Codes
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—Ź If there has been a single bit error, E(x)=xi where i
determines which bit is in error.
â—ŹIt can detect all single bit errors.
â—ŹIt can detect two isolated single bit error, E(x)=xi+xj.
â—ŹIt can detect odd number bits in error.
â—ŹFinally a polynomial code with r check bits will detect all
burst errors of length<=r.
Error Detection and Correction
Error Detecting Codes
Cyclic Redundancy Check (CRC)
â—Ź The Polynomial code used in IEEE 802 followed the
example of Ethernet.
â—Źx32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x1+1
â—ŹIt has the property that it detects all burst of length 32 or
less and all bursts affecting an odd number of bits.
â—ŹIEEE standard CRC-32 has a hamming distance of only 4.
Error Detection and Correction
Error Detecting Codes
â—ŹThe physical layer process and some of the data link layer
process run on dedicate hardware called NIC (Network
Interface Card).
â—ŹThe rest of the link layer process and the network layer
process run on the main CPU as part of the OS, with the
software device driver.
Elementary Data Link Protocols
Elementary Data Link Protocols
Implementation of the physical, data link, and network layers.
â—ŹWhen the data link layer accepts a packet it encapsulates
the packet in a frame by adding a data link header and
trailer to it.
â—ŹThe frame is then transmitted to the data link layer on the
other machine.
â—ŹThe procedures to_physical_layer to send a frame and
from_physical_layer to receive a frame.
â—ŹInitally the receiver has nothing to do.
Elementary Data Link Protocols
â—ŹThe data link layer is waiting for something to happen by
the procedure call wait_for_event(&event).
â—ŹThis procedure only returns when something has happened
(e.g., a frame has arrived).
â—ŹUpon return, the variable event tells what happened.
â—ŹWhen a frame arrives at the receiver, the checksum is
recomputed.
â—ŹIf the checksum in the frame is incorrect (i.e., there was a
transmission error), the data link layer is so informed
(event = cksum_err).
Elementary Data Link Protocols
â—ŹIf the inbound frame arrived undamaged, the data link
layer is also informed (event = frame_arrival) so that it can
acquire the frame for inspection using from_physical_layer.
â—ŹAs soon as the receiving data link layer has acquired an
undamaged frame, it checks the control information in the
header, and, if everything is all right, passes the packet
portion to the network layer.
â—ŹFive data structures : boolean, seq_nr, packet, frame_kind,
and frame.
Elementary Data Link Protocols
â—Ź A boolean is an enumerated type and can take on the
values true and false.
â—Ź A seq_nr is a small integer used to number the frames
so that we can tell them apart.
â—ŹThese sequence numbers run from 0 up to and including
MAX_SEQ.
â—Ź A packet is the unit of information exchanged between the
network layer and the data link layer on the same machine,
or between network layer peers.
Elementary Data Link Protocols
â—Ź A frame is composed of four fields: kind, seq, ack, and
info, the first three of which contain control information
and the last of which may contain actual data to be
transferred.
â—ŹThese control fields are collectively called the frame
header.
â—ŹThe kind field tells whether there are any data in the
frame, because some of the protocols distinguish frames
containing only control information from those containing
data as well.
Elementary Data Link Protocols
â—Ź The seq and ack fields are used for sequence numbers
and acknowledgements, respectively.
â—Ź The info field of a data frame contains a single packet the
info field of a control frame is not used.
â—ŹThe procedures to_network_layer and from_network_layer
are used by the data link layer to pass packets to the
network layer and accept packets from the network layer,
respectively.
Elementary Data Link Protocols
â—Ź The procedures from_physical_layer and to_physical_layer
pass frames between the data link layer and the physical
layer.
â—ŹThe sending data link layer must start an internal timer or
clock whenever it sends a frame.
â—ŹIf no reply has been received within a certain
predetermined time interval, the clock times out and the
data link layer receives an interrupt signal.
â—ŹThe procedures start timer and stop timer turn the timer
on and off, respectively.
Elementary Data Link Protocols
â—Ź
Elementary Data Link Protocols
Some definitions needed in the protocols to follow. These
definitions are located in the file protocol.h.
â—Ź
Elementary Data Link Protocols
Some definitions needed in the protocols to follow. These
definitions are located in the file protocol.h.
â—Ź
Elementary Data Link Protocols
Some definitions needed in the protocols to follow. These
definitions are located in the file protocol.h.

