SlideShare a Scribd company logo
1 of 17
W E L C O M E T O O U R
P R E S E N TAT I O N
Our presentation topic is:
Error Detection and Correction.
Group members are:
Md. Badrul alam 152-15-6156
Jamal Khan Hridoy 152-15-6192
Md. Abdullah al Obayed 152-15-6166
Md. Tamim Rahman 152-15-6186
“Data can be corrupted during transmission.
For reliable communication, errors must be
detected and corrected.”
What is Error?
Ans: Error is a condition when the output information does not match with the
input information. During transmission, digital signals suffer from noise that ca
introduce errors in the binary bits travelling from one system to other.
That means a 0 bit may change to 1 or a 1 bit may change to 0.
Error Detection: Error detection is the detection of errors
caused by noise or other impairments during transmission
from the transmitter to the receiver.
Error correction: Error correction is the detection of errors
and reconstruction of the original, error-free data.
Type of Error:
 Single bit error.
 Multi bits error.
 Burst bits error.
Single bit error: In a frame, there is only one bit, anywhere though, which is corrupt.
Multi bits error: Frame is received with more than one bits in corrupted state.
0 1 0 1 0 0 1 1 1 0
1 1 0 1 1 1 0 0 0 1
Burst bits error: Frame contains more than1 consecutive bits corrupted..
0 1 0 1 0 0 0 1 0 0
Sent
Sent
Sent
Received
Received
Received
Hamming code: In telecommunication, Hamming codes are a family
of linear error-correcting. Hamming codes can detect up to two-bit
or correct one-bit errors without detection of uncorrected errors.
Parity bit: A parity bit, or check bit is a bit added to the end of a string
of binary code that indicates where the number of bits in the string with
the value one is even or odd. Parity bits are used as the simplest form
of error detecting code.
Error Detection and Correction process:
We are using hamming code for error detection and correction.
 Suppose ASCII code Y = 1011001. The data word is 7-bits.
 Through the four hamming parity bits h1,h2,h3,h4 as 1,2,4 and 8 position with this word
and arrange the 11 bits as follows:
Bit position:
1 0 1 h4 1 0 0 h3 1 h2 h1
11 10 9 8 7 6 5 4 3 2 1
1 0 1 h4 1 0 0 h3 1 h2 h1
11 10 9 8 7 6 5 4 3 2 1
Bit position:
 Select position of logic bit 1 for finding hamming code.
 Here logic bits 1 number of position as 3, 7, 9 and 11
 Now convert this data to binary code and addition this data using XOR operation.
 Avoid carry when applying addition.
3 = 0 0 1 1
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
Y = 1011001
0110
h4 h3 h2 h1
1 0 1 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Putting value of h1,h2,h3 and h4 for get hamming code.
 Again select position of logic bit 1 for finding hamming code.
 Here the logic bits are 1 number of position as 2, 3, 4, 7, 9 and 11.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
 Addition this data applying XOR operation.
 If additional result all bits are 0. Then there is no error.
000 0
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 1 to 0 no of bit position 9.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
11 = 1 0 1 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
101 0 = 9
1 0 1 0 1 0 0 1 0 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 0 to 1 no of bit position3.
2 = 0 0 1 0
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 0 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
100 1 = 3
0 0 1 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 1 to 0 no of bit position11.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
101 1 = 11
USAGE OF HAMMING CODE
 Hamming coding is only of use as a source code as a computer program to
compress the characters. As a result it is only carried out in the front-end
processor.
 In Bangladesh railway business(Signaling) we have to follow specific safety
standards. An important aspect is the data transferee is closed transmission system.
Extremely effective on networks where the
data streams are given to single-bit errors.
ADVANTAGE OF HAMMING CODE
 Single-bit detection and correction code, if multiple
bits are errored then the errors are detected but
the resultant could cause another bit that is correct
to be changed, causing the data to be further
errored.
DISADVANTAGE OF HAMMING CODE
 Hamming code only can solve up to single
bits.
THANK YOU.

