SlideShare a Scribd company logo
1 of 22
University of Dhaka
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING,
1Data And Telecommunications
Presentation on:
CHAPTER 10 (ERROR DETECTION AND CORRECTION)
By: Md. Al – Zihad
Roll: 35
CSEDU 20th Batch
To: Professor Dr. Md. Abdur Razzaque
CSEDU
University of Dhaka
Contents
6/7/2016
2
• General Discussion of CRC
• Figure out the problems assigned
• Developing a perfect solution for each of them
Cyclic Redundancy Check (CRC)
 Error detection mechanism
 Simple to implement in binary hardware
 Calculated by performing a modulo 2 division of the data by a generator
polynomial and recording the remainder after division.
6/7/2016
3
Problem 27
27. Referring to the CRC-8 polynomial in Table 10.7, answer the following
questions:
 a. Does it detect a single error? Defend your answer.
 b. Does it detect a burst error of size 6? Defend your answer.
 c. What is the probability of detecting a burst error of size 9?
 d. What is the probability of detecting a burst error of size 15?
6/7/2016
4
Resources
6/7/2016
5
Problem 28
28. Referring to the CRC-32 polynomial in Table 10.7, answer the following
questions:
 a. Does it detect a single error? Defend your answer.
 b. Does it detect a burst error of size 16? Defend your answer.
 c. What is the probability of detecting a burst error of size 33?
 d. What is the probability of detecting a burst error of size 55?
6/7/2016
6
Detecting Single Bit Error
6/7/2016
7
Lets Assume,
Dataword = d(x)
Codeword = c(x)
Error = e(x)
So,
Received Codeword = c(x)+e(x)
Generator = g(x)
Detecting Single Bit Error Cont…
6/7/2016
8
• If a single-bit error is caught, then xi is not divisible by g(x).
• If the generator has more than one term and the coefficient of x0 is 1, all single errors
can be caught
Detecting Single Bit Error Cont…
6/7/2016
9
Both In,
The generator has more than one term and the coefficient of x0 is
1, all single errors can be caught
and
Detecting Burst Error
6/7/2016
10
e(x) = (x^j + . . . + x^i)
Or,
e(x) = x^i (x^ (j-i) + . . . + 1)
If our generator can detect a single error (minimum condition for a
generator), then it cannot divide xi.
Detecting Burst Error Cont…
6/7/2016
11
So our concern is:
(x^ (j-i) + . . . + 1) / ( x^r + . . . +1)
If the division has non zero remainder, error can be detected
Detecting Burst Error Cont…
6/7/2016
12
• If j - i < r, the remainder can never be zero.
• all burst errors with length smaller than or equal to the number
of check bits r will be detected.
Detecting Burst Error Cont…
6/7/2016
13
Here in problem 27(b),
• This is a 8 degree polynomial.
• Number of check bit is 8
So, it will obviously detect burst error size of 6 as 6 < 8
Detecting Burst Error Cont…
6/7/2016
14
Here in problem 27(b),
• This is a 32 degree polynomial.
• Number of check bit is 32
So, it will obviously detect burst error size of 16 as 16 < 32
Probability of missing detection of Burst error
6/7/2016
15
• If, j - i = r
• Then, L – 1 = r
• So, L = r + 1
Here,
r is polynomial size
L is for burst error size
In this case, Probability = (1/2)^(r-1)
Detecting Burst Error Cont…
6/7/2016
16
Here in problem 27(c),
So, L = r + 1
So, it will miss to detect (1/2)^(8-1) burst errors.
• r = 8
• L = 9
Probability of detecting burst error of size 9 = 1 – (1/2)^7.
Detecting Burst Error Cont…
6/7/2016
17
Here in problem 28(c),
So, L = r + 1
So, it will miss to detect (1/2)^(32-1) burst errors.
• r = 32
• L = 33
Probability of detecting burst error of size 33 = 1 – (1/2)^31.
Probability of missing detection of Burst error
6/7/2016
18
• If, j - i > r
• Then, L – 1 > r
• So, L > r + 1
Here,
r is polynomial size
L is for burst error size
In this case, Probability = (1/2)^(r)
Detecting Burst Error Cont…
6/7/2016
19
Here in problem 27(d),
So, L > r + 1
So, it will miss to detect (1/2)^(8) burst errors.
• r = 8
• L = 15
Probability of detecting burst error of size 15 = 1 – (1/2)^8.
Detecting Burst Error Cont…
6/7/2016
20
Here in problem 28(c),
So, L > r + 1
So, it will miss to detect (1/2)^(32) burst errors.
• r = 32
• L = 55
Probability of detecting burst error of size 33 = 1 – (1/2)^32.
Lesson Learned
6/7/2016
21
• All g(x) having multiple terms and X0 = 1, all single bit error will be detected
• All burst errors with L < = r will be detected.
• All burst errors with L = r + 1 will be detected with probability 1 - (1/2)^(r-1)
• All burst errors with L > r + 1 will be detected with probability 1- (1/2)^r
6/7/2016
22
Thanks
Any Questions?

