SlideShare a Scribd company logo
1 of 8
Error Detection and Correction
Error:
The data can be corrupted during transmission (from source to receiver). It may be
affected by external noise or some other physical imperfections. In this case, the
input data is not same as the received output data. This mismatched data is called
ā€œErrorā€.
The data errors will cause loss of important / secured data. Even one bit of change
in data may affect the whole systemā€™s performance. Generally the data transfer in
digital systems will be in the form of ā€˜Bit ā€“ transferā€™. In this case, the data error is
likely to be changed in positions of 0 and 1.
Types of Error:
In a data sequence, if 1 is changed to zero or 0 is changed to 1, it is called ā€œBit
errorā€.
There are generally 3 types of errors occur in data transmission from transmitter to
receiver. They are
ā€¢ Single bit errors
ā€¢ Multiple bit errors
ā€¢ Burst errors
Single Bit Data Errors:
The change in one bit in the whole data sequence is called ā€œSingle bit errorā€.
Occurrence of single bit error is very rare in serial communication system.
This type of error occurs only in parallel communication system, as data is
transferred bit wise in single line, there is chance that single line to be noisy.
Multiple Bit Data Errors:
If there is change in two or more bits of data sequence of transmitter to receiver, it
is called ā€œMultiple bit errorā€. This type of error occurs in both serial type and
parallel type data communication networks.
Burst Errors:
The change of set of bits in data sequence is called ā€œBurst errorā€. The burst error is
calculated in from the first bit change to last bit change.
Error Detecting Codes:
Error detection is the process ofdetecting the errors that are present in the data
transmitted from transmitter to receiver, in a communication system. We use some
redundancy codes to detect these errors, by adding to the data while it is
transmitted from source(transmitter). These codes are called ā€œError detecting
codesā€.
Types of Error detection:
1. Parity Checking
2. Cyclic Redundancy Check (CRC)
3. Longitudinal Redundancy Check (LRC)
4. Check Sum
1. Parity Checking
Parity bit means nothing but an additional bit added to the data at the transmitter
before transmitting the data. Before adding the parity bit, number of 1ā€™s or zeros is
calculated in the data. Based on this calculation of data an extra bit is added to the
actual information / data. The addition of parity bit to the data will result in the
change of data string size.
This means if we have an 8 bit data, then after adding a parity bit to the data binary
string it will become a 9 bit binary data string.
There is two types of parity bits in error detection, they are
ļ‚· Even parity
ļ‚· Odd parity
Even Parity:
ļ‚· If the data has even number of 1ā€™s, the parity bit is 0.
ļ‚· Data is 10000001 -> parity bit 0
ļ‚· Odd number of 1ā€™s, the parity bit is 1.
ļ‚· Data is 10010001 -> parity bit 1
Odd Parity:
ļ‚· If the data has odd number of 1ā€™s, the parity bit is 0.
ļ‚· Data is 10011101 -> parity bit 0
ļ‚· Even number of 1ā€™s, the parity bit is 1.
ļ‚· Data is 10010101 -> parity bit 1
Messages with evenparity and odd parity
2. Cyclic Redundancy Check
The codes used for cyclic redundancy check there by error detection are known as
CRC codes (Cyclic redundancy check codes).Cyclic redundancy-check codes are
shortened cyclic codes. These types of codes are used for error detection and
encoding. They are easily implemented using shift-registers with feedback
connections. That is why they are widely used for error detection on digital
communication. CRC codes will provide effective and high level of protection.
CRC Code Generation:
Based on the desired number of bit checks, we will add some zeros (0) to the actual
data. This new binary data sequence is divided by a new word of length n + 1,
where n is the number of check bits to be added . The reminder obtained as a result
of this modulo 2- division is added to the dividend bit sequence to form the cyclic
code. The generated codeword is completely divisible by the divisor that is used in
generation of code. This is transmitted through the transmitter.
Example:
At the receiver side, we divide the received codeword with the same divisor to get
the actual codeword. For an error free reception of data, the reminder is 0. If the
reminder is a non ā€“ zero, that means there is an error in the received code/ data
sequence. The probability of error detection depends upon the number of check
bits (n) used to constructthe cyclic code. Forsingle bit and two bit errors, the
probability is 100 %.
For a burst error of length n ā€“ 1, the probability of error detecting is 100 % .
A burst error of length equal to n + 1, the probability of error detecting reduces to 1
ā€“ (1/2)n-1 .
A burst error of length greater than n ā€“ 1, the probability of error detecting is 1 ā€“
(1/2) n.
3. Longitudinal Redundancy Check:
Longitudinal redundancy check is a bit by bit parity computation, as we calculate
the parity of each column individually.
This method can easily detect burst errors and single bit errors and it fails to detect
the 2 bit errors occurred in same vertical slice.
5. Check Sum:
The checksum method includes parity bits, check digits and longitudinal
redundancy check (LRC). For example, if we have to transfer and detect errors for
a long data sequence (also called as Data string) then we divide that into shorter
words and we can store the data with a word of same width. For each another
incoming bit we will add them to the already stored data. At every instance, the
newly added word is called ā€œChecksumā€.
Error Correcting Codes:
The codes which are used for error correction are called as ā€œError Correction
Codesā€.
Hamming code or Hamming Distance Code is the best error correcting code we
use in most of the communication network and digital systems.
Hamming Code:
This error detecting and correcting code technique is developed by
R.W.Hamming. This code not only identifies the error bit, in the whole data
sequence and it also corrects it. This code uses a number of parity bits located at
certain positions in the codeword. The number of parity bits depends upon the
number of information bits.
Example:
Encode the data 1101 in even parity, by using Hamming code.
Step 1
Calculate the required number of parity bits.
Let P = 2, then
2P = 22 = 4 and n + P + 1 = 4 + 2 + 1 = 7.
2 parity bits are not sufficient for 4 bit data.
So letā€™s try P = 3, then
2P = 23 = 8 and n + P + 1 = 4 + 3 + 1 = 8
Therefore 3 parity bits are sufficient for 4 bit data.
The total bits in the code word are 4 + 3 = 7
Step 2
Constructing bit location table
Step 3
Determine the parity bits.
For P1: 3, 5 and 7 bits are having three 1ā€™s so for even parity, P1 = 1.
For P2: 3, 6 and 7 bits are having two 1ā€™s so for even parity, P2 = 0.
For P3: 5, 6 and 7 bits are having two 1ā€™s so for even parity, P3 = 0.
By entering / inserting the parity bits at their respective positions, codeword can be
formed and is transmitted. It is 1100101.
If the codeword has all zeros (ex: 0000000), then there is no error in Hamming
code.
Assignment No 1
Name:
M.FaisalYaqoob
Class:
4th
semesterBE (EE) (B)
Cms ID:
1186-2017
Subject:
Computer CommunicationNetwork
Submitted to:
Engr.Uzma Majeed

