SlideShare a Scribd company logo
A. D. Patel Institute Of Technology
Mobile Computing and Wireless Communication (2170710): A. Y. 2019-20
Error Detection & Error Correction Codes
Prepared By :
Dhruv V. Shah (160010116053)
B.E. (IT) Sem - VII
Guided By :
Prof. Jayandrath Mangrolia
(Dept Of IT , ADIT)
Department Of Information Technology
A.D. Patel Institute Of Technology (ADIT)
New Vallabh Vidyanagar , Anand , Gujarat
1
Outline
 Introduction
 Types Of Error
 Error Detection
 Methods of Error Detection
 Error Correction
 Hamming Code
 Example Of Hamming Code
2
Introduction
 Networks must be able to transfer data from one device to another with complete
accuracy.
 Data can be corrupted during transmission.
 For reliable communication, errors must be detected and corrected.
 Error detection and correction are implemented either at the Data link layer or the
Transport layer of the OSI model.
3
Types Of Error
Fig (a). Types Of Error
4
1] Single Bit Error
 Single bit errors are the least likely type of errors in serial data transmission because the noise
must have a very short duration which is very rare. However this kind of errors can happen in
parallel transmission.
Fig (b). Single Bit Error
5
Example :
 If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.
 For a single-bit error to occur, the noise must have a duration of only 1 μs, which is very rare.
6
2] Burst Error
Fig (c).1 Burst Error
Fig (c).2 Burst Error
7
 The term burst error means that two or more bits in the data unit have changed from 1 to 0 or
from 0 to 1.
 Burst errors does not necessarily mean that the errors occur in consecutive bits, the length of the
burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may
not have been corrupted.
 Burst error is most likely to happen in serial transmission since the duration of noise is normally
longer than the duration of a bit.
 The number of bits affected depends on the data rate and duration of noise.
 Example :
 If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000)
 If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000 bits.(1/100*106)
8
Error Detection
 Error detection means to decide whether the received data is correct or not without having a copy
of the original message.
 Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
Fig (d). Redundancy
9
Methods Of Error Detection
Fig (e). Error Detection Methods
10
1] Vertical Redundancy Check (VRC)
Fig (e).1 VRC
11
 It is also known as parity check.
 It is least expensive mechanism for error detection.
 In this technique , the redundant bit called parity bit is appended to every data unit so that the
total number of 1s in the unit becomes even (including parity bit).
 VRC can detect all single – bit errors.
 It can detect burst errors if the total number of errors in each data unit is odd.
 VRC can not detect errors where the total number of bits changed is even.
12
2] Longitudinal Redundancy Check (LRC)
Fig (e).2 LRC
 LCR increases the likelihood of detecting burst errors.
 If two bits in one data units are damaged and two bits in exactly the same positions in another
data unit are also damaged, the LRC checker will not detect an error.
13
VRC and LRC :
Fig (e).3 VRC & LRC
14
Cyclic Redundancy Check (CRC)
Fig (e).4 CRC
15
Binary Division:
Fig (e).5 Binary Division
16
 Polynomial :
 Polynomial & Divisor:
 Standard Polynomial :
17
 The checksum detects all errors involving an odd number of bits.
 It detects most errors involving an even number of bits.
 If one or more bits of a segment are damaged and the corresponding bit or bits of opposite value
in a second segment are also damaged, the sums of those columns will not change and the receiver
will not detect a problem.
18
Error Correction
 It can be handled in two ways:
1) Receiver can have the sender retransmit the entire data unit.
2) The receiver can use an error-correcting code, which automatically corrects certain errors.
 There are two types of Error Correcting techniques :
1) Single bit error correction.
2) Burst error correction.
 Error Correction can be done with the help of HAMMING CODE.
19
1] Single bit error correction
 To correct an error, the receiver reverses the value of the altered bit. To do so, it must know which
bit is in error.
 Number of redundancy bits needed
• Let data bits = m;
• Redundancy bits = r;
Total message sent = m+r;
 The value of r must satisfy the following relation:
2r ≥ m+r+1
20
2] Hamming Code
 Hamming code can be applied to data units of any length and uses the relationship between data
and redundancy bits.For eg.,
21
22
23
24
25
Error Detection
26
27
Ad

More Related Content

What's hot (20)

Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
Rajapriya82
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
Ankan Adhikari
 