More Related Content

What's hot

IIT JEE 2010 Solution Paper 2 English
IIT JEE 2010 Solution Paper 2 EnglishIIT JEE 2010 Solution Paper 2 English
IIT JEE 2010 Solution Paper 2 EnglishResonance
 
Clock divider by 3
Clock divider by 3Clock divider by 3
Clock divider by 3Ashok Reddy
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer NumericalsManisha Keim
 
Digital system design lab manual
Digital system design lab manualDigital system design lab manual
Digital system design lab manualSanthosh Poralu
 
Jee 2009 Paper 2
Jee 2009 Paper 2Jee 2009 Paper 2
Jee 2009 Paper 2Resonance
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clockMantra VLSI
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and CorrectionTechiNerd
 
Top 10 verification engineer interview questions and answers
Top 10 verification engineer interview questions and answersTop 10 verification engineer interview questions and answers
Top 10 verification engineer interview questions and answerstonychoper2706
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
Design and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogDesign and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogSTEPHEN MOIRANGTHEM
 
number system full discription in bangla
number system full discription in banglanumber system full discription in bangla
number system full discription in banglaarnab73
 
Explain Half Adder and Full Adder with Truth Table
Explain Half Adder and Full Adder with Truth TableExplain Half Adder and Full Adder with Truth Table
Explain Half Adder and Full Adder with Truth Tableelprocus
 
8051-mazidi-solution
8051-mazidi-solution8051-mazidi-solution
8051-mazidi-solutionZunAib Ali
 

What's hot (20)

Digital Logic circuit
Digital Logic circuitDigital Logic circuit
Digital Logic circuit
 
IIT JEE 2010 Solution Paper 2 English
IIT JEE 2010 Solution Paper 2 EnglishIIT JEE 2010 Solution Paper 2 English
IIT JEE 2010 Solution Paper 2 English
 
Clock divider by 3
Clock divider by 3Clock divider by 3
Clock divider by 3
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
Digital system design lab manual
Digital system design lab manualDigital system design lab manual
Digital system design lab manual
 
Jee 2009 Paper 2
Jee 2009 Paper 2Jee 2009 Paper 2
Jee 2009 Paper 2
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clock
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Digital Logic Design
Digital Logic DesignDigital Logic Design
Digital Logic Design
 
Top 10 verification engineer interview questions and answers
Top 10 verification engineer interview questions and answersTop 10 verification engineer interview questions and answers
Top 10 verification engineer interview questions and answers
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Design and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilogDesign and implementation of 32 bit alu using verilog
Design and implementation of 32 bit alu using verilog
 
About ip address
About ip addressAbout ip address
About ip address
 
Layouts
LayoutsLayouts
Layouts
 
Sequential circuits
Sequential circuitsSequential circuits
Sequential circuits
 
Combinational Logic Circuits
Combinational Logic CircuitsCombinational Logic Circuits
Combinational Logic Circuits
 
number system full discription in bangla
number system full discription in banglanumber system full discription in bangla
number system full discription in bangla
 
Explain Half Adder and Full Adder with Truth Table
Explain Half Adder and Full Adder with Truth TableExplain Half Adder and Full Adder with Truth Table
Explain Half Adder and Full Adder with Truth Table
 
8051-mazidi-solution
8051-mazidi-solution8051-mazidi-solution
8051-mazidi-solution
 
Question bank digital electronics
Question bank digital electronicsQuestion bank digital electronics
Question bank digital electronics
 

Viewers also liked

Viewers also liked (12)

PATIAG ANGELA_CV
PATIAG ANGELA_CVPATIAG ANGELA_CV
PATIAG ANGELA_CV
 
фирле война на балтийском море
фирле война на балтийском морефирле война на балтийском море
фирле война на балтийском море
 
Daftar isi
Daftar isiDaftar isi
Daftar isi
 
C++ Language Training Institute, Ghaziabad
C++ Language Training Institute, GhaziabadC++ Language Training Institute, Ghaziabad
C++ Language Training Institute, Ghaziabad
 
civillabs
civillabscivillabs
civillabs
 
Microcontroller
MicrocontrollerMicrocontroller
Microcontroller
 
Asean community mkp
Asean community  mkpAsean community  mkp
Asean community mkp
 
англія
англіяанглія
англія
 
RAZAK RESUME 2016
RAZAK RESUME 2016RAZAK RESUME 2016
RAZAK RESUME 2016
 
веверн б. в.6-я батарея. 1914-1917 том 2
веверн б. в.6-я батарея. 1914-1917 том 2веверн б. в.6-я батарея. 1914-1917 том 2
веверн б. в.6-я батарея. 1914-1917 том 2
 
