SlideShare a Scribd company logo
1 of 27
Ch-10
Data Link Layer:
Error Detection and Correction
- Asst. Prof. Meenakshi Paul
G. N. Khalsa College
Outline
10.1 INTRODUCTION
10.1.1 Types of Errors
10.1.2 Redundancy
10.1.3 Coding
10.2 BLOCK CODING
10.2.1 Error Detection
10.3 CYCLIC CODES
10.3.1 Cyclic Redundancy Check
10.3.2 Polynomials
10.3.3 Cyclic Code Encoder Using Polynomials
10.4 CHECKSUM
2
10.1 Data Link Layer
3
10.1.1 Types of Errors
• Single-bit errors
• Burst errors
4
10.1.2. Redundancy
• To detect or correct errors, redundant bits of data must
be added
5
10.1.3 Coding
• Process of adding redundancy for error detection or
correction
• Two types:
o Block codes
• Divides the data to be sent into a set of blocks
• Extra information attached to each block
o Convolutional codes
• Treats data as a series of bits, and computes a code over a
continuous series
• The code computed for a set of bits depends on the current and
previous input
6
10.2 Block Coding
• Message is divided into k-bit blocks
o Known as datawords
• r redundant bits are added
o Blocks become n=k+r bits
o Known as codewords (n)
7
10.2.1 Error Detection
8
Error Detection in Block Coding
10.2.1 Error Detection
• Example: Let us assume that k = 2 and n = 3.
• Table below shows the list of datawords and codewords
• Assume the sender encodes the dataword 01 as 011 and
sends it to the receiver.
o The receiver receives 011. It is a valid codeword. The receiver extracts the
dataword 01 from it.
o The codeword is corrupted during transmission, and 111 is received (the leftmost
bit is corrupted). This is not a valid codeword and is discarded.
9
A code for error detection
XOR Operation
• Main operation for computing error detection/correction
codes
• Similar to modulo-2 addition
10
10.2.1.1Hamming Distance
• Ex: Hamming distance d(10101,11110) is 3
• d(01, 00) = ?
• d(11, 00) = ?
• d(010, 100) = ?
• d(0011, 1000) = ?
• How many 8-bit words are n bits away from 10000111?
11
Hamming Distance between two words is the
number of differences between corresponding bits.
Common Detection Methods
• Parity check
• Cyclic Redundancy Check
• Checksum
12
10.2.2 Parity Check
• Most common, least complex
• Single bit is added to a block
• Two schemes:
o Even parity – Maintain even number of 1s
• E.g., 1011  10111
o Odd parity – Maintain odd number of 1s
• E.g., 1011  10110
13
Example: Parity Check
14
Suppose the sender wants to send the word world. In
ASCII the five characters are coded (with even parity) as
1110111 1101111 1110010 1101100 1100100
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
Example: Parity Check
15
Receiver receives this sequence of words:
11111110 11011110 11101100 11011000 11001001
Which blocks are accepted? Which are rejected? Apply
even parity.
10.2.2 Parity-Check: Encoding/Decoding
• Syndrome is result of 1 bit.
• The syndrome value can be 0 or 1.
• The syndrome is passed to the decision logic analyzer.
• If the syndrome is 0 then no error
• If the syndrome is 1 then error
16
Performance of Parity Check
• Can 1-bit errors be detected?
• Can 2-bit errors be detected?
• :
17
10.3 CYCLIC CODES
• Cyclic codes are special linear block codes with one
extra property.
• In a cyclic code, if a codeword is cyclically shifted
(rotated), the result is another codeword.
• For example, if 1011000 is a codeword and we cyclically
left-shift, then 0110001 is also a codeword.
18
10.3.1 Cyclic Redundancy Check
• A subset of cyclic codes called the cyclic redundancy
check (CRC),
• Used in networks such as LANs and WANs.
• Example:
19
10.3.1 CRC Encoder/Decoder
20
CRC Generator
21
CRC with an error
22
10.3.2 Polynomial Representation
• More common representation than binary form
• Easy to analyze
• Divisor is commonly called generator polynomial
23
10.3.3 Cyclic Code Encoder Using Polynomials
24
10.4 CHECKSUM
 Checksum is the error detection technique.
 The data is divided into k segments each of m bits.
 Sender:
Step 1: Segments are added using 1’s complement arithmetic to get the sum.
Step 2: The sum is complemented to get the checksum.
Step 3: The checksum segment is sent along with the data segments
 Receiver:
Step 1: Segments are added using 1’s complement arithmetic to get sum.
Step 2: The sum is complemented.
Step 3: If the result is zero, the received data is accepted; otherwise discarded
 The checksum detects all errors involving an odd number of bits.
 It also detects most errors involving even number of bits.
25
10.4.1 CHECKSUM
26
Example
27

More Related Content

What's hot

Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)Karam Munir Butt
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layersumit gyawali
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layerPREMAL GAJJAR
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 

What's hot (20)

Ip addressing
Ip addressingIp addressing
Ip addressing
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Session Layer
Session LayerSession Layer
Session Layer
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Error correction, ARQ, FEC
Error correction, ARQ, FECError correction, ARQ, FEC
Error correction, ARQ, FEC
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
Transport layer
Transport layer Transport layer
Transport layer
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 

Similar to Data Link Layer Error Detection and Correction Techniques

New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.pptAnnymus
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxMahabubAlam97
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.pptDrPreethiD1
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.pptKashfUlHuda1
 
error detection correction
error detection correctionerror detection correction
error detection correctionBishalWosti1
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptxbotAlert
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2ISMT College
 

Similar to Data Link Layer Error Detection and Correction Techniques (20)