More Related Content

What's hot

Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames ExplainedJoshua Kathiravan
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Unit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimizationUnit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimizationleenachandra
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)VARUN KUMAR
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and DecoderAmeer H Ali
 
Chapter 10
Chapter 10Chapter 10
Chapter 10bheemsain
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer ModeNishant Munjal
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)Jeffrey Des Binwag
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Computer Communication Networks- Introduction to Transport layer
Computer Communication Networks- Introduction to Transport layerComputer Communication Networks- Introduction to Transport layer
Computer Communication Networks- Introduction to Transport layerKrishna Nanda
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and CorrectionTechiNerd
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
Data Link Control
Data Link ControlData Link Control
Data Link ControlMeenakshi Paul
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network ShivangiTak1
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 

What's hot (20)

Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Unit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimizationUnit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimization
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Reed solomon Encoder and Decoder
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and Decoder
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Crc
CrcCrc
Crc
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Computer Communication Networks- Introduction to Transport layer
Computer Communication Networks- Introduction to Transport layerComputer Communication Networks- Introduction to Transport layer
Computer Communication Networks- Introduction to Transport layer
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 

Similar to Error detection methods-computer networks

chp2 - data link layer.pptx
chp2 - data link layer.pptxchp2 - data link layer.pptx
chp2 - data link layer.pptxChakra Pani
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerShashank HP
 
Data Communications- Unit-4.pptx
Data Communications- Unit-4.pptxData Communications- Unit-4.pptx
Data Communications- Unit-4.pptxHrushikeshDandu
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfBalasubramanian699229
 
COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3MrMRajaCSESTAFF
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.pptDrPreethiD1
 

Similar to Error detection methods-computer networks (20)

chp2 - data link layer.pptx
chp2 - data link layer.pptxchp2 - data link layer.pptx
chp2 - data link layer.pptx
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Data Communications- Unit-4.pptx
Data Communications- Unit-4.pptxData Communications- Unit-4.pptx
Data Communications- Unit-4.pptx
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
B0210714
B0210714B0210714
B0210714
 
COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 

More from DHIVYADEVAKI

Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNSDHIVYADEVAKI
 
Introduction basic schema and SQL QUERIES
Introduction basic schema and SQL QUERIESIntroduction basic schema and SQL QUERIES
Introduction basic schema and SQL QUERIESDHIVYADEVAKI
 
Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processingDHIVYADEVAKI
 
Image segmentation in Digital Image Processing
Image segmentation in Digital Image ProcessingImage segmentation in Digital Image Processing
Image segmentation in Digital Image ProcessingDHIVYADEVAKI
 
Data preprocessing in Data Mining
Data preprocessing in Data MiningData preprocessing in Data Mining
Data preprocessing in Data MiningDHIVYADEVAKI
 
Apriori algorithm
Apriori algorithm Apriori algorithm
Apriori algorithm DHIVYADEVAKI
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemDHIVYADEVAKI
 
Deadlock Detection in Distributed Systems
Deadlock Detection in Distributed SystemsDeadlock Detection in Distributed Systems
Deadlock Detection in Distributed SystemsDHIVYADEVAKI
 

More from DHIVYADEVAKI (9)

Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
 
Introduction basic schema and SQL QUERIES
Introduction basic schema and SQL QUERIESIntroduction basic schema and SQL QUERIES
Introduction basic schema and SQL QUERIES
 
Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processing
 
Image segmentation in Digital Image Processing
Image segmentation in Digital Image ProcessingImage segmentation in Digital Image Processing
Image segmentation in Digital Image Processing
 
R graphics
R graphicsR graphics
R graphics
 
Data preprocessing in Data Mining
Data preprocessing in Data MiningData preprocessing in Data Mining
Data preprocessing in Data Mining
 
Apriori algorithm
Apriori algorithm Apriori algorithm
Apriori algorithm
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
 
Deadlock Detection in Distributed Systems
Deadlock Detection in Distributed SystemsDeadlock Detection in Distributed Systems
Deadlock Detection in Distributed Systems
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Error detection methods-computer networks

