SlideShare a Scribd company logo
ERROR DETECTION
 Bit errors are sometimes introduced into frames
 Bit error simply means change from “ 0 to 1 ” or “ 1 to 0 ”

This most of the time happens because of:
 NOISE


Where noise is defined as the induction of unwanted signal into
data
ERROR DETECTION
Data is transmitted in form of signals
Process of translating binary data into signal is called
 ENCONDING SCHEME
Most commonly the signal travelling on a wire is an

electrical or electromagnetic signal
 Usually one bit is represented by one voltage value
 And second bit by another voltage value


E.g.

1 = +5 Volt

0 = -5 Volt
ERROR DETECTION
Data 101010

10

10

10

1 01010

 In simple words electricity is flowing between the two PCs
 Whenever electricity or electrical signal is flowing through a wire
 It creates electromagnetic field around it
 Simply the area around the wire in which current has its affect is
called electromagnetic field
Data 101010

10

10

10

1 01010

10

10

10

1
0 01010

Noise
ERROR DETECTION
This type of noise is called electrical interference
There are many other types of noise:
 Thermal noise, Shot noise, Burst Noise, Flicker Noise
Bit errors are introduced into frames because of noise

Some strategy is needed to detect these errors
 Parity
 Checksum
 CRC ( Cyclic Redundancy Check )
ERROR DETECTION
General steps in every error detection strategy:
 Send extra information with data
 This information is calculated from data
 This information is generally called Redundant Information
 Errors are detected in data by using Redundant Information
 If error is detected in a frame



The frame is dropped
Sender retransmits the frame
ERROR DETECTION
Every strategy has its own way of calculating redundant

information and has its own name for it
Even
Parity

Odd Parity

Redundant
Information
Internet
Checksum

CRC
Number
ERROR DETECTION
ERROR DETECTION
Lets design a simple error detection strategy
In simplest case we can think of sending two frames
 Original data frame
 Copy of data frame ( Redundant Information )
 Receiver compares the two frames




If the two match there is no error
 Frame is accepted and copy is discarded
If the two do not match there is an error
 Frame is rejected and both data and copy are discarded
ERROR DETECTION
10 10 10
101010

Data

Copy

10

10

Data

10
00

10

10

10

10

10

Copy

 Receiver compares the two frames




If the two match there is no error
 Frame is accepted and copy is discarded
If the two do not match there is an error
 Frame is rejected and both data and copy are discarded
ERROR DETECTION
Is this a good Error Detection Strategy?
Too much redundant information
ERROR DETECTION
Parity Schemes
 Even Parity


Check digit (1 or 0) is added to make sure there are an even
number of 1s

 Odd Parity


Check digit (1 or 0) is added to make sure there are an odd
number of 1s

 Two-Dimensional Parity


Add parity bits in both dimension i.e. row-wise and column-wise
ERROR DETECTION
1 0 0 0 0 1 1 1
0 1 1 0 0 1 1 0

0

 Even Parity
 With every 7 bits of data one parity bit is added to keep number of 1s even
 When receiver receives the data, it checks the number of 1s
 If number of 1s are even then, data is correct
 If number of 1s are odd then there is an error
ERROR DETECTION
1 0 0 0 0 1 1 1
1 1

 Even Parity
 If more then one bits are corrupted in such a way that number of 1s stay

even, the error goes undetected
ERROR DETECTION
Is this a good Error Detection Strategy?
Cannot detect all types of errors
ERROR DETECTION
1 0 0 0 0 1 1 1
0 0 1 0 0 0 1 0
1 1 0 0 0 1 0 1
1 0 0 1 0 1 1 0
0 0 0 1 0 0 0 1
0 1 1 0 0 1 1 0
0 1 0 0 1 1 0 1
1 1 0 0 1 1 0 0

