SlideShare a Scribd company logo
1 of 16
 Whenever bits flow from one point to another, they are
subject to unpredictable changes because of
interference. This interference can change the shape of
the signal.
 In a single-bit error, a 0 is changed to a 1 or a 1 to a O.
In a burst error, multiple bits are changed. For example,
a 11100 s burst of impulse noise on a transmission with
a data rate of 1200 bps might change all or some of
the12 bits of information.
 Block coding
 In block coding, we divide our message into blocks, each of k bits,
called datawords. We add r redundant bits to each block to make
the length n = k + r. The resulting n-bit blocks are called codewords.
[1]
 We have a set of datawords, each of size k, and a set of
codewords, each of size of n. With k bits, we can create a
combination of 2k datawords; with n bits, we can create a
combination of 2n codewords. Since n > k, the number of possible
codewords is larger than the number of possible datawords. The
block coding process is one-to-one; the same dataword is always
encoded as the same codeword. This means that we have 2n - 2k
codewords that are not used. We call these codewords invalid or
illegal. [1]
 If the following two conditions are met, the receiver can detect a
change in the original codeword. [2]
 The receiver has (or can find) a list of valid codewords.
 The original codeword has changed to an invalid one.
 The sender creates codewords out of datawords by using a
generator that applies the rules and procedures of encoding. Each
codeword sent to the receiver may change during transmission. If
the received codeword is the same as one of the valid codewords,
the word is accepted; the corresponding dataword is extracted for
use. If the received codeword is not valid, it is discarded. However,
if the codeword is corrupted during transmission but the received
word still matches a valid codeword, the error remains undetected.
[2]
 This type of coding can detect only single errors. Two or more
errors may remain undetected.
 Parity checking is a technique of adding an extra bit to the
end of a block of data to detect error.
 There are two types of parity checking: Even parity and
Odd parity.
 Even parity is a technique of adding an extra bit to the end
of block so that the numbers of 1’s becomes even.
 When the block arrives, the receiver will check if the
numbers of 1’s are even, if not there is an error.
 Odd parity is a technique of adding an extra bit to the end
of block so that the numbers of 1’s becomes odd.
 If the numbers of 1’s in a block are even, the receiver will
detect error.
 In Computer Memory,Computer Networking parity checking
is used as a way to ensure data integrity and prevent errors,
or detect them in the event they are occurring.
 Parity does not indicate which bit contained the error,
even when it can detect it.
 If the number of bits changed is even, the error will not
be detected.
 It can only detect one, three, or any odd number of
errors in each character.
 The data must be discarded entirely, and retransmitted
from scratch.
 One of the most common and one of the most powerful,
error-detecting codes is the cyclic redundancy check
(CRC). [3]
 It is used to protect blocks of data called Frames.
 Given a k-bit block of bits, or message, the transmitter
generates an sequence, known as a frame check
sequence (FCS), such that the resulting frame, consisting
of n bits, is exactly divisible by some predetermined
number. The receiver then divides the incoming frame by
that number and, if there is no remainder, assumes there
was no error. [3]
 CRC is simple to implement in binary hardware,
Mathematical analysis of CRC is very simple, and it is
good at detecting common errors caused by noise in
transmission.
 It has two important qualities:
 1. It must be one less than the number of divisor bits.
 2. After appending these bits data unit must be exactly
divisible by divisor.
Limitations
 CRC is not suitable for protecting against intentional
alteration of data, and overflow of data is possible in
CRC.
 In Hamming codes K parity bits are added to an n-bit data word,
forming a new word of n + k bits. The bit positions are numbered in
sequence from 1 to n + k. Those positions numbered with powers of
two are reserved for the parity bits. The code can be used with words
of any length.
Limitations
 One of the main disadvantages of Hamming codes is the
fixed Hamming distance and the problem of implementing
coders for large blocks. The fixed Hamming distance of
Hamming codes allows for detection of two errored bits
and the ability to correct only a single errored bit. A code
which enables the implementer to select the desired
Hamming distance would be advantageous.
 Error correction is much more difficult than error
detection. In error detection, the receiver needs
to know only that the received codeword is
invalid; in error correction the receiver needs to
find (or guess) the original codeword sent. We
can say that we need more redundant bits for
error correction than for error detection. [2]
 In block coding, we divide our message into blocks,
each of k bits, called datawords. We add r redundant
bits to each block to make the length n = k + r. The
resulting n-bit blocks are called codewords.
 Parity checking, Cyclic redundancy checking (CRC) and
Hamming codes are some error detection techniques
that I discussed in this assignment.
 Parity checking is a technique of adding an extra bit to
the end of a block of data to detect error.
 There are two types of parity checking: Even parity and
Odd parity.
 One of the most common and one of the most powerful,
error-detecting codes is the cyclic redundancy check
(CRC).
 It is used to protect blocks of data called Frames.
 Given a k-bit block of bits, or message, the transmitter
generates an sequence, known as a frame check
sequence (FCS), such that the resulting frame,
consisting of n bits, is exactly divisible by some
predetermined number. The receiver then divides the
incoming frame by that number and, if there is no
remainder, assumes there was no error.
 And in Hamming codes K parity bits are added to an n-
bit data word, forming a new word of n + k bits. The bit
positions are numbered in sequence from 1 to n + k.
Those positions numbered with powers of two are
reserved for the parity bits. The code can be used with
words of any length.
[1] B. A. Forouzan, Data Communications and Networking, vol.
Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 271.
[2] B. A. Forouzan, Data Communications and Networking, vol.
Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 272.
[3] W. Stallings, Data and Computer Communications, vol. Eighth
Edition, Upper Saddle Rivar, NJ 07458: Pearson Education, Inc, 2007,
p. 189.

