SlideShare a Scribd company logo
1 of 18
PRESENTATION
Data Representation
MAHESH SINGH MADAI
PREPARED BY
TOPICS
Gray code
Excess-3
Self-Complementary Code
Weighted Code
EBCDIC
Error Detection Codes
#GRAY CODE
• Also known as Reflected Binary Code(RBC)
• Ordering of numeral binary system such that two
successive differ in only bit.
• Unweighted code
• Named after Bell Labs physicist Frank Gray
Steps to convert Binary to Gray Code
To convert a binary number d1 d2 …… dn-1 dn
1. Start from the dn place
2. If dn-1 is 1, replace dn by 1-dn i.e complement it. If 0, no
changes
3. Then proceed to dn-1 and continue upto d1
For Example:
1101 into Gray Code
1101  1101  1111  1011
(i) (ii) (iii)
1111 into Gray Code
1111  1110  1100  1000
(i) (ii) (iii)
APPLICATION OF GRAY CODE
• Most dominating application of Grey Code is in embedded system itself and
specifically in counting.
• In Grey code counting, it can be noticed that the number has fixed single bit change between
them. Logically one needs a pattern to program (Code) which can be manipulated to obtain the
desired results and this is best possible with grey code.
• Binary code is converted into Gray Code to reduce switching operations.
• Plays an important role in Error correction in digital communication such as digital
terrestrial televisions and some cable TV systems
• If there is any error in code, we can at least be assured that there will be only one bit
position change.
• Used in labelling the axes of K-Map ( Boolean circuit minimization)
#EXCESS-3 CODE
• Each codeword is equivalent to its decimal value plus 3 in binary.
• The codewords for 0–4 are complements of the codewords 5–9.
Basic use of Excess-3 code is that you can easily compute subtractions involving
9; all you have to do is invert the bits.
For Example:
• Excess-3 code for 5 is 1000.
• Suppose you have to find out 9 - 5. The answer should be 4.
• Execute the subtraction in Excess-3 code, all you need to do is invert the bits of
the Excess-3 code for 5.
• The answer will be 0111 which is the Excess-3 code of 4
#SELF-COMPLEMENTARY CODE
• If two numbers a and b add up to 15, then the binary representations
of a and b will be complements of each other.
• One can be obtained by complementing the other
• 9’s complement of code is equal to it's 1’s complement.
• Excess-3, 84-2-1and 2421 are the examples.
• Such codes have the property that the 9’s complement of a decimal number is
obtained directly by changing 1’s to 0’s and 0’s to 1’s.
#WEIGHTED CODE
• Weighted codes are those whose each position of the number represents a
specific weight.
• Here , the individual numbers have their respective weights(ie. Values)
• Examples: 8421, 2421,84-2-1 are all weighted codes.
#EBCDIC(EXTENDED BCD INTERCHANGE CODE
• 8-bit character encoding
• Used mainly in IBM Mainframe and mid range IBM computers.
• EBCDIC is a file encoding (rather than a format) that maps binary data to
readable text
• This is similar to ASCII or UTF-8, etc
• EBCDIC used to be IBM’s standard.
• Defines a mapping between the numbers the computer keeps internally and text
characters.
• To transmit text files between systems using EBCDIC and ASCII, you need
something that will translate the text file. This could be hardware, or it could be
software.
Decimal ASCII Decimal EBCDIC
048 0 240 0
049 1 241 1
050 2 242 2
051 3 243 3
052 4 244 4
053 5 245 5
054 6 246 6
055 7 247 7
056 8 248 8
057 9 249 9
065 A 193 A
066 B 194 B
067 C 195 C
068 D 196 D
069 E 197 E
070 F 198 F
#ERROR DETECTION CODES
• Binary code that detects the digital error during transmission of data
• Checks read or transmitted data for errors and corrects them as soon as they are found
• Frequency of errors is checked
• If the error occurs fewer times at random, transmission is repeated. Otherwise, the system malfunction is
checked.
• Implemented in the field of data storage and network transmission hardware (Implemented either at Data
link layer or Transport Layer of OSI Model)
Basic approach used for error detection is the use of redundancy bits, where additional bits are added to
facilitate detection of errors.
Some popular techniques for error detection are:
1. Simple Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check
Simple Parity Check:
• Parity bit is that extra bit included with binary message to make the total number of 1’s either even or odd.
Even Parity:
Blocks of data from the source are subjected to a check bit or parity bit generator form, where a parity of :
• 1 is added to the block if it contains odd number of 1’s, and
• 0 is added if it contains even number of 1’s
This scheme makes the total number of 1’s even, that is why it is called even parity checking.
In data communication, error due to noise or any disruption causes the bit to flip i.e. either 1 to 0 or 0 to 1
Steps:
• At Sending end, message is applied to parity generator.
• Message + parity bit is transmitted to destination.
• At receiving end, all bits are applied to parity checker.
THANK
YOU!!!

