SlideShare a Scribd company logo
1 of 11
ERROR DETECTION
AND CORRECTION
Moshrekul
Islam
BACKGROUND
 Some applications require that errors be
detected and corrected errors be detected
and corrected.
 Networks must be able to transfer data from
one device to another with acceptable
accuracy. For most applications, a system
must guarantee that the data received are
identical to the data transmitted. A
 Many factors can alter one or more bits of a
message. Some applications require a
mechanism for detecting and correcting
errors.
2
Data can be corrupted during transmission.
3
 Types of Errors
 Redundancy
 Block coding
INTRODUCTION
Let first discuss some issues related, directly or
indirectly, indirectly, to error detection and
correction.
4
In a single-bit error, only 1 bit in the
data unit has changed.
TYPES OF ERRORS
Single Bit Error
5
A burst error means that 2 or more
bits in the data unit have changed.
Burst Error
TYPES OF ERRORS
6
To detect or correct errors, we need to
send extra (redundant) bits with data.
REDUNDANCY
The central concept in detecting or
correcting errors is redundancy.
7
In block coding, we divide our message
message into blocks, each of k bits, called
datawords. We add redundant redundant
bits to each block to make the length n = k
+ r. The resulting resulting n-bit blocks are
called codewords.
BLOCK CODING
Use for error correction.
Process of error detection in block coding
ERROR DETECTION
Error Detection using block coding
How can errors be detected by using block coding?
If the following two conditions are met, the receiver
can detect a change in the original codeword.
1. The receiver has (or can find) a list of valid
codewords.
2. 2. The original codeword has changed to an
invalid one.
8
9
Backward Error Correction
• There are two ways to overcome the errors
Forward error correction
• Redundancy bits are added to the transmitted
information using predetermined information
ERROR CORRECTION
Error correction are two types
BACKWORD ERROR CORRECTION
 Known as Automatic Repeat Request(ARR)
 The receiver device sends a request to the
source device to re-send the data after
detecting the error or errors
 More often used because it requires less
bandwidth
 A return channel is required for backward
error correction
FORWARD ERROR CORRECTION
•This technique allows the receiver to detect
and correct errors without asking the send
error retransmission
•The bandwidth requirements higher but the
return channel is not needed
•Redundant data sent by transmitters also
called error-correction code
10
ERROR CORRECTION
Error detection and correction

More Related Content

What's hot

Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlAngel G Diaz
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolmdmuaj
 
Error detection techniques
Error detection techniquesError detection techniques
Error detection techniqueskunjan shah
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error CorrectionAditi Singhal
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentationShamim Hossain
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errorsKARIMU KHATWABI
 
Error Detection types
Error Detection typesError Detection types
Error Detection typesKamran Ashraf
 

What's hot (20)

Sak
SakSak
Sak
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error Control
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Error control
Error controlError control
Error control
 
Error correction, ARQ, FEC
Error correction, ARQ, FECError correction, ARQ, FEC
Error correction, ARQ, FEC
 
Error control
Error controlError control
Error control
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
 
Error detection techniques
Error detection techniquesError detection techniques
Error detection techniques
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error Correction
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
 
Error Detection types
Error Detection typesError Detection types
Error Detection types
 
Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 

Similar to Error detection and correction

Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
1834902142(error detection and correction)
1834902142(error detection and correction)1834902142(error detection and correction)
1834902142(error detection and correction)somayaakter
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesanandhakrishnankv
 
Error detection & correctoin
Error detection    & correctoinError detection    & correctoin
Error detection & correctoinDIPTOsarker6
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layerAlisha Korpal
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfJoshuaeeda1
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.pptPawanRaj48
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerShashank HP
 
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eadpeer
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2sharmilas38
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail descriptionBathshebaparimala
 

Similar to Error detection and correction (20)

Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
1834902142(error detection and correction)
1834902142(error detection and correction)1834902142(error detection and correction)
1834902142(error detection and correction)
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
 
Data link layer
Data link layerData link layer
Data link layer
 
Error detection & correctoin
Error detection    & correctoinError detection    & correctoin
Error detection & correctoin
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Data link layer
Data link layerData link layer
Data link layer
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layer
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9e
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 

