SlideShare a Scribd company logo
MCWC
ERROR DETECTION
TECHNIQUES
Kunjan Shah
170 410 107 103
LY CE 2
Batch c
ERROR CONTROL AND DETECTION
• For reliable communication, errors must be detected and corrected.
• Data can be corrupted during transmission.
• Need to understand how errors is controlled and to know what type of errors may
occur.
• Error detection and correction are implemented either at the data link layer or the
transport layer of the OSI model.
TYPES OF ERRORS
1. Single bit: In a frame is only one bit, anywhere though which is corrupt.
2. Multiple bit: Frame is received with more than one bits in corrupted state.
TYPES OF ERRORS
3. Burst: Frame contains more than 1 bits corrupted.
ERROR DETECTION METHOD
 Error detection means to decide whether the received data is correct or not without having a
copy of the original message.
 Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
SIMPLE PARITY CHECK
• In this technique, a redundant bit called parity bit, is appended to every data unit so that the
number of 1s in the unit including the parity becomes even.
• Blocks of data from the source are subjected to a check bit or parity bit generator form,
where a parity of :
1 is added to the block if it contains odd number of 1’s, and
0 is added if it contains even number of 1’s
• This scheme makes the total number of 1’s even,
that is why it is called even parity checking.
TWO-DIMENSIONAL PARITY CHECK
• Parity check bits are calculated for each
row, which is equivalent to a simple
parity check bit.
• Parity check bits are also calculated for
all columns, then both are sent along
with the data.
• At the receiving end these are
compared with the parity bits calculated
on the received data.
CHECKSUM
 Here, the data is divided into k segments each
of m bits.
 In the sender’s end the segments are added
using 1’s complement arithmetic to get the
sum.
 The sum is complemented to get the
checksum.
 The checksum segment is sent along with the
data segments.
CHECKSUM
• At the receiver’s end, all received segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise discarded.
Performance
 The checksum detects all errors involving an odd number of bits.
 It also detects most errors involving even number of bits.
CYCLIC REDUNDANCY CHECKS (CRC)
 CRC is the most powerful and easy to implement technique.
 CRC is based on binary division.
 The divisor is generated using polynomials.
 It is commonly used to detect accidental changes to data transmitted via
telecommunications networks and storage devices.
CYCLIC REDUNDANCY CHECKS (CRC)
 The sender performs a division operation on the bits
being sent and calculates the remainder.
 Before sending the actual bits, the sender adds the
remainder at the end of the actual bits.
 Actual data bits plus the remainder is called a codeword.
The sender transmits data bits as codewords.
 At the other end, the receiver performs division
operation on codewords using the same CRC divisor.
 If the remainder contains all zeros the data bits are
accepted, otherwise it is considered as there some data
corruption occurred in transit.
CYCLIC REDUNDANCY CHECKS (CRC)
Error detection techniques

More Related Content

What's hot

Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Keerthi Reddy Yeruva
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 

What's hot (12)

Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular NetworkFootprint: Detecting Sybil Attacks in Urban Vehicular Network
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
 
Parity bits
Parity bitsParity bits
Parity bits
 
Faxes Received
Faxes ReceivedFaxes Received
Faxes Received
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Even odd parity
Even odd parityEven odd parity
Even odd parity
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 

Similar to Error detection techniques

computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
12 ipt 0301 Characteristics of a communication system
12 ipt 0301   Characteristics of a communication system12 ipt 0301   Characteristics of a communication system
12 ipt 0301 Characteristics of a communication system
ctedds
 

Similar to Error detection techniques (20)

III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
 
12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System
 
12 ipt 0301 Characteristics of a communication system
12 ipt 0301   Characteristics of a communication system12 ipt 0301   Characteristics of a communication system
12 ipt 0301 Characteristics of a communication system
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 

More from kunjan shah (6)

Multidimensional schema of data warehouse
Multidimensional schema of data warehouseMultidimensional schema of data warehouse
Multidimensional schema of data warehouse
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler design
 
season management in php (WT)
season management in php (WT)season management in php (WT)
season management in php (WT)
 
Web browser and web servers (WT)
Web browser and web servers (WT)Web browser and web servers (WT)
Web browser and web servers (WT)
 
Decision and looping examples with php (WT)
Decision and looping examples with php (WT)Decision and looping examples with php (WT)
Decision and looping examples with php (WT)
 
Generic view of software engineering SE
Generic view of software engineering SEGeneric view of software engineering SE
Generic view of software engineering SE
 

Recently uploaded

Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Error detection techniques

  • 2. ERROR CONTROL AND DETECTION • For reliable communication, errors must be detected and corrected. • Data can be corrupted during transmission. • Need to understand how errors is controlled and to know what type of errors may occur. • Error detection and correction are implemented either at the data link layer or the transport layer of the OSI model.
  • 3. TYPES OF ERRORS 1. Single bit: In a frame is only one bit, anywhere though which is corrupt. 2. Multiple bit: Frame is received with more than one bits in corrupted state.
  • 4. TYPES OF ERRORS 3. Burst: Frame contains more than 1 bits corrupted.
  • 5. ERROR DETECTION METHOD  Error detection means to decide whether the received data is correct or not without having a copy of the original message.  Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.
  • 6. SIMPLE PARITY CHECK • In this technique, a redundant bit called parity bit, is appended to every data unit so that the number of 1s in the unit including the parity becomes even. • Blocks of data from the source are subjected to a check bit or parity bit generator form, where a parity of : 1 is added to the block if it contains odd number of 1’s, and 0 is added if it contains even number of 1’s • This scheme makes the total number of 1’s even, that is why it is called even parity checking.
  • 7. TWO-DIMENSIONAL PARITY CHECK • Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. • Parity check bits are also calculated for all columns, then both are sent along with the data. • At the receiving end these are compared with the parity bits calculated on the received data.
  • 8. CHECKSUM  Here, the data is divided into k segments each of m bits.  In the sender’s end the segments are added using 1’s complement arithmetic to get the sum.  The sum is complemented to get the checksum.  The checksum segment is sent along with the data segments.
  • 9. CHECKSUM • At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented. • If the result is zero, the received data is accepted; otherwise discarded. Performance  The checksum detects all errors involving an odd number of bits.  It also detects most errors involving even number of bits.
  • 10. CYCLIC REDUNDANCY CHECKS (CRC)  CRC is the most powerful and easy to implement technique.  CRC is based on binary division.  The divisor is generated using polynomials.  It is commonly used to detect accidental changes to data transmitted via telecommunications networks and storage devices.
  • 11. CYCLIC REDUNDANCY CHECKS (CRC)  The sender performs a division operation on the bits being sent and calculates the remainder.  Before sending the actual bits, the sender adds the remainder at the end of the actual bits.  Actual data bits plus the remainder is called a codeword. The sender transmits data bits as codewords.  At the other end, the receiver performs division operation on codewords using the same CRC divisor.  If the remainder contains all zeros the data bits are accepted, otherwise it is considered as there some data corruption occurred in transit.