SlideShare a Scribd company logo
1 of 2
Kamran Ashraf
MSCs 1st Semester
13-NTU-4009 National Textile University Page 1
Q: What type of errors cannot be detected in all covered
detection algorithms and why? What can be done to detect
such types of errors? Explain above in all one by one error
detection algorithms.
1- Errorsnot detectable by Two Dimensional Parity:
a. Few 4-bit errors are not detectable
b. All 5-bit and above errors are not detectable
Example:
We have Four 7 bit character packet with even parity
Two-Dimensional Parity didn’t detect 4 bit error shown below:
Sent Packet
Even parity
0110100 1
1011010 0
0010110 1
1110101 1
1001011 0
1000110 1
Solution:
Instead of Two dimensional Parity we can use CRC to detect errors upto 32 bit.
2- Errorsnot detectable by the checksum:
a. If somehow two data items gets exchanged during transmission, error is not
detected because sum and the checksum value will remain same.
b. If somehow value of one data item is increased and the value of any other data item
is decreased by the same amount, then the sum and the checksum remain same and
error cannot be detected.
c. If a zero value byte is inserted or deleted, the changes are undetectable.
4-bit Error
not detected
0110100 1
1011010 0
0000111 1
1100100 1
1001011 0
1000110 1
Kamran Ashraf
MSCs 1st Semester
13-NTU-4009 National Textile University Page 2
Example:
Four data items got error as the bits got changed but checksum value is same, the error is not
detected by checksum.
Original Data
Data Item
in binary
Checksum
Value
0001 1
0010 2
0011 3
0001 1
Total 7
Solution:
For safe transmission of data more complex algorithms are needed. Cyclic redundancy check
(CRC) is more sophisticated method to detect these kinds of errors.
3- Errorsnot detectable by the Cyclic RedundancyChecks:
CRC can detect broad range for errors however all kind of errors are not detectable.
a. CRC detect burst error upto CRC size only.
b. CRC cannot detect all burst errors that affect an even number of bits.
c. CRC may not detect burst errors of length greater than the degree of the
polynomial.
After undetected Error
Data Item
in binary
Checksum
Value
0011 3
0000 0
0001 1
0011 3
Total 7

More Related Content

What's hot

Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMI RAKIB
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 
Error detecting and correcting codes
Error detecting and correcting codesError detecting and correcting codes
Error detecting and correcting codessaraswathi12
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionCathryn Kuteesa
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errorsKARIMU KHATWABI
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentationHassan Hashmi
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Lecture 4 errors detection
Lecture 4 errors detection Lecture 4 errors detection
Lecture 4 errors detection Josh Street
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentationShamim Hossain
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolmdmuaj
 

What's hot (20)

Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
Error detecting and correcting codes
Error detecting and correcting codesError detecting and correcting codes
Error detecting and correcting codes
 
Error control
Error controlError control
Error control
 
Sak
SakSak
Sak
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentation
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 4 errors detection
Lecture 4 errors detection Lecture 4 errors detection
Lecture 4 errors detection
 
Error control
Error controlError control
Error control
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
 

Viewers also liked

Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-Deepak John
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layerAlisha Korpal
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layerDeepak John
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
introduction to computers
 introduction to computers introduction to computers
introduction to computersDeepak John
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 
Module 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingModule 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingDeepak John
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolSajith Ekanayaka
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logicDeepak John
 
OBIEE 11g : Repository Creation Steps
OBIEE 11g : Repository Creation StepsOBIEE 11g : Repository Creation Steps
OBIEE 11g : Repository Creation StepsDharmaraj Borse
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Dcn unit 2 ppt
Dcn unit 2 pptDcn unit 2 ppt
Dcn unit 2 pptQazi Ahmad
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirsharifbdp
 
Client server-computing
Client server-computingClient server-computing
Client server-computingjayasreep3
 
The ethernet frame a walkthrough
The ethernet frame a walkthroughThe ethernet frame a walkthrough
The ethernet frame a walkthroughMapYourTech
 

Viewers also liked (20)

Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layer
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Psicologia
PsicologiaPsicologia
Psicologia
 
Module 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingModule 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacing
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
 