More Related Content

What's hot (20)

About ip address
About ip addressAbout ip address
About ip address
 
Ip and mac address
Ip and mac address Ip and mac address
Ip and mac address
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
ipv4 (internet protocol version 4)
  ipv4 (internet protocol version 4)     ipv4 (internet protocol version 4)
ipv4 (internet protocol version 4)
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Code Converters & Parity Checker
Code Converters & Parity CheckerCode Converters & Parity Checker
Code Converters & Parity Checker
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
IP and MAC addressing
IP and MAC addressingIP and MAC addressing
IP and MAC addressing
 
Easy and simple concept of IP Address
Easy and simple concept of IP AddressEasy and simple concept of IP Address
Easy and simple concept of IP Address
 
IP Address
IP AddressIP Address
IP Address
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)Lec 5(Ip Addressing and Subnets)
Lec 5(Ip Addressing and Subnets)
 

Similar to Data Representation Techniques and Error Detection Codes

Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2ISMT College
 
Error detection and correction codes r006
Error detection and correction codes   r006Error detection and correction codes   r006
Error detection and correction codes r006arunachalamr16
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.pptAnnymus
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1SURBHI SAROHA
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptjohnBronson6
 
Combinational circuit
Combinational circuitCombinational circuit
Combinational circuitsabina deshar
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfsaimawarsi
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codessrinu247
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Dr.naveen electronics binary codes
Dr.naveen electronics binary codesDr.naveen electronics binary codes
Dr.naveen electronics binary codesNAVEEN KUMAR
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentationHassan Hashmi
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)welcometofacebook
 

Similar to Data Representation Techniques and Error Detection Codes (20)

Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2
 
Error detection and correction codes r006
Error detection and correction codes   r006Error detection and correction codes   r006
Error detection and correction codes r006
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Computer-codes.pptx
Computer-codes.pptxComputer-codes.pptx
Computer-codes.pptx
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1
 
Student IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.pptStudent IP Addressing Tutorial.ppt
Student IP Addressing Tutorial.ppt
 
Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
03 ddl
03 ddl03 ddl
03 ddl
 
Unit-4.pptx
Unit-4.pptxUnit-4.pptx
Unit-4.pptx
 
unit-3.pptx
unit-3.pptxunit-3.pptx
unit-3.pptx
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codes
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
BCDCONVERTER.pptx
BCDCONVERTER.pptxBCDCONVERTER.pptx
BCDCONVERTER.pptx
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Dr.naveen electronics binary codes
Dr.naveen electronics binary codesDr.naveen electronics binary codes
Dr.naveen electronics binary codes
 
Reed solomon codes
Reed solomon codesReed solomon codes
Reed solomon codes
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentation
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
 
C programming part2
C programming part2C programming part2
C programming part2
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Data Representation Techniques and Error Detection Codes

