SlideShare a Scribd company logo
10.1
Chapter 10
Error Detection
and
Correction
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.2
Data can be corrupted
during transmission.
Some applications require that
errors be detected and corrected.
Note
10.3
10-1 INTRODUCTION10-1 INTRODUCTION
Let us first discuss some issues related, directly orLet us first discuss some issues related, directly or
indirectly, to error detection and correction.indirectly, to error detection and correction.
Types of Errors
Redundancy
Detection Versus Correction
Forward Error Correction Versus Retransmission
Coding
Modular Arithmetic
Topics discussed in this section:Topics discussed in this section:
10.4
In a single-bit error, only 1 bit in the data
unit has changed.
Note
10.5
Figure 10.1 Single-bit error
10.6
A burst error means that 2 or more bits
in the data unit have changed.
Note
10.7
Figure 10.2 Burst error of length 8
10.8
To detect or correct errors, we need to
send extra (redundant) bits with data.
Note
10.9
Figure 10.3 The structure of encoder and decoder
10.10
In this book, we concentrate on block
codes; we leave convolution codes
to advanced texts.
Note
10.11
In modulo-N arithmetic, we use only the
integers in the range 0 to N −1,
inclusive.
Note
10.12
Figure 10.4 XORing of two single bits or two words
10.13
10-2 BLOCK CODING10-2 BLOCK CODING
In block coding, we divide our message into blocks,In block coding, we divide our message into blocks,
each of k bits, calledeach of k bits, called datawordsdatawords. We add r redundant. We add r redundant
bits to each block to make the length n = k + r. Thebits to each block to make the length n = k + r. The
resulting n-bit blocks are calledresulting n-bit blocks are called codewordscodewords..
Error Detection
Error Correction
Hamming Distance
Minimum Hamming Distance
Topics discussed in this section:Topics discussed in this section:
10.14
Figure 10.5 Datawords and codewords in block coding
10.15
The 4B/5B block coding discussed in Chapter 4 is a good
example of this type of coding. In this coding scheme,
k = 4 and n = 5. As we saw, we have 2k
= 16 datawords
and 2n
= 32 codewords. We saw that 16 out of 32
codewords are used for message transfer and the rest are
either used for other purposes or unused.
Example 10.1
10.16
Error Detection
 Enough redundancy is added to detect
an error.
 The receiver knows an error occurred
but does not know which bit(s) is(are) in
error.
 Has less overhead than error
correction.
10.17
Figure 10.6 Process of error detection in block coding
10.18
Let us assume that k = 2 and n = 3. Table 10.1 shows the
list of datawords and codewords. Later, we will see
how to derive a codeword from a dataword.
Assume the sender encodes the dataword 01 as 011 and
sends it to the receiver. Consider the following cases:
1. The receiver receives 011. It is a valid codeword. The
receiver extracts the dataword 01 from it.
Example 10.2
10.19
2. The codeword is corrupted during transmission, and
111 is received. This is not a valid codeword and is
discarded.
3. The codeword is corrupted during transmission, and
000 is received. This is a valid codeword. The receiver
incorrectly extracts the dataword 00. Two corrupted
bits have made the error undetectable.
Example 10.2 (continued)
10.20
Table 10.1 A code for error detection (Example 10.2)
10.21
An error-detecting code can detect
only the types of errors for which it is
designed; other types of errors may
remain undetected.
Note
10.22
Figure 10.7 Structure of encoder and decoder in error correction
10.23
Let us add more redundant bits to Example 10.2 to see if
the receiver can correct an error without knowing what
was actually sent. We add 3 redundant bits to the 2-bit
dataword to make 5-bit codewords. Table 10.2 shows the
datawords and codewords. Assume the dataword is 01.
The sender creates the codeword 01011. The codeword is
corrupted during transmission, and 01001 is received.
First, the receiver finds that the received codeword is not
in the table. This means an error has occurred. The
receiver, assuming that there is only 1 bit corrupted, uses
the following strategy to guess the correct dataword.
Example 10.3
10.24
1. Comparing the received codeword with the first
codeword in the table (01001 versus 00000), the
receiver decides that the first codeword is not the one
that was sent because there are two different bits.
2. By the same reasoning, the original codeword cannot
be the third or fourth one in the table.
3. The original codeword must be the second one in the
table because this is the only one that differs from the
received codeword by 1 bit. The receiver replaces
01001 with 01011 and consults the table to find the
dataword 01.
Example 10.3 (continued)
10.25
Table 10.2 A code for error correction (Example 10.3)

