SlideShare a Scribd company logo
SUBJECT :- Computer Nwtwork-2140709
TOPIC :- Error Detection
Prepared by: Vaani Pathak
Branch: CE
Division: B3
Enrollment No.: 170120107131
Guided by: Prof. Mohit Bhadla
Error Detection
Gandhinagar Institute Of Technology2
 Techniques for error detection
• Parity Check
• Checksum methods
• Cyclic Redundancy Check
Parity Check
Gandhinagar Institute Of Technology3
 One extra bit is sent along with the original bits to
make number of 1’s either even in case of even
parity, or odd in case of odd parity.
 For example, if even parity is used and number of 1s
is even then one bit with value 0 is added. This way
number of 1s remains even.
 If the number of 1s is odd, to make it even a bit with
value 1 is added.
Gandhinagar Institute Of Technology4
 Receiver counts the number of 1s in a frame. If the
count of 1’s is even and even parity is used, the
frame is considered to be not corrupted and is
accepted.
 If the count of 1s is odd and odd parity is used, the
frame is still not corrupted.
 If a single bit flips in transit, the receiver can detect it
by counting the number of 1’s.
 But when more than one bits are erroneous, then it
is very hard for the receiver to detect the error.
Checksum
Gandhinagar Institute Of Technology5
 Data is divided into k segments each
of m bits.
 Sender side: Segments are added
using 1’s complement arithmetic to
get the sum.
 Sum is complemented to get the
checksum.
 Checksum segment is sent along
with the data segments.
 Receiver Side: All received
segments are added using 1’s
complement arithmetic to get
complemented sum.
 If the result is zero, the received
data is accepted; otherwise
discarded
Cyclic Redundancy Check
Gandhinagar Institute Of Technology6
 CRC is the most powerful and easy to implement
technique.
 CRC is based on binary division.
 At the destination, the incoming data unit is divided
by the same number.
 If at this step there is no remainder, the data unit is
assumed to be correct and is therefore accepted.
 A remainder indicates that the data unit has been
damaged in transit and therefore must be rejected.
CRC – Example
Gandhinagar Institute Of Technology7
CRC example 2
Gandhinagar Institute Of Technology8
THANK YOU

More Related Content

Similar to error detection

Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
BON SECOURS COLLEGE FOR WOMEN
 
Error Detection types
Error Detection typesError Detection types
Error Detection types
Kamran Ashraf
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
ijcisjournal
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
SakthiVinoth78
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET Journal
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
BezaAlem2
 
Error.pdf
Error.pdfError.pdf
Error.pdf
IvyRamosCaones
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
electricalengineerin42
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
BHAVYPATEL34
 
Discuss the invocation semantics that can be achieved when the request-reply ...
Discuss the invocation semantics that can be achieved when the request-reply ...Discuss the invocation semantics that can be achieved when the request-reply ...
Discuss the invocation semantics that can be achieved when the request-reply ...
Singh Pankaj
 
adhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdfadhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdf
rubini Rubini
 
adhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdfadhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdf
rubini Rubini
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
Swapnadeep Reloaded
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
Taymoor Nazmy
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
IRJET Journal
 

Similar to error detection (20)

Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Error Detection types
Error Detection typesError Detection types
Error Detection types
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
Discuss the invocation semantics that can be achieved when the request-reply ...
Discuss the invocation semantics that can be achieved when the request-reply ...Discuss the invocation semantics that can be achieved when the request-reply ...
Discuss the invocation semantics that can be achieved when the request-reply ...
 
adhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdfadhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdf
 
adhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdfadhoc and wireless sensor network nptel assignment answers (1).pdf
adhoc and wireless sensor network nptel assignment answers (1).pdf
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
 

More from vaani pathak

D’Alembert’s Solution of the Wave Equation
D’Alembert’s Solution of the Wave EquationD’Alembert’s Solution of the Wave Equation
D’Alembert’s Solution of the Wave Equation
vaani pathak
 
Dynamic Memory Allocation
Dynamic Memory AllocationDynamic Memory Allocation
Dynamic Memory Allocation
vaani pathak
 
file management functions
file management functionsfile management functions
file management functions
vaani pathak
 
interpolation of unequal intervals
interpolation of unequal intervalsinterpolation of unequal intervals
interpolation of unequal intervals
vaani pathak
 
Arc Length, Curvature and Torsion
Arc Length, Curvature and TorsionArc Length, Curvature and Torsion
Arc Length, Curvature and Torsion
vaani pathak
 