More Related Content

What's hot

Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controllerTech_MX
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -IntroductionBurdwan University
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 

What's hot (20)

Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Convolution Codes
Convolution CodesConvolution Codes
Convolution Codes
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Crc
CrcCrc
Crc
 
Turbo codes.ppt
Turbo codes.pptTurbo codes.ppt
Turbo codes.ppt
 
DSP Processor
DSP Processor DSP Processor
DSP Processor
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Transport layer
Transport layer Transport layer
Transport layer
 

Similar to Error Detection Techniques: Parity, CRC & Hamming Codes

DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
chp2 - data link layer.pptx
chp2 - data link layer.pptxchp2 - data link layer.pptx
chp2 - data link layer.pptxChakra Pani
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelUniversitas Pembangunan Panca Budi
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.pptPawanRaj48
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdfkenilpatel65
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errorsKARIMU KHATWABI
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentationAhmedMuhumed2
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embeddedlthanuja01
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerShashank HP
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeskysunilyadav
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networksDHIVYADEVAKI
 

Similar to Error Detection Techniques: Parity, CRC & Hamming Codes (20)

DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
chp2 - data link layer.pptx
chp2 - data link layer.pptxchp2 - data link layer.pptx
chp2 - data link layer.pptx
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
 
Data link layer
Data link layerData link layer
Data link layer
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Error Detection Techniques: Parity, CRC & Hamming Codes