More Related Content

What's hot

Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network LayerAhtesham Ullah khan
Ā 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy checkSaleh Alrkiyan
Ā 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network ShivangiTak1
Ā 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
Ā 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionCathryn Kuteesa
Ā 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
Ā 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageAnil Kumar Sonkar Sonkar
Ā 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communicationswatihalunde
Ā 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
Ā 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission mediaPANKAJ333
Ā 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error CorrectionAditi Singhal
Ā 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...ZerihunDemere
Ā 
Hamming code system
Hamming code systemHamming code system
Hamming code systemDILSHAD AHMAD
Ā 
Error control coding
Error control codingError control coding
Error control codingMohammad Bappy
Ā 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
Ā 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
Ā 

What's hot (20)

Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ā 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
Ā 
Lecture 21
Lecture 21Lecture 21
Lecture 21
Ā 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network
Ā 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Ā 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Ā 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Ā 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Ā 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
Ā 
New error-detection
New error-detectionNew error-detection
New error-detection
Ā 
Error detection and correction, flow and error control and trasmission media
Error detection and correction, flow and error control and  trasmission mediaError detection and correction, flow and error control and  trasmission media
Error detection and correction, flow and error control and trasmission media
Ā 
Sak
SakSak
Sak
Ā 
Lecture 20
Lecture 20Lecture 20
Lecture 20
Ā 
Burst Error Correction
Burst Error CorrectionBurst Error Correction
Burst Error Correction
Ā 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
Ā 
Hamming code system
Hamming code systemHamming code system
Hamming code system
Ā 
Error control coding
Error control codingError control coding
Error control coding
Ā 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
Ā 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Ā 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
Ā 

Similar to Error dectation and correction

07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
Ā 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codesGargiKhanna1
Ā 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & CorrectionRohan Bhatkar
Ā 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentationAhmedMuhumed2
Ā 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
Ā 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
Ā 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET Journal
Ā 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdfkenilpatel65
Ā 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
Ā 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdfssuser8b4eb21
Ā 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Paulo_Vangui
Ā 
Lecture 13
Lecture 13Lecture 13
Lecture 13Anwal Mirza
Ā 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentationHassan Hashmi
Ā 
Error detection.
Error detection.Error detection.
Error detection.Wasim Akbar
Ā 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
Ā 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codesRevathi Subramaniam
Ā 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.pptPawanRaj48
Ā 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptJayaprasanna4
Ā 