More Related Content

What's hot

Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
Venkata Sreeram
 
Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
selvakumar_b1985
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
Simplilearn
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
R Islam
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
Chap24
Chap24Chap24
Chap24
Waqas !!!!
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
HayderThary
 
Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
guesta1b35273
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
DHIVYADEVAKI
 

What's hot (20)

Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Error control
Error controlError control
Error control
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Network software
Network softwareNetwork software
Network software
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Chap24
Chap24Chap24
Chap24
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
 

Similar to Data Communication And Networking - ERROR DETECTION AND CORRECTION

Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
KashfUlHuda1
 
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
QUT (Queensland University of Technology)
 
Ch10
Ch10Ch10
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Faisal Mehmood
 
Ch10
Ch10Ch10
Ch10
Ch10Ch10
Ch10
Lia Nakid
 
error detection correction
error detection correctionerror detection correction
error detection correction
BishalWosti1
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
SumantaDey20
 
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and CorrectionSYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
Arti Parab Academics
 
Ch10
Ch10Ch10
DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
Bilal Munir Mughal
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
SibiSanta
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
MahabubAlam97
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
MarckyCaones
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
prashant513130
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
IKhait
 

Similar to Data Communication And Networking - ERROR DETECTION AND CORRECTION (20)

Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
 
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
 
Ch10
Ch10Ch10
Ch10
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Ch10
Ch10Ch10
Ch10
 
Ch10
Ch10Ch10
Ch10
 
error detection correction
error detection correctionerror detection correction
error detection correction
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
 
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and CorrectionSYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
 
Ch10
Ch10Ch10
Ch10
 
DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
 

More from Avijeet Negel

TCP/IP
TCP/IPTCP/IP
Upper OSI LAYER
Upper OSI LAYERUpper OSI LAYER
Upper OSI LAYER
Avijeet Negel
 
SONET/SDH
SONET/SDHSONET/SDH
SONET/SDH
Avijeet Negel
 
ATM
ATMATM
Frame Relay
Frame RelayFrame Relay
Frame Relay
Avijeet Negel
 
X.25
X.25X.25
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)
Avijeet Negel
 
Switching
SwitchingSwitching
Switching
Avijeet Negel
 
Point to Point Protocol
Point to Point ProtocolPoint to Point Protocol
Point to Point Protocol
Avijeet Negel
 
Networking and Networking Devices
Networking and Networking DevicesNetworking and Networking Devices
Networking and Networking Devices
Avijeet Negel
 
DATA Link Control
DATA Link ControlDATA Link Control
DATA Link Control
Avijeet Negel
 
CRC
CRCCRC
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
Avijeet Negel
 
Telephone Network
Telephone NetworkTelephone Network
Telephone Network
Avijeet Negel
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
Avijeet Negel
 
MULTIPLEXING
MULTIPLEXINGMULTIPLEXING
MULTIPLEXING
Avijeet Negel
 
Radio Communication Band
Radio Communication BandRadio Communication Band
Radio Communication Band
Avijeet Negel
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
Avijeet Negel
 
DB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORSDB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORS
Avijeet Negel
 
Transmission Of Digital Data
Transmission Of Digital DataTransmission Of Digital Data
Transmission Of Digital Data
Avijeet Negel
 

More from Avijeet Negel (20)

TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Upper OSI LAYER
Upper OSI LAYERUpper OSI LAYER
Upper OSI LAYER
 
SONET/SDH
SONET/SDHSONET/SDH
SONET/SDH
 
ATM
ATMATM
ATM
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
X.25
X.25X.25
X.25
 
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)
 
Switching
SwitchingSwitching
Switching
 
Point to Point Protocol
Point to Point ProtocolPoint to Point Protocol
Point to Point Protocol
 
Networking and Networking Devices
Networking and Networking DevicesNetworking and Networking Devices
Networking and Networking Devices
 
DATA Link Control
DATA Link ControlDATA Link Control
DATA Link Control
 
CRC
CRCCRC
CRC
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Telephone Network
Telephone NetworkTelephone Network
Telephone Network
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
 
MULTIPLEXING
MULTIPLEXINGMULTIPLEXING
MULTIPLEXING
 
Radio Communication Band
Radio Communication BandRadio Communication Band
Radio Communication Band
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
DB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORSDB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORS
 
Transmission Of Digital Data
Transmission Of Digital DataTransmission Of Digital Data
Transmission Of Digital Data
 

Recently uploaded

Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 

Recently uploaded (20)

Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 

Data Communication And Networking - ERROR DETECTION AND CORRECTION

  • 1. 10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 10.2 Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Note
  • 3. 10.3 10-1 INTRODUCTION10-1 INTRODUCTION Let us first discuss some issues related, directly orLet us first discuss some issues related, directly or indirectly, to error detection and correction.indirectly, to error detection and correction. Types of Errors Redundancy Detection Versus Correction Forward Error Correction Versus Retransmission Coding Modular Arithmetic Topics discussed in this section:Topics discussed in this section:
  • 4. 10.4 In a single-bit error, only 1 bit in the data unit has changed. Note
  • 6. 10.6 A burst error means that 2 or more bits in the data unit have changed. Note
  • 7. 10.7 Figure 10.2 Burst error of length 8
  • 8. 10.8 To detect or correct errors, we need to send extra (redundant) bits with data. Note
  • 9. 10.9 Figure 10.3 The structure of encoder and decoder
  • 10. 10.10 In this book, we concentrate on block codes; we leave convolution codes to advanced texts. Note
  • 11. 10.11 In modulo-N arithmetic, we use only the integers in the range 0 to N −1, inclusive. Note
  • 12. 10.12 Figure 10.4 XORing of two single bits or two words
  • 13. 10.13 10-2 BLOCK CODING10-2 BLOCK CODING In block coding, we divide our message into blocks,In block coding, we divide our message into blocks, each of k bits, calledeach of k bits, called datawordsdatawords. We add r redundant. We add r redundant bits to each block to make the length n = k + r. Thebits to each block to make the length n = k + r. The resulting n-bit blocks are calledresulting n-bit blocks are called codewordscodewords.. Error Detection Error Correction Hamming Distance Minimum Hamming Distance Topics discussed in this section:Topics discussed in this section:
  • 14. 10.14 Figure 10.5 Datawords and codewords in block coding
  • 15. 10.15 The 4B/5B block coding discussed in Chapter 4 is a good example of this type of coding. In this coding scheme, k = 4 and n = 5. As we saw, we have 2k = 16 datawords and 2n = 32 codewords. We saw that 16 out of 32 codewords are used for message transfer and the rest are either used for other purposes or unused. Example 10.1
  • 16. 10.16 Error Detection  Enough redundancy is added to detect an error.  The receiver knows an error occurred but does not know which bit(s) is(are) in error.  Has less overhead than error correction.
  • 17. 10.17 Figure 10.6 Process of error detection in block coding
  • 18. 10.18 Let us assume that k = 2 and n = 3. Table 10.1 shows the list of datawords and codewords. Later, we will see how to derive a codeword from a dataword. Assume the sender encodes the dataword 01 as 011 and sends it to the receiver. Consider the following cases: 1. The receiver receives 011. It is a valid codeword. The receiver extracts the dataword 01 from it. Example 10.2
  • 19. 10.19 2. The codeword is corrupted during transmission, and 111 is received. This is not a valid codeword and is discarded. 3. The codeword is corrupted during transmission, and 000 is received. This is a valid codeword. The receiver incorrectly extracts the dataword 00. Two corrupted bits have made the error undetectable. Example 10.2 (continued)
  • 20. 10.20 Table 10.1 A code for error detection (Example 10.2)
  • 21. 10.21 An error-detecting code can detect only the types of errors for which it is designed; other types of errors may remain undetected. Note
  • 22. 10.22 Figure 10.7 Structure of encoder and decoder in error correction
  • 23. 10.23 Let us add more redundant bits to Example 10.2 to see if the receiver can correct an error without knowing what was actually sent. We add 3 redundant bits to the 2-bit dataword to make 5-bit codewords. Table 10.2 shows the datawords and codewords. Assume the dataword is 01. The sender creates the codeword 01011. The codeword is corrupted during transmission, and 01001 is received. First, the receiver finds that the received codeword is not in the table. This means an error has occurred. The receiver, assuming that there is only 1 bit corrupted, uses the following strategy to guess the correct dataword. Example 10.3
  • 24. 10.24 1. Comparing the received codeword with the first codeword in the table (01001 versus 00000), the receiver decides that the first codeword is not the one that was sent because there are two different bits. 2. By the same reasoning, the original codeword cannot be the third or fourth one in the table. 3. The original codeword must be the second one in the table because this is the only one that differs from the received codeword by 1 bit. The receiver replaces 01001 with 01011 and consults the table to find the dataword 01. Example 10.3 (continued)
  • 25. 10.25 Table 10.2 A code for error correction (Example 10.3)