 Two-Dimensional Parity
 Divides data into blocks, where every block contains 7 groups of 7 bits
 Adds parity bits both column-wise and row-wise
ERROR DETECTION
Is this a good Error Detection Strategy?
Can detect more types of errors as compared to simple

parity schemes
Sends more Redundant Information as compared to
simple parity scheme
ERROR DETECTION
 When the logic for detecting errors is based on addition, such

strategies may be called checksum
 Internet Checksum Algorithm
 Add up all the words of sending data and then transmit the

result of that sum ( R.I ) with data


A word can be 1,2 or 4 bytes of data

 The receiver performs the same calculation on the received data

and compares the result with the received checksum
 If answers match there is no error otherwise error detected
ERROR DETECTION

1
1 1 1 1 1 1 1

Sum

1 0 1 0 0 1 1 1

• Add
• Words

0 1 0 0 1 1 0 0
1 0 1 1 0 1 1 0

• Data
• Sum

Transmitted

1 0 1 0 1 0 0 1
Compare

1

1 0 1 0 1 0 1 0

• Recalculate
• Sum

1 0 1 0 1 0 1 0
ERROR DETECTION
 This strategy is implemented at network layer
 Sends less redundant information
 A very weak strategy for Error Detection
 If bits are corrupted in such a way that sum does not change
error will go undetected
ERROR DETECTION
CRC ( Cyclic Redundancy Check)
 Before communication sender and receiver agree on a divisor
 Before sending the data CRC number is combined with data
 It makes the data completely divisible by divisor
On Receiver Side
 If data is again completely divisible, no Error detected
 If data is not completely divisible, Error is detected
ERROR DETECTION
CRC process is usually carried in polynomial form
 Polynomial Form is used for two reasons



Polynomial mathematics is easy and efficient
Long binary messages can be represented by short polynomials

 Conversion Process






Start from right side and write “x” under each binary digit with
powers in sequence
Multiply them with binary digits
Add all the terms
Highest power in a polynomial is the DEGREE of polynomial
1

5 bits

0

Polynomial

1

1

Of

0

Degree 4
1

0

6 bits

1

Polynomial

0

Of

1

1

Degree 5
1

0

7 bits

0

Polynomial

0

0

Of

0

Degree 6

1
ERROR DETECTION
CRC Process:
 n + 1 bits of data (Message) M(x) is represented by a polynomial of degree n

For Calculating CRC:
 Both sender and receiver choose a common divisor C(x) with degree k
 Any number can be chosen as a divisor as long as k < n
 Multiply M(x) into xk to obtain T(x), can also be called zero-extended

message. T(x) = M(x) * xk
 Divide T(x) by C(x) and find remainder.
 Subtract Remainder from T(x).

T(x) / C(x) => Remainder

T(x) - Remainder

 At this point we get data combined with CRC , which is completely

divisible by divisor
C(x) = 1101
M(x) = 10011010

x7 + x4 + x3 + x1
x 3 + x2 + 1
10011010

M(x) Where
n=7

C (x) k=3
agreed ,k < n

101

(x10 + x7 + x6 + x4) / ( x3 + x2 + 1 ) = Remainder

T(x) = M(x) * xk5
6
7
x3 + x2 + 1

x - x + x – x4 + x3 +1
x8 + x7 + x5
7 + x 4 + x 3 + x 1 ) * x3
T(x) = (x
x3 + x2 + 1
CRC 101
T(x) – Remainder 3 43 Completely7 5 4
7.x3 + x4.x3 + x .x + x1.x3
T(x) = x x10 7 + x6 + x Divisible– x – T(x) x
On x + Zero
2–
Extended – x2 – 1
(x10 + x7 x10 6 + x4) x73+3 (– x1+3 1)
+ x + 4+3 + –
Divisor – x7 – x6 – x4
T(x) = x7+3 + x x9 + x + x
Message
x10 + x7 + x6 7 x4 6 x2 4 1 Data + CRC
+ + +
Remainder = 101
T(x) = x10 + 9 + x + x
x 6 4
6 – x5 + 2x4
–x +x +x
x
0
6
– 9 x8 000
10011010x –101– x
T(x) = 10011010