  • 1. â—ŹOver fiber or high quality copper the error rate is much lower so error detection and retransmission is usually more efficient there for dealing with the occasional error. â—ŹThere are three different types of error detecting codes. â—Ź parity â—Źchecksums â—ŹCyclic Redundancy Check (CRCs) Error Detection and Correction Error Detecting Codes
  • 2. Parity â—Ź In parity error detecting code a single parity bit is appended to the data. â—ŹThe parity bit is chosen so that the number of bits in the codeword is even (or Odd). â—ŹThis is equivalent to computing the (even) parity bit as the modulo 2 sum or XOR of the data bits. â—ŹFor example, when 1011010 is sent in even parity a bit is added to the end to make it 10110100. Error Detection and Correction Error Detecting Codes
  • 3. Parity â—Ź With Odd parity 1011010 becomes 10110101. â—Ź It can detect upto single bit errors. â—Ź One difficulty with this scheme is that a single parity bit can only reliably detect a single bit error in the block. â—ŹThis problem is solved by if each block to be sent is regarded as a rectangular matrix n bits wide and k bits high. â—ŹIf we compute and send one parity bit for each row, upto k bit errors will be detected. Error Detection and Correction Error Detecting Codes
  • 4. Parity â—Ź In interleaving method we will compute a parity bit for each of the n columns and send all the data bits as k rows, sending the rows from top to bottom and the bits in each row from left to right. â—ŹWhen burst error of length n=7 occurs the bits that are in error are spread across different columns. â—ŹAtmost 1 bit in each of the n columns will be affected so the parity bits on those columns wil detect the error. Error Detection and Correction Error Detecting Codes
  • 5. Parity â—Ź The burst of length n+1 will pass undetected. â—ŹIf the block is badly garbled by a long burst or by multiple shorter bursts the probability that any of the n columns will have the correct parity by accident is 0.5. Error Detection and Correction Error Detecting Codes
  • 6. Error Detection and Correction Error Detecting Codes Interleaving of parity bits to detect a burst error.
  • 7. CheckSum â—Ź The second kind of error detecting code the checksum is closely related to group of parity bits. â—ŹThe checksums are based on the sum of the data bits of the message. â—ŹThe checksum is usually placed at the end of the message as the complement of the sum function. â—ŹOne example of a checksum is the 16 bit Internet checksum used on all Internet packets as part of the IP protocol. Error Detection and Correction Error Detecting Codes
  • 8. CheckSum â—Ź The checksum is a sum of the message bits divided into 16 bit words. â—ŹThe Internet checksum is computed in one's complement arithmetic. â—ŹIn one's complement arithmetic a negative number is the bitwise complement of its positive counterpart. â—ŹModern computers run two's complement arithmetic in which a negative number is the one's complement plus one. Error Detection and Correction Error Detecting Codes
  • 9. Error Detection and Correction Error Detecting Codes
  • 10. Fletcher's checksum â—Ź This method includes a positional component adding the product of the data and its position to the running sum. â—ŹThis provides stronger detection of changes in the position of data. Error Detection and Correction Error Detecting Codes
  • 11. Cyclic Redundancy Check (CRC) â—ŹCRC is also known as a polynomial code. â—ŹPolynomial codes are based upon treating bit string as representations of polynomial with coefficients of 0 and 1 only. â—Ź A K-bit frame is regarded as the coefficent list for a polynomial with k terms ranging from xk-1 to x0. â—ŹFor example 110001 has 6 bits and is represented as 1x5+1X4+0x3+0x2+0x1+1. Error Detection and Correction Error Detecting Codes
  • 12. Cyclic Redundancy Check (CRC) â—ŹCRC is also known as a polynomial code. â—ŹPolynomial codes are based upon treating bit string as representations of polynomial with coefficients of 0 and 1 only. â—Ź A K-bit frame is regarded as the coefficent list for a polynomial with k terms ranging from xk-1 to x0. â—ŹFor example 110001 has 6 bits and is represented as 1x5+1X4+0x3+0x2+0x1+1. Error Detection and Correction Error Detecting Codes
  • 13. Cyclic Redundancy Check (CRC) â—ŹBoth addition and subtraction are identical to exclusive OR. Error Detection and Correction Error Detecting Codes
  • 14. Cyclic Redundancy Check (CRC) â—ŹWhen the polynomial code method is employed the sender and receiver must agree upon a generator polynomial G(x) in advance. â—ŹTo computer the CRC for some frame with m bits corresponding to the polynomial M(x). â—ŹThe idea is to append a CRC to the end of the frame in such a way that the polynomial represented by the chceksummed frame is divisible by G(x). Error Detection and Correction Error Detecting Codes
  • 15. Cyclic Redundancy Check (CRC) â—ŹWhen the receiver gets the checksummed frame, it tries dividing it by G(x). â—ŹIf there is a remainder there has been a transmission error. â—ŹThe algorithm for computing CRC â—Ź Let r be the degree of G(x). Append r zero bits to the low order end of the frame so it now contains m+r bits and corresponding to the polynomial xrM(x). Error Detection and Correction Error Detecting Codes