OBIEE 11g : Repository Creation Steps
OBIEE 11g : Repository Creation StepsOBIEE 11g : Repository Creation Steps
OBIEE 11g : Repository Creation Steps
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Osi layer notes
Osi layer notesOsi layer notes
Osi layer notes
 
Chapter7
Chapter7Chapter7
Chapter7
 
Dcn unit 2 ppt
Dcn unit 2 pptDcn unit 2 ppt
Dcn unit 2 ppt
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sir
 
Client server-computing
Client server-computingClient server-computing
Client server-computing
 
The ethernet frame a walkthrough
The ethernet frame a walkthroughThe ethernet frame a walkthrough
The ethernet frame a walkthrough
 

Similar to Error Detection types

Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfBalasubramanian699229
 
Error Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptError Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptMd Mosharof Hosen
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.pptPawanRaj48
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).pptBezaAlem2
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.pptKumarVaibhav100
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...ZerihunDemere
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation Badrul Alam
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.pptMsSJeyalakshmiVelsUn
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunicationUmme habiba
 

Similar to Error Detection types (20)

Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Error Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptError Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.ppt
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 

More from Kamran Ashraf

The Maximum Subarray Problem
The Maximum Subarray ProblemThe Maximum Subarray Problem
The Maximum Subarray ProblemKamran Ashraf
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Application programming interface sockets
Application programming interface socketsApplication programming interface sockets
Application programming interface socketsKamran Ashraf
 
Graphic Processing Unit
Graphic Processing UnitGraphic Processing Unit
Graphic Processing UnitKamran Ashraf
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 

More from Kamran Ashraf (6)

The Maximum Subarray Problem
The Maximum Subarray ProblemThe Maximum Subarray Problem
The Maximum Subarray Problem
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Application programming interface sockets
Application programming interface socketsApplication programming interface sockets
Application programming interface sockets
 
VIRTUAL MEMORY
VIRTUAL MEMORYVIRTUAL MEMORY
VIRTUAL MEMORY
 
Graphic Processing Unit
Graphic Processing UnitGraphic Processing Unit
Graphic Processing Unit
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 

Error Detection types

  • 1. Kamran Ashraf MSCs 1st Semester 13-NTU-4009 National Textile University Page 1 Q: What type of errors cannot be detected in all covered detection algorithms and why? What can be done to detect such types of errors? Explain above in all one by one error detection algorithms. 1- Errorsnot detectable by Two Dimensional Parity: a. Few 4-bit errors are not detectable b. All 5-bit and above errors are not detectable Example: We have Four 7 bit character packet with even parity Two-Dimensional Parity didn’t detect 4 bit error shown below: Sent Packet Even parity 0110100 1 1011010 0 0010110 1 1110101 1 1001011 0 1000110 1 Solution: Instead of Two dimensional Parity we can use CRC to detect errors upto 32 bit. 2- Errorsnot detectable by the checksum: a. If somehow two data items gets exchanged during transmission, error is not detected because sum and the checksum value will remain same. b. If somehow value of one data item is increased and the value of any other data item is decreased by the same amount, then the sum and the checksum remain same and error cannot be detected. c. If a zero value byte is inserted or deleted, the changes are undetectable. 4-bit Error not detected 0110100 1 1011010 0 0000111 1 1100100 1 1001011 0 1000110 1
  • 2. Kamran Ashraf MSCs 1st Semester 13-NTU-4009 National Textile University Page 2 Example: Four data items got error as the bits got changed but checksum value is same, the error is not detected by checksum. Original Data Data Item in binary Checksum Value 0001 1 0010 2 0011 3 0001 1 Total 7 Solution: For safe transmission of data more complex algorithms are needed. Cyclic redundancy check (CRC) is more sophisticated method to detect these kinds of errors. 3- Errorsnot detectable by the Cyclic RedundancyChecks: CRC can detect broad range for errors however all kind of errors are not detectable. a. CRC detect burst error upto CRC size only. b. CRC cannot detect all burst errors that affect an even number of bits. c. CRC may not detect burst errors of length greater than the degree of the polynomial. After undetected Error Data Item in binary Checksum Value 0011 3 0000 0 0001 1 0011 3 Total 7