x8 + 2x6 + x4
0

x6 + x 5 + x3
– 0 5 + x3
2x

C(x) = 1101

Complete Division =
No Error
Incomplete Division =
Error Detected
ERROR DETECTION
ERROR DETECTION
BISYNC protocol uses two dimensional parity
IP uses Internet Checksum
HDLC, DDCMP, use CRC
Ethernet and 802.5 networks use CRC-32, while HDLC

uses CRC-CCITT. ATM uses CRC-8, CRC-10, and CRC-32.
ERROR CORRECTION
 Error correction are more complex schemes then detection
 We need to know the exact position of corrupted bits
 Hamming Codes:
 Developed by Richard Hamming
 Can correct up to one bit-error ( one we will study )
 Takes help from simple parity
 Redundant bits are placed at every 2K position
 Data is placed in between redundant bits
 Every redundant bit is responsible for checking bits at some
position
 CORRECTION comes after DETECTION
ERROR CORRECTION
R parity bits are required for 2R-R-1 data bits
Parity bits are placed at position 2K i.e. 1,2,4,8,16,…..
Parity bit at position k is responsible for every k bit(s)

starting from position k and at a gap of k bits. e.g.
 Parity bit 1 is responsible for bits at position [1], [3], [5], [7]……
 Parity bit 2 is responsible for bits at position [2,3], [6,7], [10,11]……
 Parity bit 4 is responsible for bits at position [4,5,6,7], [12,13,14,15]…..

Data is placed in between the Redundant Bits. i.e. any

position ≠ 2k
 e.g. 3,5,6,7,9,10,11,12,13,14,15,17…….
ERROR CORRECTION
Sender:
 Separate parity checking is done for every redundant bit
and the bits that it is responsible for
 By using even parity, number of 1s are kept even
Receiver:
 Recalculates parity bit in received data for every redundant
bit and its responsible bits
 By combining these recalculated parity bits we get the
position of corrupted bit
 The bit at that position is simply flipped
ERROR CORRECTION

 R parity bits are required for 2R-R-1 data bits
 E.g. for 7 data bits.

 For R = 1, 21 – 1 – 1 = 0
 For R = 2, 22 – 2 – 1 = 1
 For R = 3, 23 – 3 – 1 = 4
 For R = 4, 24 – 4 – 1 = 11
 So total of 11 bits with 7 data bits and 4 parity bits

 Parity bits are placed at position 2k and data bits between

them
ERROR CORRECTION
 Parity bit at position k is responsible for every k bit(s) starting from position

k and at a gap of k bits.
Insert
Data at
position
≠ 2k

1 0 0 1 1 0 1 Data
1 0
0 1
1 1
0 0

Separate
Parity
Checking

Flip Bit

Receiver
Sender

1
1 0
Combine
Bits =
Position

Transmission

Recalculate
Parity Bits

0

1

0
1

1

0

11 10 9

8

7

6

5

1

0

0
4

1
3

0
2

1
1

0

0 1 1 1

Position =7
Insert
Data at
position
≠ 2k

1 0 0 1 1 0 1 Data
1 0
0 1
1 1
0 0

Separate
Parity
Checking

Flip Bit

Receiver
Sender

1
1 0
Combine
Bits =
Position

Transmission

Recalculate
Parity Bits

1

0

0

1

1

1

0

11 10 9

8

7

6

5

0
4

1
3

0
2

1
1

0 0 0 0

Position = 0
HAMMING DISTANCE
To find the hamming distance we exclusively or every

code word with the code word below it
The minimum distance is then called
 dmin = Hamming Distance

Any error detection scheme having a minimum hamming

distance of dmin is guaranteed to:
 Detect errors up to : dmin – 1
 Correct errors up to: (dmin – 1) / 2

More Related Content

What's hot

Error control
Error controlError control
Error control
selvakumar_b1985
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
Anil Pokhrel
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Switching
Switching Switching
Switching
Abid Ali
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
Biplap Bhattarai
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
Saleh Alrkiyan
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Frame Relay
Frame RelayFrame Relay
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Flow Control
Flow ControlFlow Control
Flow Control
selvakumar_b1985
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Abdul Razaq
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
 
Data link layer
Data link layerData link layer
Data link layer
sbkbca
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)
MdFazleRabbi18
 

What's hot (20)

Error control
Error controlError control
Error control
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Switching
Switching Switching
Switching
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Digital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling TechniquesDigital Data, Digital Signal | Scrambling Techniques
Digital Data, Digital Signal | Scrambling Techniques
 
Error control
Error controlError control
Error control
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
Data link layer
Data link layerData link layer
Data link layer
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)
 

Similar to Error detection.

