SlideShare a Scribd company logo
Data Link Layer PART III
Position of the  data-link  layer
Data link layer  duties
Chapter 10 Error Detection and Correction
Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note:
10.1  Types of Error Single-Bit Error Burst Error
In a single-bit error, only one bit in the data unit has changed. Note:
10.1   Single-bit error
A burst error means that 2 or more bits in the data unit have changed. Note:
10.2   Burst error of length 5
10.2  Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note:
10.3   Redundancy
10.4   Detection methods
10.5   Even-parity concept
In parity check, a parity bit is added to every data unit so that the total number of 1s is even  (or odd for odd-parity). Note:
Example 1 Suppose the sender wants to send the word  world . In ASCII the five characters are coded as  1110111  1101111  1110010  1101100  1100100 The following shows the actual bits sent 1110111 0   1101111 0   1110010 0   1101100 0   1100100 1
Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.  11101110  11011110  11100100  11011000  11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
Example 3 Now suppose the word world in Example 1 is corrupted during transmission.  11111110  11011110  11101100  11011000  11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note:
10.6   Two-dimensional parity
Example 4 Suppose the following block is sent: 10101001  00111001  11011101  11100111  10101010  However, it is hit by a burst noise of length 8, and some bits are corrupted.  1010 0011   1000 1001  11011101  11100111  10101010  When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011  10001001  11011101  11100111  1 0 101 0 1 0
In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note:
10.7   CRC generator and checker
10.8   Binary division in a CRC generator
10.9   Binary division in CRC checker
10.10   A polynomial
10.11   A polynomial representing a divisor
Table 10.1  Standard polynomials Name Polynomial Application CRC-8 x 8  +  x 2  +  x  + 1 ATM header CRC-10 x 10  +  x 9  +  x 5  +  x 4  +  x  2  + 1 ATM AAL ITU-16 x 16  +  x 12  +  x 5  + 1 HDLC ITU-32 x 32  +  x 26  +  x 23  +  x 22  +  x 16  +  x 12  +  x 11  +  x 10  +  x 8  +  x 7  +  x 5  +  x 4  +  x 2  +  x  + 1 LANs
Example 5 It is obvious that we cannot choose  x  (binary 10) or  x 2  + x  (binary 110) as the polynomial because both are divisible by x. However, we can choose  x + 1  (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose  x 2  + 1  (binary 101) because it is divisible by x + 1 (binary division).
Example 6 The CRC-12  x 12  + x 11  + x 3  + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
10.12   Checksum
10.13   Data unit and checksum
[object Object],[object Object],[object Object],[object Object],[object Object],Note:
[object Object],[object Object],[object Object],[object Object],[object Object],Note:
Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits.  10101001  00111001  The numbers are added using one’s complement 10101001  00111001   ------------ Sum   11100010 Checksum  00011101 The pattern sent is  10101001  00111001  00011101
Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error.  10101001  00111001  00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error.  10101001 00111001  00011101  Sum 11111111  Complement  00000000   means that the pattern is OK.
Example 9 Now suppose there is a burst error of length 5 that affects 4 bits.  10101 111  11 111001  00011101 When the receiver adds the three sections, it gets  10101111 11111001  00011101  Partial Sum  1  11000101 Carry   1 Sum 11000110  Complement  00111001   the pattern is corrupted.
10.3  Correction Retransmission Forward Error Correction Burst Error Correction
Table 10.2  Data and redundancy bits Number of data bits m Number of  redundancy bits r Total  bits m + r 1 2 3 2 3 5 3 3 6 4 3 7 5 4 9 6 4 10 7 4 11
10.14   Positions of redundancy bits in Hamming code
10.15   Redundancy bits calculation
10.16   Example of redundancy bit calculation
10.17   Error detection using Hamming code
10.18   Burst error correction example

More Related Content

What's hot

Lecture 20
Lecture 20Lecture 20
Lecture 20
Sehrish Rafiq
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Data link layar
Data link layarData link layar
Data link layar
jaysanshrestha
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
T com presentation (error correcting code)
T com presentation   (error correcting code)T com presentation   (error correcting code)
T com presentation (error correcting code)
Akshit Jain
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
KARIMU KHATWABI
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
TarjMehta1
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
Shamim Hossain
 
Ch10
Ch10Ch10
Ch10
Lia Nakid
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
Sehrish Rafiq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Cathryn Kuteesa
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
Umesh Gupta
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
Krishbathija
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Rusty Millabas
 

What's hot (20)

Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Data link layar
Data link layarData link layar
Data link layar
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
T com presentation (error correcting code)
T com presentation   (error correcting code)T com presentation   (error correcting code)
T com presentation (error correcting code)
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 
Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
 
Ch10
Ch10Ch10
Ch10
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 

Viewers also liked

IS Imaging Station
IS Imaging StationIS Imaging Station
IS Imaging Station
Topcon Middle East
 
Topsurv 7
Topsurv 7Topsurv 7
New Products From Kimball Office
New Products From Kimball OfficeNew Products From Kimball Office
New Products From Kimball Office
joerobe
 
Swot
SwotSwot
IS Imaging Station
IS Imaging StationIS Imaging Station
IS Imaging Station
Topcon Middle East
 
2006 Iarep Parigi Paper
2006 Iarep Parigi Paper2006 Iarep Parigi Paper
2006 Iarep Parigi Paper
FabioBuoncristiano
 
Topcon Positioning Product General Brochure
Topcon Positioning Product General BrochureTopcon Positioning Product General Brochure
Topcon Positioning Product General BrochureTopcon Middle East
 