More Related Content

What's hot

Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrcHuawei Technologies
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Error Detection and Correction
Error Detection and Correction Error Detection and Correction
Error Detection and Correction MdOsmanAzizMinaj
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block CodesNilaNila16
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionJeoffnaRuth
 
Number system in Digital Electronics
Number system in Digital ElectronicsNumber system in Digital Electronics
Number system in Digital ElectronicsJanki Shah
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipherUdit Mishra
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy checkSaleh Alrkiyan
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
Digital Data to Digital Signal Conversion
Digital Data to Digital Signal ConversionDigital Data to Digital Signal Conversion
Digital Data to Digital Signal ConversionArafat Hossan
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Sudhanshu Srivastava
 

What's hot (20)

Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Error Detection and Correction
Error Detection and Correction Error Detection and Correction
Error Detection and Correction
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Data link layer
Data link layer Data link layer
Data link layer
 
Number system in Digital Electronics
Number system in Digital ElectronicsNumber system in Digital Electronics
Number system in Digital Electronics
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Digital Data to Digital Signal Conversion
Digital Data to Digital Signal ConversionDigital Data to Digital Signal Conversion
Digital Data to Digital Signal Conversion
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 

Similar to Error Detection and Correction presentation

Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2ISMT College
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentationHassan Hashmi
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelUniversitas Pembangunan Panca Budi
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codesGargiKhanna1
 
chapter-3-data-link-layer.ppt
chapter-3-data-link-layer.pptchapter-3-data-link-layer.ppt
chapter-3-data-link-layer.pptYashikaAsrani
 
Error detection.
Error detection.Error detection.
Error detection.Wasim Akbar
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Error Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptError Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptMd Mosharof Hosen
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdfkenilpatel65
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 

Similar to Error Detection and Correction presentation (20)

crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
 
Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2Digital Logic BCA TU Chapter 2.2
Digital Logic BCA TU Chapter 2.2
 
UNIT-V.pptx
UNIT-V.pptxUNIT-V.pptx
UNIT-V.pptx
 
Digital logic designing presentation
Digital logic designing presentationDigital logic designing presentation
Digital logic designing presentation
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
 
K034066071
K034066071K034066071
K034066071
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
chapter-3-data-link-layer.ppt
chapter-3-data-link-layer.pptchapter-3-data-link-layer.ppt
chapter-3-data-link-layer.ppt
 
Number system
Number systemNumber system
Number system
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Error detection.
Error detection.Error detection.
Error detection.
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.pptError Detection and Error Correction by MHM.ppt
Error Detection and Error Correction by MHM.ppt
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Number codes students
Number codes studentsNumber codes students
Number codes students
 

More from Badrul Alam

E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)Badrul Alam
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)Badrul Alam
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)Badrul Alam
 
E file (title-defense)
E file (title-defense)E file (title-defense)
E file (title-defense)Badrul Alam
 
E file(pre-defense)
E file(pre-defense)E file(pre-defense)
E file(pre-defense)Badrul Alam
 
Albert einstein presentation
Albert einstein presentationAlbert einstein presentation
Albert einstein presentationBadrul Alam
 
Fedora os presentation
Fedora os presentationFedora os presentation
Fedora os presentationBadrul Alam
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedoraBadrul Alam
 
Factorial number in linux shell.
Factorial number in linux shell. Factorial number in linux shell.
Factorial number in linux shell. Badrul Alam
 
Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).Badrul Alam
 
Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)Badrul Alam
 
Equivalence and minimization of DFA
Equivalence and minimization of DFAEquivalence and minimization of DFA
Equivalence and minimization of DFABadrul Alam
 
Loop(for, while, do while) condition Presentation
Loop(for, while, do while) condition PresentationLoop(for, while, do while) condition Presentation
Loop(for, while, do while) condition PresentationBadrul Alam
 
Logical, Shift, and Rotate Instruction
Logical, Shift, and Rotate InstructionLogical, Shift, and Rotate Instruction
Logical, Shift, and Rotate InstructionBadrul Alam
 
Networking assignment
Networking assignmentNetworking assignment
Networking assignmentBadrul Alam
 
Schema relationship to E-R diagram
Schema relationship to E-R diagramSchema relationship to E-R diagram
Schema relationship to E-R diagramBadrul Alam
 
Automatic light control Using LDR
Automatic light control Using LDRAutomatic light control Using LDR
Automatic light control Using LDRBadrul Alam
 
Pipeline processing and generation of computer.
Pipeline processing and generation of computer.Pipeline processing and generation of computer.
Pipeline processing and generation of computer.Badrul Alam
 

More from Badrul Alam (18)

E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
E file (title-defense)
E file (title-defense)E file (title-defense)
E file (title-defense)
 
E file(pre-defense)
E file(pre-defense)E file(pre-defense)
E file(pre-defense)
 
Albert einstein presentation
Albert einstein presentationAlbert einstein presentation
Albert einstein presentation
 
Fedora os presentation
Fedora os presentationFedora os presentation
Fedora os presentation
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedora
 
Factorial number in linux shell.
Factorial number in linux shell. Factorial number in linux shell.
Factorial number in linux shell.
 
Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).
 
Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)
 
Equivalence and minimization of DFA
Equivalence and minimization of DFAEquivalence and minimization of DFA
Equivalence and minimization of DFA
 
Loop(for, while, do while) condition Presentation
Loop(for, while, do while) condition PresentationLoop(for, while, do while) condition Presentation
Loop(for, while, do while) condition Presentation
 
Logical, Shift, and Rotate Instruction
Logical, Shift, and Rotate InstructionLogical, Shift, and Rotate Instruction
Logical, Shift, and Rotate Instruction
 
Networking assignment
Networking assignmentNetworking assignment
Networking assignment
 
Schema relationship to E-R diagram
Schema relationship to E-R diagramSchema relationship to E-R diagram
Schema relationship to E-R diagram
 
Automatic light control Using LDR
Automatic light control Using LDRAutomatic light control Using LDR
Automatic light control Using LDR
 
Pipeline processing and generation of computer.
Pipeline processing and generation of computer.Pipeline processing and generation of computer.
Pipeline processing and generation of computer.
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Error Detection and Correction presentation

  • 1. W E L C O M E T O O U R P R E S E N TAT I O N
  • 2. Our presentation topic is: Error Detection and Correction. Group members are: Md. Badrul alam 152-15-6156 Jamal Khan Hridoy 152-15-6192 Md. Abdullah al Obayed 152-15-6166 Md. Tamim Rahman 152-15-6186
  • 3. “Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.”
  • 4. What is Error? Ans: Error is a condition when the output information does not match with the input information. During transmission, digital signals suffer from noise that ca introduce errors in the binary bits travelling from one system to other. That means a 0 bit may change to 1 or a 1 bit may change to 0.
  • 5. Error Detection: Error detection is the detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver. Error correction: Error correction is the detection of errors and reconstruction of the original, error-free data.
  • 6. Type of Error:  Single bit error.  Multi bits error.  Burst bits error. Single bit error: In a frame, there is only one bit, anywhere though, which is corrupt. Multi bits error: Frame is received with more than one bits in corrupted state. 0 1 0 1 0 0 1 1 1 0 1 1 0 1 1 1 0 0 0 1 Burst bits error: Frame contains more than1 consecutive bits corrupted.. 0 1 0 1 0 0 0 1 0 0 Sent Sent Sent Received Received Received
  • 7. Hamming code: In telecommunication, Hamming codes are a family of linear error-correcting. Hamming codes can detect up to two-bit or correct one-bit errors without detection of uncorrected errors. Parity bit: A parity bit, or check bit is a bit added to the end of a string of binary code that indicates where the number of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code.
  • 8. Error Detection and Correction process: We are using hamming code for error detection and correction.  Suppose ASCII code Y = 1011001. The data word is 7-bits.  Through the four hamming parity bits h1,h2,h3,h4 as 1,2,4 and 8 position with this word and arrange the 11 bits as follows: Bit position: 1 0 1 h4 1 0 0 h3 1 h2 h1 11 10 9 8 7 6 5 4 3 2 1
  • 9. 1 0 1 h4 1 0 0 h3 1 h2 h1 11 10 9 8 7 6 5 4 3 2 1 Bit position:  Select position of logic bit 1 for finding hamming code.  Here logic bits 1 number of position as 3, 7, 9 and 11  Now convert this data to binary code and addition this data using XOR operation.  Avoid carry when applying addition. 3 = 0 0 1 1 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1 Y = 1011001 0110 h4 h3 h2 h1
  • 10. 1 0 1 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Putting value of h1,h2,h3 and h4 for get hamming code.  Again select position of logic bit 1 for finding hamming code.  Here the logic bits are 1 number of position as 2, 3, 4, 7, 9 and 11. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1  Addition this data applying XOR operation.  If additional result all bits are 0. Then there is no error. 000 0
  • 11. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 1 to 0 no of bit position 9. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 11 = 1 0 1 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 101 0 = 9
  • 12. 1 0 1 0 1 0 0 1 0 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 0 to 1 no of bit position3. 2 = 0 0 1 0 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 0 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 100 1 = 3
  • 13. 0 0 1 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 1 to 0 no of bit position11. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 101 1 = 11
  • 14. USAGE OF HAMMING CODE  Hamming coding is only of use as a source code as a computer program to compress the characters. As a result it is only carried out in the front-end processor.  In Bangladesh railway business(Signaling) we have to follow specific safety standards. An important aspect is the data transferee is closed transmission system.
  • 15. Extremely effective on networks where the data streams are given to single-bit errors. ADVANTAGE OF HAMMING CODE
  • 16.  Single-bit detection and correction code, if multiple bits are errored then the errors are detected but the resultant could cause another bit that is correct to be changed, causing the data to be further errored. DISADVANTAGE OF HAMMING CODE  Hamming code only can solve up to single bits.