4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
DrDeepakBhatia
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
SneheshDutta
 
Error.pdf
Error.pdfError.pdf
Error.pdf
IvyRamosCaones
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
ssuser8b4eb21
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
nesarahmad37
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
Sehrish Rafiq
 
Data links
Data links Data links
Data links
EshaAfzal5
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
logesswarisrinivasan
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
WinterSnow16
 
Lecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistanLecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistan
Saba Hanif
 

Similar to Error detection. (20)

4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Data links
Data links Data links
Data links
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
 
Lecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistanLecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistan
 

Recently uploaded

What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Recently uploaded (20)

What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

Error detection.

  • 1.
  • 2. ERROR DETECTION  Bit errors are sometimes introduced into frames  Bit error simply means change from “ 0 to 1 ” or “ 1 to 0 ” This most of the time happens because of:  NOISE  Where noise is defined as the induction of unwanted signal into data
  • 3. ERROR DETECTION Data is transmitted in form of signals Process of translating binary data into signal is called  ENCONDING SCHEME Most commonly the signal travelling on a wire is an electrical or electromagnetic signal  Usually one bit is represented by one voltage value  And second bit by another voltage value  E.g. 1 = +5 Volt 0 = -5 Volt
  • 4. ERROR DETECTION Data 101010 10 10 10 1 01010  In simple words electricity is flowing between the two PCs  Whenever electricity or electrical signal is flowing through a wire  It creates electromagnetic field around it  Simply the area around the wire in which current has its affect is called electromagnetic field
  • 6. ERROR DETECTION This type of noise is called electrical interference There are many other types of noise:  Thermal noise, Shot noise, Burst Noise, Flicker Noise Bit errors are introduced into frames because of noise Some strategy is needed to detect these errors  Parity  Checksum  CRC ( Cyclic Redundancy Check )
  • 7. ERROR DETECTION General steps in every error detection strategy:  Send extra information with data  This information is calculated from data  This information is generally called Redundant Information  Errors are detected in data by using Redundant Information  If error is detected in a frame   The frame is dropped Sender retransmits the frame
  • 8. ERROR DETECTION Every strategy has its own way of calculating redundant information and has its own name for it Even Parity Odd Parity Redundant Information Internet Checksum CRC Number
  • 10. ERROR DETECTION Lets design a simple error detection strategy In simplest case we can think of sending two frames  Original data frame  Copy of data frame ( Redundant Information )  Receiver compares the two frames   If the two match there is no error  Frame is accepted and copy is discarded If the two do not match there is an error  Frame is rejected and both data and copy are discarded
  • 11. ERROR DETECTION 10 10 10 101010 Data Copy 10 10 Data 10 00 10 10 10 10 10 Copy  Receiver compares the two frames   If the two match there is no error  Frame is accepted and copy is discarded If the two do not match there is an error  Frame is rejected and both data and copy are discarded