Check sum
Check sumCheck sum
Check sum
Pooja Jaiswal
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
Ajit Nayak
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Fddi
FddiFddi
Fddi
Anuj Gupta
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
Rajapriya82
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
Ankan Adhikari
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
Ajit Nayak
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 

Similar to Error Detection & Error Correction Codes (20)

901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
SofienBoutaib
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
BezaAlem2
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
KumarVaibhav100
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
MsSJeyalakshmiVelsUn
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
Jayaprasanna4
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Anil Kumar Sonkar Sonkar
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Tanzila Islam
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
logesswarisrinivasan
 
Data link layer
Data link layerData link layer
Data link layer
IndrajaMeghavathula
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
Mortadha96
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
SofienBoutaib
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
BezaAlem2
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
KumarVaibhav100
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
MsSJeyalakshmiVelsUn
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
4 implementation of various error detection and correction techniques in c...
4 implementation of    various error detection and correction techniques in c...4 implementation of    various error detection and correction techniques in c...
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Anil Kumar Sonkar Sonkar
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Tanzila Islam
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
Ad

More from ShahDhruv21 (12)

Semantic net in AI
Semantic net in AISemantic net in AI
Semantic net in AI
ShahDhruv21
 
Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)
ShahDhruv21
 
Data Mining in Health Care
Data Mining in Health CareData Mining in Health Care
Data Mining in Health Care
ShahDhruv21
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs
ShahDhruv21
 
MongoDB installation,CRUD operation & JavaScript shell
MongoDB installation,CRUD operation & JavaScript shellMongoDB installation,CRUD operation & JavaScript shell
MongoDB installation,CRUD operation & JavaScript shell
ShahDhruv21
 
2D Transformation
2D Transformation2D Transformation
2D Transformation
ShahDhruv21
 
Interpreter
InterpreterInterpreter
Interpreter
ShahDhruv21
 
Topological Sorting
Topological SortingTopological Sorting
Topological Sorting
ShahDhruv21
 
Pyramid Vector Quantization
Pyramid Vector QuantizationPyramid Vector Quantization
Pyramid Vector Quantization
ShahDhruv21
 
Event In JavaScript
Event In JavaScriptEvent In JavaScript
Event In JavaScript
ShahDhruv21
 
JSP Directives
JSP DirectivesJSP Directives
JSP Directives
ShahDhruv21
 
WaterFall Model & Spiral Mode
WaterFall Model & Spiral ModeWaterFall Model & Spiral Mode
WaterFall Model & Spiral Mode
ShahDhruv21
 
Semantic net in AI
Semantic net in AISemantic net in AI
Semantic net in AI
ShahDhruv21
 
Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)
ShahDhruv21
 
Data Mining in Health Care
Data Mining in Health CareData Mining in Health Care
Data Mining in Health Care
ShahDhruv21
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs
ShahDhruv21
 
MongoDB installation,CRUD operation & JavaScript shell
MongoDB installation,CRUD operation & JavaScript shellMongoDB installation,CRUD operation & JavaScript shell
MongoDB installation,CRUD operation & JavaScript shell
ShahDhruv21
 
2D Transformation
2D Transformation2D Transformation
2D Transformation
ShahDhruv21
 
Topological Sorting
Topological SortingTopological Sorting
Topological Sorting
ShahDhruv21
 
Pyramid Vector Quantization
Pyramid Vector QuantizationPyramid Vector Quantization
Pyramid Vector Quantization
ShahDhruv21
 
Event In JavaScript
Event In JavaScriptEvent In JavaScript
Event In JavaScript
ShahDhruv21
 
WaterFall Model & Spiral Mode
WaterFall Model & Spiral ModeWaterFall Model & Spiral Mode
WaterFall Model & Spiral Mode
ShahDhruv21
 
Ad

Recently uploaded (20)

Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Comprehensive-Event-Management-System.pptx
Comprehensive-Event-Management-System.pptxComprehensive-Event-Management-System.pptx
Comprehensive-Event-Management-System.pptx
dd7devdilip
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
W1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptxW1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptx
muhhxx51
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
How to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdfHow to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdf
jamedlimmk
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-02 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-02 notes [BCG402-CG&V].pdfCOMPUTER GRAPHICS AND VISUALIZATION :MODULE-02 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-02 notes [BCG402-CG&V].pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Comprehensive-Event-Management-System.pptx
Comprehensive-Event-Management-System.pptxComprehensive-Event-Management-System.pptx
Comprehensive-Event-Management-System.pptx
dd7devdilip
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
W1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptxW1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptx
muhhxx51
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
How to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdfHow to Buy Snapchat Account A Step-by-Step Guide.pdf
How to Buy Snapchat Account A Step-by-Step Guide.pdf
jamedlimmk
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 