More from MI RAKIB

Car Detection
Car DetectionCar Detection
Car DetectionMI RAKIB
 
Microprocessor
MicroprocessorMicroprocessor
MicroprocessorMI RAKIB
 
Accounting presentation
Accounting presentationAccounting presentation
Accounting presentationMI RAKIB
 
Infrared detector
Infrared detector Infrared detector
Infrared detector MI RAKIB
 
Dynamic memory allocation
Dynamic memory allocationDynamic memory allocation
Dynamic memory allocationMI RAKIB
 
Bussiness application design
Bussiness application designBussiness application design
Bussiness application designMI RAKIB
 
Impacts of rohingya refugee.
Impacts of rohingya refugee.Impacts of rohingya refugee.
Impacts of rohingya refugee.MI RAKIB
 
Computer Generation
Computer GenerationComputer Generation
Computer GenerationMI RAKIB
 
Aladdin and the Wonderful Lamp
Aladdin and the Wonderful LampAladdin and the Wonderful Lamp
Aladdin and the Wonderful LampMI RAKIB
 

More from MI RAKIB (9)

Car Detection
Car DetectionCar Detection
Car Detection
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Accounting presentation
Accounting presentationAccounting presentation
Accounting presentation
 
Infrared detector
Infrared detector Infrared detector
Infrared detector
 
Dynamic memory allocation
Dynamic memory allocationDynamic memory allocation
Dynamic memory allocation
 
Bussiness application design
Bussiness application designBussiness application design
Bussiness application design
 
Impacts of rohingya refugee.
Impacts of rohingya refugee.Impacts of rohingya refugee.
Impacts of rohingya refugee.
 
Computer Generation
Computer GenerationComputer Generation
Computer Generation
 
Aladdin and the Wonderful Lamp
Aladdin and the Wonderful LampAladdin and the Wonderful Lamp
Aladdin and the Wonderful Lamp
 

Recently uploaded

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 

Error detection and correction

  • 2. BACKGROUND  Some applications require that errors be detected and corrected errors be detected and corrected.  Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee that the data received are identical to the data transmitted. A  Many factors can alter one or more bits of a message. Some applications require a mechanism for detecting and correcting errors. 2 Data can be corrupted during transmission.
  • 3. 3  Types of Errors  Redundancy  Block coding INTRODUCTION Let first discuss some issues related, directly or indirectly, indirectly, to error detection and correction.
  • 4. 4 In a single-bit error, only 1 bit in the data unit has changed. TYPES OF ERRORS Single Bit Error
  • 5. 5 A burst error means that 2 or more bits in the data unit have changed. Burst Error TYPES OF ERRORS
  • 6. 6 To detect or correct errors, we need to send extra (redundant) bits with data. REDUNDANCY The central concept in detecting or correcting errors is redundancy.
  • 7. 7 In block coding, we divide our message message into blocks, each of k bits, called datawords. We add redundant redundant bits to each block to make the length n = k + r. The resulting resulting n-bit blocks are called codewords. BLOCK CODING Use for error correction. Process of error detection in block coding
  • 8. ERROR DETECTION Error Detection using block coding How can errors be detected by using block coding? If the following two conditions are met, the receiver can detect a change in the original codeword. 1. The receiver has (or can find) a list of valid codewords. 2. 2. The original codeword has changed to an invalid one. 8
  • 9. 9 Backward Error Correction • There are two ways to overcome the errors Forward error correction • Redundancy bits are added to the transmitted information using predetermined information ERROR CORRECTION Error correction are two types
  • 10. BACKWORD ERROR CORRECTION  Known as Automatic Repeat Request(ARR)  The receiver device sends a request to the source device to re-send the data after detecting the error or errors  More often used because it requires less bandwidth  A return channel is required for backward error correction FORWARD ERROR CORRECTION •This technique allows the receiver to detect and correct errors without asking the send error retransmission •The bandwidth requirements higher but the return channel is not needed •Redundant data sent by transmitters also called error-correction code 10 ERROR CORRECTION