Mscnastran2004
Mscnastran2004Mscnastran2004
Mscnastran2004
ansbigian
 

Viewers also liked (8)

IS Imaging Station
IS Imaging StationIS Imaging Station
IS Imaging Station
 
Topsurv 7
Topsurv 7Topsurv 7
Topsurv 7
 
New Products From Kimball Office
New Products From Kimball OfficeNew Products From Kimball Office
New Products From Kimball Office
 
Swot
SwotSwot
Swot
 
IS Imaging Station
IS Imaging StationIS Imaging Station
IS Imaging Station
 
2006 Iarep Parigi Paper
2006 Iarep Parigi Paper2006 Iarep Parigi Paper
2006 Iarep Parigi Paper
 
Topcon Positioning Product General Brochure
Topcon Positioning Product General BrochureTopcon Positioning Product General Brochure
Topcon Positioning Product General Brochure
 
Mscnastran2004
Mscnastran2004Mscnastran2004
Mscnastran2004
 

Similar to network

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
Mahesh Kumar Attri
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 
Data link layar
Data link layarData link layar
Data link layar
jaysans
 
Data link layar
Data link layarData link layar
Data link layar
jaysanshrestha
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
SibiSanta
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
Ajit Nayak
 
Error Detect and Correct.ppt
Error Detect and Correct.pptError Detect and Correct.ppt
Error Detect and Correct.ppt
ssuser0c2093
 
Data linklayer
Data linklayerData linklayer
Data linklayer
sheikhshakir
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Faisal Mehmood
 
Ch10
Ch10Ch10
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
QUT (Queensland University of Technology)
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
Ch10
Ch10Ch10
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
Nitesh Singh
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Ch10
Ch10Ch10
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
prashant513130
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
IKhait
 

Similar to network (20)

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
Error Detect and Correct.ppt
Error Detect and Correct.pptError Detect and Correct.ppt
Error Detect and Correct.ppt
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Ch10
Ch10Ch10
Ch10
 
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
Ch10
Ch10Ch10
Ch10
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Ch10
Ch10Ch10
Ch10
 
5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt5(1)crc-chechsum-hamming.ppt
5(1)crc-chechsum-hamming.ppt
 
hamming code detailed
hamming code detailedhamming code detailed
hamming code detailed
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

network

  • 1. Data Link Layer PART III
  • 2. Position of the data-link layer
  • 4. Chapter 10 Error Detection and Correction
  • 5. Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note:
  • 6. 10.1 Types of Error Single-Bit Error Burst Error
  • 7. In a single-bit error, only one bit in the data unit has changed. Note:
  • 8. 10.1 Single-bit error
  • 9. A burst error means that 2 or more bits in the data unit have changed. Note:
  • 10. 10.2 Burst error of length 5
  • 11. 10.2 Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
  • 12. Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note:
  • 13. 10.3 Redundancy
  • 14. 10.4 Detection methods
  • 15. 10.5 Even-parity concept
  • 16. In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd-parity). Note:
  • 17. Example 1 Suppose the sender wants to send the word world . In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 1110111 0 1101111 0 1110010 0 1101100 0 1100100 1
  • 18. Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
  • 19. Example 3 Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
  • 20. Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note:
  • 21. 10.6 Two-dimensional parity
  • 22. Example 4 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 1010 0011 1000 1001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011 10001001 11011101 11100111 1 0 101 0 1 0
  • 23. In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note:
  • 24. 10.7 CRC generator and checker
  • 25. 10.8 Binary division in a CRC generator
  • 26. 10.9 Binary division in CRC checker
  • 27. 10.10 A polynomial
  • 28. 10.11 A polynomial representing a divisor
  • 29. Table 10.1 Standard polynomials Name Polynomial Application CRC-8 x 8 + x 2 + x + 1 ATM header CRC-10 x 10 + x 9 + x 5 + x 4 + x 2 + 1 ATM AAL ITU-16 x 16 + x 12 + x 5 + 1 HDLC ITU-32 x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 LANs
  • 30. Example 5 It is obvious that we cannot choose x (binary 10) or x 2 + x (binary 110) as the polynomial because both are divisible by x. However, we can choose x + 1 (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose x 2 + 1 (binary 101) because it is divisible by x + 1 (binary division).
  • 31. Example 6 The CRC-12 x 12 + x 11 + x 3 + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
  • 32. 10.12 Checksum
  • 33. 10.13 Data unit and checksum
  • 34.
  • 35.
  • 36. Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits. 10101001 00111001 The numbers are added using one’s complement 10101001 00111001 ------------ Sum 11100010 Checksum 00011101 The pattern sent is 10101001 00111001 00011101
  • 37. Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error. 10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 Sum 11111111 Complement 00000000 means that the pattern is OK.
  • 38. Example 9 Now suppose there is a burst error of length 5 that affects 4 bits. 10101 111 11 111001 00011101 When the receiver adds the three sections, it gets 10101111 11111001 00011101 Partial Sum 1 11000101 Carry 1 Sum 11000110 Complement 00111001 the pattern is corrupted.
  • 39. 10.3 Correction Retransmission Forward Error Correction Burst Error Correction
  • 40. Table 10.2 Data and redundancy bits Number of data bits m Number of redundancy bits r Total bits m + r 1 2 3 2 3 5 3 3 6 4 3 7 5 4 9 6 4 10 7 4 11
  • 41. 10.14 Positions of redundancy bits in Hamming code
  • 42. 10.15 Redundancy bits calculation
  • 43. 10.16 Example of redundancy bit calculation
  • 44. 10.17 Error detection using Hamming code
  • 45. 10.18 Burst error correction example