Bao tri he thong truyen dong dien
Bao tri he thong truyen dong dienBao tri he thong truyen dong dien
Bao tri he thong truyen dong dien
 
Степной. белые рабы воспоминания_о_французском_фронте
Степной. белые рабы воспоминания_о_французском_фронтеСтепной. белые рабы воспоминания_о_французском_фронте
Степной. белые рабы воспоминания_о_французском_фронте
 

Similar to Data and Telecommunication Problem

Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsEellekwameowusu
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 
Data_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.pptData_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.pptISHANAMRITSRIVASTAVA
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...IRJET Journal
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionLionel Briand
 
2014-mo444-final-project
2014-mo444-final-project2014-mo444-final-project
2014-mo444-final-projectPaulo Faria
 
A practical work of matlab
A practical work of matlabA practical work of matlab
A practical work of matlabSalanSD
 
Certified global minima
Certified global minimaCertified global minima
Certified global minimassuserfa7e73
 
Probability and Stochastic Processes A Friendly Introduction for Electrical a...
Probability and Stochastic Processes A Friendly Introduction for Electrical a...Probability and Stochastic Processes A Friendly Introduction for Electrical a...
Probability and Stochastic Processes A Friendly Introduction for Electrical a...KionaHood
 
A hybrid sine cosine optimization algorithm for solving global optimization p...
A hybrid sine cosine optimization algorithm for solving global optimization p...A hybrid sine cosine optimization algorithm for solving global optimization p...
A hybrid sine cosine optimization algorithm for solving global optimization p...Aboul Ella Hassanien
 
Applied Business Statistics ,ken black , ch 5
Applied Business Statistics ,ken black , ch 5Applied Business Statistics ,ken black , ch 5
Applied Business Statistics ,ken black , ch 5AbdelmonsifFadl
 
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...Hao Jin
 
Andrew_Hair_Assignment_3
Andrew_Hair_Assignment_3Andrew_Hair_Assignment_3
Andrew_Hair_Assignment_3Andrew Hair
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7Sai Kumar
 
Mrongraphs acm-sig-2 (1)
Mrongraphs acm-sig-2 (1)Mrongraphs acm-sig-2 (1)
Mrongraphs acm-sig-2 (1)Nima Sarshar
 

Similar to Data and Telecommunication Problem (20)

Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithms
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
Data_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.pptData_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.ppt
 
Hamlet_Khachatryan_57--61
Hamlet_Khachatryan_57--61Hamlet_Khachatryan_57--61
Hamlet_Khachatryan_57--61
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
 
1
11
1
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
 
2014-mo444-final-project
2014-mo444-final-project2014-mo444-final-project
2014-mo444-final-project
 
A practical work of matlab
A practical work of matlabA practical work of matlab
A practical work of matlab
 
Certified global minima
Certified global minimaCertified global minima
Certified global minima
 
Probability and Stochastic Processes A Friendly Introduction for Electrical a...
Probability and Stochastic Processes A Friendly Introduction for Electrical a...Probability and Stochastic Processes A Friendly Introduction for Electrical a...
Probability and Stochastic Processes A Friendly Introduction for Electrical a...
 
A hybrid sine cosine optimization algorithm for solving global optimization p...
A hybrid sine cosine optimization algorithm for solving global optimization p...A hybrid sine cosine optimization algorithm for solving global optimization p...
A hybrid sine cosine optimization algorithm for solving global optimization p...
 
Applied Business Statistics ,ken black , ch 5
Applied Business Statistics ,ken black , ch 5Applied Business Statistics ,ken black , ch 5
Applied Business Statistics ,ken black , ch 5
 
NA 2.ppt
NA 2.pptNA 2.ppt
NA 2.ppt
 
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...
(SAC2020 SVT-2) Constrained Detecting Arrays for Fault Localization in Combin...
 
Andrew_Hair_Assignment_3
Andrew_Hair_Assignment_3Andrew_Hair_Assignment_3
Andrew_Hair_Assignment_3
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
xldb-2015
xldb-2015xldb-2015
xldb-2015
 
4366 chapter7
4366 chapter74366 chapter7
4366 chapter7
 
Mrongraphs acm-sig-2 (1)
Mrongraphs acm-sig-2 (1)Mrongraphs acm-sig-2 (1)
Mrongraphs acm-sig-2 (1)
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Data and Telecommunication Problem