  • 3. #GRAY CODE • Also known as Reflected Binary Code(RBC) • Ordering of numeral binary system such that two successive differ in only bit. • Unweighted code • Named after Bell Labs physicist Frank Gray Steps to convert Binary to Gray Code To convert a binary number d1 d2 …… dn-1 dn 1. Start from the dn place 2. If dn-1 is 1, replace dn by 1-dn i.e complement it. If 0, no changes 3. Then proceed to dn-1 and continue upto d1
  • 4. For Example: 1101 into Gray Code 1101  1101  1111  1011 (i) (ii) (iii) 1111 into Gray Code 1111  1110  1100  1000 (i) (ii) (iii)
  • 5. APPLICATION OF GRAY CODE • Most dominating application of Grey Code is in embedded system itself and specifically in counting. • In Grey code counting, it can be noticed that the number has fixed single bit change between them. Logically one needs a pattern to program (Code) which can be manipulated to obtain the desired results and this is best possible with grey code.
  • 6. • Binary code is converted into Gray Code to reduce switching operations. • Plays an important role in Error correction in digital communication such as digital terrestrial televisions and some cable TV systems • If there is any error in code, we can at least be assured that there will be only one bit position change. • Used in labelling the axes of K-Map ( Boolean circuit minimization)
  • 7. #EXCESS-3 CODE • Each codeword is equivalent to its decimal value plus 3 in binary. • The codewords for 0–4 are complements of the codewords 5–9.
  • 8. Basic use of Excess-3 code is that you can easily compute subtractions involving 9; all you have to do is invert the bits. For Example: • Excess-3 code for 5 is 1000. • Suppose you have to find out 9 - 5. The answer should be 4. • Execute the subtraction in Excess-3 code, all you need to do is invert the bits of the Excess-3 code for 5. • The answer will be 0111 which is the Excess-3 code of 4
  • 9. #SELF-COMPLEMENTARY CODE • If two numbers a and b add up to 15, then the binary representations of a and b will be complements of each other. • One can be obtained by complementing the other • 9’s complement of code is equal to it's 1’s complement. • Excess-3, 84-2-1and 2421 are the examples. • Such codes have the property that the 9’s complement of a decimal number is obtained directly by changing 1’s to 0’s and 0’s to 1’s.
  • 10.
  • 11. #WEIGHTED CODE • Weighted codes are those whose each position of the number represents a specific weight. • Here , the individual numbers have their respective weights(ie. Values) • Examples: 8421, 2421,84-2-1 are all weighted codes.
  • 12. #EBCDIC(EXTENDED BCD INTERCHANGE CODE • 8-bit character encoding • Used mainly in IBM Mainframe and mid range IBM computers. • EBCDIC is a file encoding (rather than a format) that maps binary data to readable text • This is similar to ASCII or UTF-8, etc • EBCDIC used to be IBM’s standard. • Defines a mapping between the numbers the computer keeps internally and text characters. • To transmit text files between systems using EBCDIC and ASCII, you need something that will translate the text file. This could be hardware, or it could be software.
  • 13. Decimal ASCII Decimal EBCDIC 048 0 240 0 049 1 241 1 050 2 242 2 051 3 243 3 052 4 244 4 053 5 245 5 054 6 246 6 055 7 247 7 056 8 248 8 057 9 249 9 065 A 193 A 066 B 194 B 067 C 195 C 068 D 196 D 069 E 197 E 070 F 198 F
  • 14. #ERROR DETECTION CODES • Binary code that detects the digital error during transmission of data • Checks read or transmitted data for errors and corrects them as soon as they are found • Frequency of errors is checked • If the error occurs fewer times at random, transmission is repeated. Otherwise, the system malfunction is checked. • Implemented in the field of data storage and network transmission hardware (Implemented either at Data link layer or Transport Layer of OSI Model)
  • 15. Basic approach used for error detection is the use of redundancy bits, where additional bits are added to facilitate detection of errors. Some popular techniques for error detection are: 1. Simple Parity check 2. Two-dimensional Parity check 3. Checksum 4. Cyclic redundancy check Simple Parity Check: • Parity bit is that extra bit included with binary message to make the total number of 1’s either even or odd. Even Parity: Blocks of data from the source are subjected to a check bit or parity bit generator form, where a parity of : • 1 is added to the block if it contains odd number of 1’s, and • 0 is added if it contains even number of 1’s This scheme makes the total number of 1’s even, that is why it is called even parity checking.
  • 16. In data communication, error due to noise or any disruption causes the bit to flip i.e. either 1 to 0 or 0 to 1 Steps: • At Sending end, message is applied to parity generator. • Message + parity bit is transmitted to destination. • At receiving end, all bits are applied to parity checker.
  • 17.