  • 1.
  • 2.  Whenever bits flow from one point to another, they are subject to unpredictable changes because of interference. This interference can change the shape of the signal.  In a single-bit error, a 0 is changed to a 1 or a 1 to a O. In a burst error, multiple bits are changed. For example, a 11100 s burst of impulse noise on a transmission with a data rate of 1200 bps might change all or some of the12 bits of information.
  • 3.  Block coding  In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. [1]  We have a set of datawords, each of size k, and a set of codewords, each of size of n. With k bits, we can create a combination of 2k datawords; with n bits, we can create a combination of 2n codewords. Since n > k, the number of possible codewords is larger than the number of possible datawords. The block coding process is one-to-one; the same dataword is always encoded as the same codeword. This means that we have 2n - 2k codewords that are not used. We call these codewords invalid or illegal. [1]
  • 4.  If the following two conditions are met, the receiver can detect a change in the original codeword. [2]  The receiver has (or can find) a list of valid codewords.  The original codeword has changed to an invalid one.  The sender creates codewords out of datawords by using a generator that applies the rules and procedures of encoding. Each codeword sent to the receiver may change during transmission. If the received codeword is the same as one of the valid codewords, the word is accepted; the corresponding dataword is extracted for use. If the received codeword is not valid, it is discarded. However, if the codeword is corrupted during transmission but the received word still matches a valid codeword, the error remains undetected. [2]  This type of coding can detect only single errors. Two or more errors may remain undetected.
  • 5.  Parity checking is a technique of adding an extra bit to the end of a block of data to detect error.  There are two types of parity checking: Even parity and Odd parity.  Even parity is a technique of adding an extra bit to the end of block so that the numbers of 1’s becomes even.  When the block arrives, the receiver will check if the numbers of 1’s are even, if not there is an error.  Odd parity is a technique of adding an extra bit to the end of block so that the numbers of 1’s becomes odd.
  • 6.  If the numbers of 1’s in a block are even, the receiver will detect error.  In Computer Memory,Computer Networking parity checking is used as a way to ensure data integrity and prevent errors, or detect them in the event they are occurring.
  • 7.  Parity does not indicate which bit contained the error, even when it can detect it.  If the number of bits changed is even, the error will not be detected.  It can only detect one, three, or any odd number of errors in each character.  The data must be discarded entirely, and retransmitted from scratch.
  • 8.  One of the most common and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC). [3]  It is used to protect blocks of data called Frames.  Given a k-bit block of bits, or message, the transmitter generates an sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error. [3]
  • 9.  CRC is simple to implement in binary hardware, Mathematical analysis of CRC is very simple, and it is good at detecting common errors caused by noise in transmission.
  • 10.  It has two important qualities:  1. It must be one less than the number of divisor bits.  2. After appending these bits data unit must be exactly divisible by divisor. Limitations  CRC is not suitable for protecting against intentional alteration of data, and overflow of data is possible in CRC.
  • 11.  In Hamming codes K parity bits are added to an n-bit data word, forming a new word of n + k bits. The bit positions are numbered in sequence from 1 to n + k. Those positions numbered with powers of two are reserved for the parity bits. The code can be used with words of any length. Limitations  One of the main disadvantages of Hamming codes is the fixed Hamming distance and the problem of implementing coders for large blocks. The fixed Hamming distance of Hamming codes allows for detection of two errored bits and the ability to correct only a single errored bit. A code which enables the implementer to select the desired Hamming distance would be advantageous.
  • 12.  Error correction is much more difficult than error detection. In error detection, the receiver needs to know only that the received codeword is invalid; in error correction the receiver needs to find (or guess) the original codeword sent. We can say that we need more redundant bits for error correction than for error detection. [2]
  • 13.  In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.  Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed in this assignment.  Parity checking is a technique of adding an extra bit to the end of a block of data to detect error.
  • 14.  There are two types of parity checking: Even parity and Odd parity.  One of the most common and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC).  It is used to protect blocks of data called Frames.  Given a k-bit block of bits, or message, the transmitter generates an sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error.
  • 15.  And in Hamming codes K parity bits are added to an n- bit data word, forming a new word of n + k bits. The bit positions are numbered in sequence from 1 to n + k. Those positions numbered with powers of two are reserved for the parity bits. The code can be used with words of any length.
  • 16. [1] B. A. Forouzan, Data Communications and Networking, vol. Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 271. [2] B. A. Forouzan, Data Communications and Networking, vol. Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 272. [3] W. Stallings, Data and Computer Communications, vol. Eighth Edition, Upper Saddle Rivar, NJ 07458: Pearson Education, Inc, 2007, p. 189.