Cpd 4.2
Cpd 4.2Cpd 4.2
Cpd 4.2
vaani pathak
 
CPD ch 7
CPD ch 7CPD ch 7
CPD ch 7
vaani pathak
 
Chain Drive
Chain DriveChain Drive
Chain Drive
vaani pathak
 
AM FM PM
AM FM PMAM FM PM
AM FM PM
vaani pathak
 
Fixtures and Reflectors
Fixtures and ReflectorsFixtures and Reflectors
Fixtures and Reflectors
vaani pathak
 
Calculus ppt format
Calculus ppt formatCalculus ppt format
Calculus ppt format
vaani pathak
 
Planning for presentation
Planning for presentationPlanning for presentation
Planning for presentation
vaani pathak
 
Types of polarisation
Types of polarisationTypes of polarisation
Types of polarisation
vaani pathak
 
CPU Algorithm
CPU Algorithm CPU Algorithm
CPU Algorithm
vaani pathak
 
Air Pollution Acts
Air Pollution ActsAir Pollution Acts
Air Pollution Acts
vaani pathak
 

More from vaani pathak (15)

D’Alembert’s Solution of the Wave Equation
D’Alembert’s Solution of the Wave EquationD’Alembert’s Solution of the Wave Equation
D’Alembert’s Solution of the Wave Equation
 
Dynamic Memory Allocation
Dynamic Memory AllocationDynamic Memory Allocation
Dynamic Memory Allocation
 
file management functions
file management functionsfile management functions
file management functions
 
interpolation of unequal intervals
interpolation of unequal intervalsinterpolation of unequal intervals
interpolation of unequal intervals
 
Arc Length, Curvature and Torsion
Arc Length, Curvature and TorsionArc Length, Curvature and Torsion
Arc Length, Curvature and Torsion
 
Cpd 4.2
Cpd 4.2Cpd 4.2
Cpd 4.2
 
CPD ch 7
CPD ch 7CPD ch 7
CPD ch 7
 
Chain Drive
Chain DriveChain Drive
Chain Drive
 
AM FM PM
AM FM PMAM FM PM
AM FM PM
 
Fixtures and Reflectors
Fixtures and ReflectorsFixtures and Reflectors
Fixtures and Reflectors
 
Calculus ppt format
Calculus ppt formatCalculus ppt format
Calculus ppt format
 
Planning for presentation
Planning for presentationPlanning for presentation
Planning for presentation
 
Types of polarisation
Types of polarisationTypes of polarisation
Types of polarisation
 
CPU Algorithm
CPU Algorithm CPU Algorithm
CPU Algorithm
 
Air Pollution Acts
Air Pollution ActsAir Pollution Acts
Air Pollution Acts
 

Recently uploaded

AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
mahaffeycheryld
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

error detection

  • 1. SUBJECT :- Computer Nwtwork-2140709 TOPIC :- Error Detection Prepared by: Vaani Pathak Branch: CE Division: B3 Enrollment No.: 170120107131 Guided by: Prof. Mohit Bhadla
  • 2. Error Detection Gandhinagar Institute Of Technology2  Techniques for error detection • Parity Check • Checksum methods • Cyclic Redundancy Check
  • 3. Parity Check Gandhinagar Institute Of Technology3  One extra bit is sent along with the original bits to make number of 1’s either even in case of even parity, or odd in case of odd parity.  For example, if even parity is used and number of 1s is even then one bit with value 0 is added. This way number of 1s remains even.  If the number of 1s is odd, to make it even a bit with value 1 is added.
  • 4. Gandhinagar Institute Of Technology4  Receiver counts the number of 1s in a frame. If the count of 1’s is even and even parity is used, the frame is considered to be not corrupted and is accepted.  If the count of 1s is odd and odd parity is used, the frame is still not corrupted.  If a single bit flips in transit, the receiver can detect it by counting the number of 1’s.  But when more than one bits are erroneous, then it is very hard for the receiver to detect the error.
  • 5. Checksum Gandhinagar Institute Of Technology5  Data is divided into k segments each of m bits.  Sender side: Segments are added using 1’s complement arithmetic to get the sum.  Sum is complemented to get the checksum.  Checksum segment is sent along with the data segments.  Receiver Side: All received segments are added using 1’s complement arithmetic to get complemented sum.  If the result is zero, the received data is accepted; otherwise discarded
  • 6. Cyclic Redundancy Check Gandhinagar Institute Of Technology6  CRC is the most powerful and easy to implement technique.  CRC is based on binary division.  At the destination, the incoming data unit is divided by the same number.  If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted.  A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.
  • 7. CRC – Example Gandhinagar Institute Of Technology7
  • 8. CRC example 2 Gandhinagar Institute Of Technology8