Similar to Error dectation and correction (20)

07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
Ā 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
Ā 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
Ā 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
Ā 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
Ā 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
Ā 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
Ā 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
Ā 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
Ā 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
Ā 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Ā 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Ā 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentation
Ā 
Error detection.
Error detection.Error detection.
Error detection.
Ā 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
Ā 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Ā 
Data link layer
Data link layerData link layer
Data link layer
Ā 
Class 10
Class 10Class 10
Class 10
Ā 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
Ā 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Ā 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
Ā 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
Ā 
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...vershagrag
Ā 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
Ā 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
Ā 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
Ā 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
Ā 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
Ā 
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...Call Girls Mumbai
Ā 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
Ā 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
Ā 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
Ā 
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...jabtakhaidam7
Ā 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Ā 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
Ā 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
Ā 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
Ā 

Recently uploaded (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Ā 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
Ā 
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
šŸ’šTrustworthy Call Girls Pune Call Girls Service Just Call šŸ‘šŸ‘„6378878445 šŸ‘šŸ‘„ Top...
Ā 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
Ā 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Ā 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Ā 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Ā 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
Ā 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Ā 
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
BhubaneswaršŸŒ¹Call Girls Bhubaneswar ā¤Komal 9777949614 šŸ’Ÿ Full Trusted CALL GIRL...
Ā 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
Ā 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Ā 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Ā 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
Ā 
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...
Jaipur ā¤CALL GIRL 0000000000ā¤CALL GIRLS IN Jaipur ESCORT SERVICEā¤CALL GIRL IN...
Ā 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Ā 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
Ā 
Call Girls in South Ex (delhi) call me [šŸ”9953056974šŸ”] escort service 24X7
Call Girls in South Ex (delhi) call me [šŸ”9953056974šŸ”] escort service 24X7Call Girls in South Ex (delhi) call me [šŸ”9953056974šŸ”] escort service 24X7
Call Girls in South Ex (delhi) call me [šŸ”9953056974šŸ”] escort service 24X7
Ā 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
Ā 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Ā 