  • 12. ERROR DETECTION Is this a good Error Detection Strategy? Too much redundant information
  • 13. ERROR DETECTION Parity Schemes  Even Parity  Check digit (1 or 0) is added to make sure there are an even number of 1s  Odd Parity  Check digit (1 or 0) is added to make sure there are an odd number of 1s  Two-Dimensional Parity  Add parity bits in both dimension i.e. row-wise and column-wise
  • 14. ERROR DETECTION 1 0 0 0 0 1 1 1 0 1 1 0 0 1 1 0 0  Even Parity  With every 7 bits of data one parity bit is added to keep number of 1s even  When receiver receives the data, it checks the number of 1s  If number of 1s are even then, data is correct  If number of 1s are odd then there is an error
  • 15. ERROR DETECTION 1 0 0 0 0 1 1 1 1 1  Even Parity  If more then one bits are corrupted in such a way that number of 1s stay even, the error goes undetected
  • 16. ERROR DETECTION Is this a good Error Detection Strategy? Cannot detect all types of errors
  • 17. ERROR DETECTION 1 0 0 0 0 1 1 1 0 0 1 0 0 0 1 0 1 1 0 0 0 1 0 1 1 0 0 1 0 1 1 0 0 0 0 1 0 0 0 1 0 1 1 0 0 1 1 0 0 1 0 0 1 1 0 1 1 1 0 0 1 1 0 0  Two-Dimensional Parity  Divides data into blocks, where every block contains 7 groups of 7 bits  Adds parity bits both column-wise and row-wise
  • 18. ERROR DETECTION Is this a good Error Detection Strategy? Can detect more types of errors as compared to simple parity schemes Sends more Redundant Information as compared to simple parity scheme
  • 19. ERROR DETECTION  When the logic for detecting errors is based on addition, such strategies may be called checksum  Internet Checksum Algorithm  Add up all the words of sending data and then transmit the result of that sum ( R.I ) with data  A word can be 1,2 or 4 bytes of data  The receiver performs the same calculation on the received data and compares the result with the received checksum  If answers match there is no error otherwise error detected
  • 20. ERROR DETECTION 1 1 1 1 1 1 1 1 Sum 1 0 1 0 0 1 1 1 • Add • Words 0 1 0 0 1 1 0 0 1 0 1 1 0 1 1 0 • Data • Sum Transmitted 1 0 1 0 1 0 0 1 Compare 1 1 0 1 0 1 0 1 0 • Recalculate • Sum 1 0 1 0 1 0 1 0
  • 21. ERROR DETECTION  This strategy is implemented at network layer  Sends less redundant information  A very weak strategy for Error Detection  If bits are corrupted in such a way that sum does not change error will go undetected
  • 22. ERROR DETECTION CRC ( Cyclic Redundancy Check)  Before communication sender and receiver agree on a divisor  Before sending the data CRC number is combined with data  It makes the data completely divisible by divisor On Receiver Side  If data is again completely divisible, no Error detected  If data is not completely divisible, Error is detected
  • 23.
  • 24. ERROR DETECTION CRC process is usually carried in polynomial form  Polynomial Form is used for two reasons   Polynomial mathematics is easy and efficient Long binary messages can be represented by short polynomials  Conversion Process     Start from right side and write “x” under each binary digit with powers in sequence Multiply them with binary digits Add all the terms Highest power in a polynomial is the DEGREE of polynomial
  • 28. ERROR DETECTION CRC Process:  n + 1 bits of data (Message) M(x) is represented by a polynomial of degree n For Calculating CRC:  Both sender and receiver choose a common divisor C(x) with degree k  Any number can be chosen as a divisor as long as k < n  Multiply M(x) into xk to obtain T(x), can also be called zero-extended message. T(x) = M(x) * xk  Divide T(x) by C(x) and find remainder.  Subtract Remainder from T(x). T(x) / C(x) => Remainder T(x) - Remainder  At this point we get data combined with CRC , which is completely divisible by divisor