  • 16. Cyclic Redundancy Check (CRC) â—ŹDivde the bit string corresponding to G(x) into the bit string corresponding to xrM(x), using modulo 2 division. â—ŹSubtract the remainder from the bit string corresponding to xrM(x) using modulo 2 subtraction.The result is the checksummed frame to be transmitte.call its polynomial T(x). â—ŹFor example a frame 1101011111 using the generator G(x)=x4+x+1 Error Detection and Correction Error Detecting Codes
  • 17. Error Detection and Correction Error Detecting Codes
  • 18. Cyclic Redundancy Check (CRC) â—Ź If there has been a single bit error, E(x)=xi where i determines which bit is in error. â—ŹIt can detect all single bit errors. â—ŹIt can detect two isolated single bit error, E(x)=xi+xj. â—ŹIt can detect odd number bits in error. â—ŹFinally a polynomial code with r check bits will detect all burst errors of length<=r. Error Detection and Correction Error Detecting Codes
  • 19. Cyclic Redundancy Check (CRC) â—Ź The Polynomial code used in IEEE 802 followed the example of Ethernet. â—Źx32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x1+1 â—ŹIt has the property that it detects all burst of length 32 or less and all bursts affecting an odd number of bits. â—ŹIEEE standard CRC-32 has a hamming distance of only 4. Error Detection and Correction Error Detecting Codes
  • 20. â—ŹThe physical layer process and some of the data link layer process run on dedicate hardware called NIC (Network Interface Card). â—ŹThe rest of the link layer process and the network layer process run on the main CPU as part of the OS, with the software device driver. Elementary Data Link Protocols
  • 21. Elementary Data Link Protocols Implementation of the physical, data link, and network layers.
  • 22. â—ŹWhen the data link layer accepts a packet it encapsulates the packet in a frame by adding a data link header and trailer to it. â—ŹThe frame is then transmitted to the data link layer on the other machine. â—ŹThe procedures to_physical_layer to send a frame and from_physical_layer to receive a frame. â—ŹInitally the receiver has nothing to do. Elementary Data Link Protocols
  • 23. â—ŹThe data link layer is waiting for something to happen by the procedure call wait_for_event(&event). â—ŹThis procedure only returns when something has happened (e.g., a frame has arrived). â—ŹUpon return, the variable event tells what happened. â—ŹWhen a frame arrives at the receiver, the checksum is recomputed. â—ŹIf the checksum in the frame is incorrect (i.e., there was a transmission error), the data link layer is so informed (event = cksum_err). Elementary Data Link Protocols
  • 24. â—ŹIf the inbound frame arrived undamaged, the data link layer is also informed (event = frame_arrival) so that it can acquire the frame for inspection using from_physical_layer. â—ŹAs soon as the receiving data link layer has acquired an undamaged frame, it checks the control information in the header, and, if everything is all right, passes the packet portion to the network layer. â—ŹFive data structures : boolean, seq_nr, packet, frame_kind, and frame. Elementary Data Link Protocols
  • 25. â—Ź A boolean is an enumerated type and can take on the values true and false. â—Ź A seq_nr is a small integer used to number the frames so that we can tell them apart. â—ŹThese sequence numbers run from 0 up to and including MAX_SEQ. â—Ź A packet is the unit of information exchanged between the network layer and the data link layer on the same machine, or between network layer peers. Elementary Data Link Protocols
  • 26. â—Ź A frame is composed of four fields: kind, seq, ack, and info, the first three of which contain control information and the last of which may contain actual data to be transferred. â—ŹThese control fields are collectively called the frame header. â—ŹThe kind field tells whether there are any data in the frame, because some of the protocols distinguish frames containing only control information from those containing data as well. Elementary Data Link Protocols
  • 27. â—Ź The seq and ack fields are used for sequence numbers and acknowledgements, respectively. â—Ź The info field of a data frame contains a single packet the info field of a control frame is not used. â—ŹThe procedures to_network_layer and from_network_layer are used by the data link layer to pass packets to the network layer and accept packets from the network layer, respectively. Elementary Data Link Protocols
  • 28. â—Ź The procedures from_physical_layer and to_physical_layer pass frames between the data link layer and the physical layer. â—ŹThe sending data link layer must start an internal timer or clock whenever it sends a frame. â—ŹIf no reply has been received within a certain predetermined time interval, the clock times out and the data link layer receives an interrupt signal. â—ŹThe procedures start timer and stop timer turn the timer on and off, respectively. Elementary Data Link Protocols
  • 29. â—Ź Elementary Data Link Protocols Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h.
  • 30. â—Ź Elementary Data Link Protocols Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h.
  • 31. â—Ź Elementary Data Link Protocols Some definitions needed in the protocols to follow. These definitions are located in the file protocol.h.