Error dectation and correction

  • 1. Error Detection and Correction Error: The data can be corrupted during transmission (from source to receiver). It may be affected by external noise or some other physical imperfections. In this case, the input data is not same as the received output data. This mismatched data is called ā€œErrorā€. The data errors will cause loss of important / secured data. Even one bit of change in data may affect the whole systemā€™s performance. Generally the data transfer in digital systems will be in the form of ā€˜Bit ā€“ transferā€™. In this case, the data error is likely to be changed in positions of 0 and 1. Types of Error: In a data sequence, if 1 is changed to zero or 0 is changed to 1, it is called ā€œBit errorā€. There are generally 3 types of errors occur in data transmission from transmitter to receiver. They are ā€¢ Single bit errors ā€¢ Multiple bit errors ā€¢ Burst errors Single Bit Data Errors: The change in one bit in the whole data sequence is called ā€œSingle bit errorā€. Occurrence of single bit error is very rare in serial communication system. This type of error occurs only in parallel communication system, as data is transferred bit wise in single line, there is chance that single line to be noisy.
  • 2. Multiple Bit Data Errors: If there is change in two or more bits of data sequence of transmitter to receiver, it is called ā€œMultiple bit errorā€. This type of error occurs in both serial type and parallel type data communication networks. Burst Errors: The change of set of bits in data sequence is called ā€œBurst errorā€. The burst error is calculated in from the first bit change to last bit change.
  • 3. Error Detecting Codes: Error detection is the process ofdetecting the errors that are present in the data transmitted from transmitter to receiver, in a communication system. We use some redundancy codes to detect these errors, by adding to the data while it is transmitted from source(transmitter). These codes are called ā€œError detecting codesā€. Types of Error detection: 1. Parity Checking 2. Cyclic Redundancy Check (CRC) 3. Longitudinal Redundancy Check (LRC) 4. Check Sum 1. Parity Checking Parity bit means nothing but an additional bit added to the data at the transmitter before transmitting the data. Before adding the parity bit, number of 1ā€™s or zeros is calculated in the data. Based on this calculation of data an extra bit is added to the actual information / data. The addition of parity bit to the data will result in the change of data string size. This means if we have an 8 bit data, then after adding a parity bit to the data binary string it will become a 9 bit binary data string. There is two types of parity bits in error detection, they are ļ‚· Even parity ļ‚· Odd parity Even Parity: ļ‚· If the data has even number of 1ā€™s, the parity bit is 0. ļ‚· Data is 10000001 -> parity bit 0 ļ‚· Odd number of 1ā€™s, the parity bit is 1. ļ‚· Data is 10010001 -> parity bit 1 Odd Parity: ļ‚· If the data has odd number of 1ā€™s, the parity bit is 0. ļ‚· Data is 10011101 -> parity bit 0 ļ‚· Even number of 1ā€™s, the parity bit is 1. ļ‚· Data is 10010101 -> parity bit 1
  • 4. Messages with evenparity and odd parity 2. Cyclic Redundancy Check The codes used for cyclic redundancy check there by error detection are known as CRC codes (Cyclic redundancy check codes).Cyclic redundancy-check codes are shortened cyclic codes. These types of codes are used for error detection and encoding. They are easily implemented using shift-registers with feedback connections. That is why they are widely used for error detection on digital communication. CRC codes will provide effective and high level of protection. CRC Code Generation: Based on the desired number of bit checks, we will add some zeros (0) to the actual data. This new binary data sequence is divided by a new word of length n + 1, where n is the number of check bits to be added . The reminder obtained as a result of this modulo 2- division is added to the dividend bit sequence to form the cyclic code. The generated codeword is completely divisible by the divisor that is used in generation of code. This is transmitted through the transmitter.
  • 5. Example: At the receiver side, we divide the received codeword with the same divisor to get the actual codeword. For an error free reception of data, the reminder is 0. If the reminder is a non ā€“ zero, that means there is an error in the received code/ data sequence. The probability of error detection depends upon the number of check bits (n) used to constructthe cyclic code. Forsingle bit and two bit errors, the probability is 100 %. For a burst error of length n ā€“ 1, the probability of error detecting is 100 % . A burst error of length equal to n + 1, the probability of error detecting reduces to 1 ā€“ (1/2)n-1 . A burst error of length greater than n ā€“ 1, the probability of error detecting is 1 ā€“ (1/2) n. 3. Longitudinal Redundancy Check: Longitudinal redundancy check is a bit by bit parity computation, as we calculate the parity of each column individually. This method can easily detect burst errors and single bit errors and it fails to detect the 2 bit errors occurred in same vertical slice.
  • 6. 5. Check Sum: The checksum method includes parity bits, check digits and longitudinal redundancy check (LRC). For example, if we have to transfer and detect errors for a long data sequence (also called as Data string) then we divide that into shorter words and we can store the data with a word of same width. For each another incoming bit we will add them to the already stored data. At every instance, the newly added word is called ā€œChecksumā€. Error Correcting Codes: The codes which are used for error correction are called as ā€œError Correction Codesā€. Hamming code or Hamming Distance Code is the best error correcting code we use in most of the communication network and digital systems. Hamming Code: This error detecting and correcting code technique is developed by R.W.Hamming. This code not only identifies the error bit, in the whole data sequence and it also corrects it. This code uses a number of parity bits located at certain positions in the codeword. The number of parity bits depends upon the number of information bits.
  • 7. Example: Encode the data 1101 in even parity, by using Hamming code. Step 1 Calculate the required number of parity bits. Let P = 2, then 2P = 22 = 4 and n + P + 1 = 4 + 2 + 1 = 7. 2 parity bits are not sufficient for 4 bit data. So letā€™s try P = 3, then 2P = 23 = 8 and n + P + 1 = 4 + 3 + 1 = 8 Therefore 3 parity bits are sufficient for 4 bit data. The total bits in the code word are 4 + 3 = 7 Step 2 Constructing bit location table Step 3 Determine the parity bits. For P1: 3, 5 and 7 bits are having three 1ā€™s so for even parity, P1 = 1. For P2: 3, 6 and 7 bits are having two 1ā€™s so for even parity, P2 = 0. For P3: 5, 6 and 7 bits are having two 1ā€™s so for even parity, P3 = 0. By entering / inserting the parity bits at their respective positions, codeword can be formed and is transmitted. It is 1100101. If the codeword has all zeros (ex: 0000000), then there is no error in Hamming code.
  • 8. Assignment No 1 Name: M.FaisalYaqoob Class: 4th semesterBE (EE) (B) Cms ID: 1186-2017 Subject: Computer CommunicationNetwork Submitted to: Engr.Uzma Majeed