  • 29. C(x) = 1101 M(x) = 10011010 x7 + x4 + x3 + x1 x 3 + x2 + 1 10011010 M(x) Where n=7 C (x) k=3 agreed ,k < n 101 (x10 + x7 + x6 + x4) / ( x3 + x2 + 1 ) = Remainder T(x) = M(x) * xk5 6 7 x3 + x2 + 1 x - x + x – x4 + x3 +1 x8 + x7 + x5 7 + x 4 + x 3 + x 1 ) * x3 T(x) = (x x3 + x2 + 1 CRC 101 T(x) – Remainder 3 43 Completely7 5 4 7.x3 + x4.x3 + x .x + x1.x3 T(x) = x x10 7 + x6 + x Divisible– x – T(x) x On x + Zero 2– Extended – x2 – 1 (x10 + x7 x10 6 + x4) x73+3 (– x1+3 1) + x + 4+3 + – Divisor – x7 – x6 – x4 T(x) = x7+3 + x x9 + x + x Message x10 + x7 + x6 7 x4 6 x2 4 1 Data + CRC + + + Remainder = 101 T(x) = x10 + 9 + x + x x 6 4 6 – x5 + 2x4 –x +x +x x 0 6 – 9 x8 000 10011010x –101– x T(x) = 10011010 x8 + 2x6 + x4 0 x6 + x 5 + x3 – 0 5 + x3 2x C(x) = 1101 Complete Division = No Error Incomplete Division = Error Detected
  • 31. ERROR DETECTION BISYNC protocol uses two dimensional parity IP uses Internet Checksum HDLC, DDCMP, use CRC Ethernet and 802.5 networks use CRC-32, while HDLC uses CRC-CCITT. ATM uses CRC-8, CRC-10, and CRC-32.
  • 32. ERROR CORRECTION  Error correction are more complex schemes then detection  We need to know the exact position of corrupted bits  Hamming Codes:  Developed by Richard Hamming  Can correct up to one bit-error ( one we will study )  Takes help from simple parity  Redundant bits are placed at every 2K position  Data is placed in between redundant bits  Every redundant bit is responsible for checking bits at some position  CORRECTION comes after DETECTION
  • 33. ERROR CORRECTION R parity bits are required for 2R-R-1 data bits Parity bits are placed at position 2K i.e. 1,2,4,8,16,….. Parity bit at position k is responsible for every k bit(s) starting from position k and at a gap of k bits. e.g.  Parity bit 1 is responsible for bits at position [1], [3], [5], [7]……  Parity bit 2 is responsible for bits at position [2,3], [6,7], [10,11]……  Parity bit 4 is responsible for bits at position [4,5,6,7], [12,13,14,15]….. Data is placed in between the Redundant Bits. i.e. any position ≠ 2k  e.g. 3,5,6,7,9,10,11,12,13,14,15,17…….
  • 34. ERROR CORRECTION Sender:  Separate parity checking is done for every redundant bit and the bits that it is responsible for  By using even parity, number of 1s are kept even Receiver:  Recalculates parity bit in received data for every redundant bit and its responsible bits  By combining these recalculated parity bits we get the position of corrupted bit  The bit at that position is simply flipped
  • 35. ERROR CORRECTION  R parity bits are required for 2R-R-1 data bits  E.g. for 7 data bits.  For R = 1, 21 – 1 – 1 = 0  For R = 2, 22 – 2 – 1 = 1  For R = 3, 23 – 3 – 1 = 4  For R = 4, 24 – 4 – 1 = 11  So total of 11 bits with 7 data bits and 4 parity bits  Parity bits are placed at position 2k and data bits between them
  • 36. ERROR CORRECTION  Parity bit at position k is responsible for every k bit(s) starting from position k and at a gap of k bits.
  • 37. Insert Data at position ≠ 2k 1 0 0 1 1 0 1 Data 1 0 0 1 1 1 0 0 Separate Parity Checking Flip Bit Receiver Sender 1 1 0 Combine Bits = Position Transmission Recalculate Parity Bits 0 1 0 1 1 0 11 10 9 8 7 6 5 1 0 0 4 1 3 0 2 1 1 0 0 1 1 1 Position =7
  • 38. Insert Data at position ≠ 2k 1 0 0 1 1 0 1 Data 1 0 0 1 1 1 0 0 Separate Parity Checking Flip Bit Receiver Sender 1 1 0 Combine Bits = Position Transmission Recalculate Parity Bits 1 0 0 1 1 1 0 11 10 9 8 7 6 5 0 4 1 3 0 2 1 1 0 0 0 0 Position = 0
  • 39. HAMMING DISTANCE To find the hamming distance we exclusively or every code word with the code word below it The minimum distance is then called  dmin = Hamming Distance Any error detection scheme having a minimum hamming distance of dmin is guaranteed to:  Detect errors up to : dmin – 1  Correct errors up to: (dmin – 1) / 2