New error-detection
New error-detectionNew error-detection
New error-detection
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
 
Error control 20
Error control 20Error control 20
Error control 20
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
 
error detection correction
error detection correctionerror detection correction
error detection correction
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Ch10
Ch10Ch10
Ch10
 

More from Meenakshi Paul

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial IntelligencesMeenakshi Paul
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless NetworksMeenakshi Paul
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business ResearchMeenakshi Paul
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmissionMeenakshi Paul
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmissionMeenakshi Paul
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layerMeenakshi Paul
 

More from Meenakshi Paul (20)

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial Intelligences
 
Binary Arithmetic
Binary ArithmeticBinary Arithmetic
Binary Arithmetic
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless Networks
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Codes
CodesCodes
Codes
 
Number System
Number SystemNumber System
Number System
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Switching
SwitchingSwitching
Switching
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
IP classes
IP classesIP classes
IP classes
 
Theory building
Theory buildingTheory building
Theory building
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business Research
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layer
 
02 network models
02  network models02  network models
02 network models
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Data Link Layer Error Detection and Correction Techniques

  • 1. Ch-10 Data Link Layer: Error Detection and Correction - Asst. Prof. Meenakshi Paul G. N. Khalsa College
  • 2. Outline 10.1 INTRODUCTION 10.1.1 Types of Errors 10.1.2 Redundancy 10.1.3 Coding 10.2 BLOCK CODING 10.2.1 Error Detection 10.3 CYCLIC CODES 10.3.1 Cyclic Redundancy Check 10.3.2 Polynomials 10.3.3 Cyclic Code Encoder Using Polynomials 10.4 CHECKSUM 2
  • 3. 10.1 Data Link Layer 3
  • 4. 10.1.1 Types of Errors • Single-bit errors • Burst errors 4
  • 5. 10.1.2. Redundancy • To detect or correct errors, redundant bits of data must be added 5
  • 6. 10.1.3 Coding • Process of adding redundancy for error detection or correction • Two types: o Block codes • Divides the data to be sent into a set of blocks • Extra information attached to each block o Convolutional codes • Treats data as a series of bits, and computes a code over a continuous series • The code computed for a set of bits depends on the current and previous input 6
  • 7. 10.2 Block Coding • Message is divided into k-bit blocks o Known as datawords • r redundant bits are added o Blocks become n=k+r bits o Known as codewords (n) 7
  • 8. 10.2.1 Error Detection 8 Error Detection in Block Coding
  • 9. 10.2.1 Error Detection • Example: Let us assume that k = 2 and n = 3. • Table below shows the list of datawords and codewords • Assume the sender encodes the dataword 01 as 011 and sends it to the receiver. o The receiver receives 011. It is a valid codeword. The receiver extracts the dataword 01 from it. o The codeword is corrupted during transmission, and 111 is received (the leftmost bit is corrupted). This is not a valid codeword and is discarded. 9 A code for error detection
  • 10. XOR Operation • Main operation for computing error detection/correction codes • Similar to modulo-2 addition 10
  • 11. 10.2.1.1Hamming Distance • Ex: Hamming distance d(10101,11110) is 3 • d(01, 00) = ? • d(11, 00) = ? • d(010, 100) = ? • d(0011, 1000) = ? • How many 8-bit words are n bits away from 10000111? 11 Hamming Distance between two words is the number of differences between corresponding bits.
  • 12. Common Detection Methods • Parity check • Cyclic Redundancy Check • Checksum 12
  • 13. 10.2.2 Parity Check • Most common, least complex • Single bit is added to a block • Two schemes: o Even parity – Maintain even number of 1s • E.g., 1011  10111 o Odd parity – Maintain odd number of 1s • E.g., 1011  10110 13
  • 14. Example: Parity Check 14 Suppose the sender wants to send the word world. In ASCII the five characters are coded (with even parity) as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001
  • 15. Example: Parity Check 15 Receiver receives this sequence of words: 11111110 11011110 11101100 11011000 11001001 Which blocks are accepted? Which are rejected? Apply even parity.
  • 16. 10.2.2 Parity-Check: Encoding/Decoding • Syndrome is result of 1 bit. • The syndrome value can be 0 or 1. • The syndrome is passed to the decision logic analyzer. • If the syndrome is 0 then no error • If the syndrome is 1 then error 16
  • 17. Performance of Parity Check • Can 1-bit errors be detected? • Can 2-bit errors be detected? • : 17
  • 18. 10.3 CYCLIC CODES • Cyclic codes are special linear block codes with one extra property. • In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword. • For example, if 1011000 is a codeword and we cyclically left-shift, then 0110001 is also a codeword. 18
  • 19. 10.3.1 Cyclic Redundancy Check • A subset of cyclic codes called the cyclic redundancy check (CRC), • Used in networks such as LANs and WANs. • Example: 19
  • 22. CRC with an error 22
  • 23. 10.3.2 Polynomial Representation • More common representation than binary form • Easy to analyze • Divisor is commonly called generator polynomial 23
  • 24. 10.3.3 Cyclic Code Encoder Using Polynomials 24
  • 25. 10.4 CHECKSUM  Checksum is the error detection technique.  The data is divided into k segments each of m bits.  Sender: Step 1: Segments are added using 1’s complement arithmetic to get the sum. Step 2: The sum is complemented to get the checksum. Step 3: The checksum segment is sent along with the data segments  Receiver: Step 1: Segments are added using 1’s complement arithmetic to get sum. Step 2: The sum is complemented. Step 3: If the result is zero, the received data is accepted; otherwise discarded  The checksum detects all errors involving an odd number of bits.  It also detects most errors involving even number of bits. 25