  • 1. University of Dhaka DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, 1Data And Telecommunications Presentation on: CHAPTER 10 (ERROR DETECTION AND CORRECTION) By: Md. Al – Zihad Roll: 35 CSEDU 20th Batch To: Professor Dr. Md. Abdur Razzaque CSEDU University of Dhaka
  • 2. Contents 6/7/2016 2 • General Discussion of CRC • Figure out the problems assigned • Developing a perfect solution for each of them
  • 3. Cyclic Redundancy Check (CRC)  Error detection mechanism  Simple to implement in binary hardware  Calculated by performing a modulo 2 division of the data by a generator polynomial and recording the remainder after division. 6/7/2016 3
  • 4. Problem 27 27. Referring to the CRC-8 polynomial in Table 10.7, answer the following questions:  a. Does it detect a single error? Defend your answer.  b. Does it detect a burst error of size 6? Defend your answer.  c. What is the probability of detecting a burst error of size 9?  d. What is the probability of detecting a burst error of size 15? 6/7/2016 4
  • 6. Problem 28 28. Referring to the CRC-32 polynomial in Table 10.7, answer the following questions:  a. Does it detect a single error? Defend your answer.  b. Does it detect a burst error of size 16? Defend your answer.  c. What is the probability of detecting a burst error of size 33?  d. What is the probability of detecting a burst error of size 55? 6/7/2016 6
  • 7. Detecting Single Bit Error 6/7/2016 7 Lets Assume, Dataword = d(x) Codeword = c(x) Error = e(x) So, Received Codeword = c(x)+e(x) Generator = g(x)
  • 8. Detecting Single Bit Error Cont… 6/7/2016 8 • If a single-bit error is caught, then xi is not divisible by g(x). • If the generator has more than one term and the coefficient of x0 is 1, all single errors can be caught
  • 9. Detecting Single Bit Error Cont… 6/7/2016 9 Both In, The generator has more than one term and the coefficient of x0 is 1, all single errors can be caught and
  • 10. Detecting Burst Error 6/7/2016 10 e(x) = (x^j + . . . + x^i) Or, e(x) = x^i (x^ (j-i) + . . . + 1) If our generator can detect a single error (minimum condition for a generator), then it cannot divide xi.
  • 11. Detecting Burst Error Cont… 6/7/2016 11 So our concern is: (x^ (j-i) + . . . + 1) / ( x^r + . . . +1) If the division has non zero remainder, error can be detected
  • 12. Detecting Burst Error Cont… 6/7/2016 12 • If j - i < r, the remainder can never be zero. • all burst errors with length smaller than or equal to the number of check bits r will be detected.
  • 13. Detecting Burst Error Cont… 6/7/2016 13 Here in problem 27(b), • This is a 8 degree polynomial. • Number of check bit is 8 So, it will obviously detect burst error size of 6 as 6 < 8
  • 14. Detecting Burst Error Cont… 6/7/2016 14 Here in problem 27(b), • This is a 32 degree polynomial. • Number of check bit is 32 So, it will obviously detect burst error size of 16 as 16 < 32
  • 15. Probability of missing detection of Burst error 6/7/2016 15 • If, j - i = r • Then, L – 1 = r • So, L = r + 1 Here, r is polynomial size L is for burst error size In this case, Probability = (1/2)^(r-1)
  • 16. Detecting Burst Error Cont… 6/7/2016 16 Here in problem 27(c), So, L = r + 1 So, it will miss to detect (1/2)^(8-1) burst errors. • r = 8 • L = 9 Probability of detecting burst error of size 9 = 1 – (1/2)^7.
  • 17. Detecting Burst Error Cont… 6/7/2016 17 Here in problem 28(c), So, L = r + 1 So, it will miss to detect (1/2)^(32-1) burst errors. • r = 32 • L = 33 Probability of detecting burst error of size 33 = 1 – (1/2)^31.
  • 18. Probability of missing detection of Burst error 6/7/2016 18 • If, j - i > r • Then, L – 1 > r • So, L > r + 1 Here, r is polynomial size L is for burst error size In this case, Probability = (1/2)^(r)
  • 19. Detecting Burst Error Cont… 6/7/2016 19 Here in problem 27(d), So, L > r + 1 So, it will miss to detect (1/2)^(8) burst errors. • r = 8 • L = 15 Probability of detecting burst error of size 15 = 1 – (1/2)^8.
  • 20. Detecting Burst Error Cont… 6/7/2016 20 Here in problem 28(c), So, L > r + 1 So, it will miss to detect (1/2)^(32) burst errors. • r = 32 • L = 55 Probability of detecting burst error of size 33 = 1 – (1/2)^32.
  • 21. Lesson Learned 6/7/2016 21 • All g(x) having multiple terms and X0 = 1, all single bit error will be detected • All burst errors with L < = r will be detected. • All burst errors with L = r + 1 will be detected with probability 1 - (1/2)^(r-1) • All burst errors with L > r + 1 will be detected with probability 1- (1/2)^r