Error Detection & Error Correction Codes

  • 1. A. D. Patel Institute Of Technology Mobile Computing and Wireless Communication (2170710): A. Y. 2019-20 Error Detection & Error Correction Codes Prepared By : Dhruv V. Shah (160010116053) B.E. (IT) Sem - VII Guided By : Prof. Jayandrath Mangrolia (Dept Of IT , ADIT) Department Of Information Technology A.D. Patel Institute Of Technology (ADIT) New Vallabh Vidyanagar , Anand , Gujarat 1
  • 2. Outline  Introduction  Types Of Error  Error Detection  Methods of Error Detection  Error Correction  Hamming Code  Example Of Hamming Code 2
  • 3. Introduction  Networks must be able to transfer data from one device to another with complete accuracy.  Data can be corrupted during transmission.  For reliable communication, errors must be detected and corrected.  Error detection and correction are implemented either at the Data link layer or the Transport layer of the OSI model. 3
  • 4. Types Of Error Fig (a). Types Of Error 4
  • 5. 1] Single Bit Error  Single bit errors are the least likely type of errors in serial data transmission because the noise must have a very short duration which is very rare. However this kind of errors can happen in parallel transmission. Fig (b). Single Bit Error 5
  • 6. Example :  If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.  For a single-bit error to occur, the noise must have a duration of only 1 μs, which is very rare. 6
  • 7. 2] Burst Error Fig (c).1 Burst Error Fig (c).2 Burst Error 7
  • 8.  The term burst error means that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1.  Burst errors does not necessarily mean that the errors occur in consecutive bits, the length of the burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may not have been corrupted.  Burst error is most likely to happen in serial transmission since the duration of noise is normally longer than the duration of a bit.  The number of bits affected depends on the data rate and duration of noise.  Example :  If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000)  If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000 bits.(1/100*106) 8
  • 9. Error Detection  Error detection means to decide whether the received data is correct or not without having a copy of the original message.  Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Fig (d). Redundancy 9
  • 10. Methods Of Error Detection Fig (e). Error Detection Methods 10
  • 11. 1] Vertical Redundancy Check (VRC) Fig (e).1 VRC 11
  • 12.  It is also known as parity check.  It is least expensive mechanism for error detection.  In this technique , the redundant bit called parity bit is appended to every data unit so that the total number of 1s in the unit becomes even (including parity bit).  VRC can detect all single – bit errors.  It can detect burst errors if the total number of errors in each data unit is odd.  VRC can not detect errors where the total number of bits changed is even. 12
  • 13. 2] Longitudinal Redundancy Check (LRC) Fig (e).2 LRC  LCR increases the likelihood of detecting burst errors.  If two bits in one data units are damaged and two bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. 13
  • 14. VRC and LRC : Fig (e).3 VRC & LRC 14
  • 15. Cyclic Redundancy Check (CRC) Fig (e).4 CRC 15
  • 16. Binary Division: Fig (e).5 Binary Division 16
  • 17.  Polynomial :  Polynomial & Divisor:  Standard Polynomial : 17
  • 18.  The checksum detects all errors involving an odd number of bits.  It detects most errors involving an even number of bits.  If one or more bits of a segment are damaged and the corresponding bit or bits of opposite value in a second segment are also damaged, the sums of those columns will not change and the receiver will not detect a problem. 18
  • 19. Error Correction  It can be handled in two ways: 1) Receiver can have the sender retransmit the entire data unit. 2) The receiver can use an error-correcting code, which automatically corrects certain errors.  There are two types of Error Correcting techniques : 1) Single bit error correction. 2) Burst error correction.  Error Correction can be done with the help of HAMMING CODE. 19
  • 20. 1] Single bit error correction  To correct an error, the receiver reverses the value of the altered bit. To do so, it must know which bit is in error.  Number of redundancy bits needed • Let data bits = m; • Redundancy bits = r; Total message sent = m+r;  The value of r must satisfy the following relation: 2r ≥ m+r+1 20
  • 21. 2] Hamming Code  Hamming code can be applied to data units of any length and uses the relationship between data and redundancy bits.For eg., 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 27. 27