SlideShare a Scribd company logo
1 of 33
Computer Network and
Communication
SKR 3200

1
Learning Outcome
• Show how to detect an error (P2)
• Show how the errors being corrected (P2)
• Explain the method being used to detect
and corrected the errors (A3)
Contents
• Types of Error
– Single bit error
– Burst error
• Error Detection
– Parity Check
– CRC
– Checksum
• Error Correction
– Hamming Code
3
Types of Errors


Single bit error – only one bit is changed from 1 to 0 or
from 0 to 1.



Burst error – two or more bits in the data unit have
changed.

4
Error Detection


Error detection uses the concepts of redundancy, which
means adding extra bits detecting errors at the
destination.

5
3 common error detection techniques
Parity Check

Checksum

(most basic)

(used
primarily by
upper layers)

Cyclic Redundancy Check (CRC)
(normally implemented in link layer)
6
Parity Check







Simplest technique.
A redundant bit (parity bit), is appended to every data
unit.
Even parity - the total number of 1's in the data plus
parity bit must be an even number.
VRC – Vertical Redundancy Check

7
Even Parity Generator
Data
0110110
0011111
0000000
1010100
1111111

#1's in data
4 (Even)
5 (Odd)
0 (Even)
3 (Odd)
7 (Odd)

P
0
1
0
1
1

Total # 1's (data and P)
4 (Even)
6 (Even)
0 (Even)
4 (Even)
8 (Even)

8
9
Example 1
Even Parity

Suppose the sender wants to send the word world. In ASCII
the five characters are coded as
1110111 1101111 1110010 1101100 1100100
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001

10
Example 2
Even Parity

Now suppose the word world in Example 1 is received by the
receiver without being corrupted in transmission.
11101110 11011110 11100100 11011000 11001001
The receiver counts the 1s in each character and comes up
with even numbers (6, 6, 4, 4, 4). The data are accepted.

11
Example 3
Even Parity

Now suppose the word world in Example 1 is corrupted
during transmission.
11111110 11011110 11101100 11011000 11001001
The receiver counts the 1s in each character and comes up
with even and odd numbers (7, 6, 5, 4, 4). The receiver
knows that the data are corrupted, discards them, and asks
for retransmission.
12
CRC







The most powerful of the redundancy checking
technique.
Based on binary division.
The redundancy bits used by CRC are derived by
dividing the data unit by a predetermined divisor; the
remainder is the CRC.
A CRC must:

have exactly one less bit than the divisor

appending it to the end of the data string must make
the resulting bit sequence exactly divisible by the
divisor.
13
CRC generator and checker

1.
2.
3.

Receive the frame.
Divide it by divisor.
Check the remainder.

1.
2.
3.
4.

Get the raw frame.
Left shift the raw frame by n bits
and divide it by divisor.
The remainder is the CRC bit.
Append the CRC bit to the frame
and transmit.
14
Division in CRC encoder

15
Division in the CRC decoder for two cases

16




CRC generator – at the sending node.
CRC checker – at the receiving node.
Polynomial:

The CRC generator (the divisor) is most often
represented as an algebraic polynomial.

e.g.

17
A polynomial representing a divisor

18
Standard polynomials
Name

Polynomial

Application

CRC-8

x8 + x2 + x + 1

ATM header

CRC-10

x10 + x9 + x5 + x4 + x 2 + 1

ATM AAL

ITU-16

x16 + x12 + x5 + 1

HDLC

ITU-32

x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 +
x7 + x5 + x4 + x2 + x + 1

LANs

19
Checksum







The error detection used by the higher-layer
protocols.
Check generator – in the sending node
Checksum checker – at receiving node
SFD – Start Frame Delimiter
FCS – Frame Check Sequence

Ethernet frame

20
Data unit and checksum

21
Example 6
Suppose the following block of 16 bits is to be sent using a
checksum of 8 bits.
10101001 00111001
The numbers are added using one’s complement
10101001

Sum
Checksum

00111001
-----------11100010
00011101

The pattern sent is

10101001 00111001 00011101

22
Example 7
Now suppose the receiver receives the pattern sent in
Example 6 and there is no error.
10101001 00111001 00011101
When the receiver adds the three sections, it will get all 1s,
which, after complementing, is all 0s and shows that there is
no error.
10101001
00111001
00011101
-----------Sum

11111111

Complement

00000000 means that the pattern is OK.

23
Example 8
Now suppose there is a burst error of length 5 that affects 4
bits.
Original data

10101001 00111001 00011101

Corrupted data

10101111 11111001 00011101

When the receiver adds the three sections, it gets
10101111
11111001
00011101
Partial Sum

1 11000101

Carry
Sum
Complement

1
11000110
00111001

the pattern is corrupted.

24
Error Correction
Hamming Code

Focus on a simple case: Single-Bit Error
Correction

Use the relationship between data and
redundancy bits

Developed by Richard Hamming

25
Data and redundancy bits
Number of
data bits
m

Number of
redundancy bits
r

Total
bits
m+r

1

2

3

2

3

5

3

3

6

4

3

7

5

4

9

6

4

10

7

4

11
26
Positions of redundancy bits in Hamming code (11,7)

* Check bits occupy positions that are powers of 2
27
• All bit positions that are powers of 2 are used as
parity bits. (positions 1, 2, 4, 8…)
• All other bit positions are for the data to be
encoded. (positions 3, 5, 6, 7, 9, 10, 11…)
• Each parity bit calculates the parity for some of
the bits in the code word. The position of the
parity bit determines the sequence of bits that it
alternately checks and skips.
• General rule for position n: skip n−1 bits, check n
bits, skip n bits, check n bits...

28
• Position 1 (n=1): skip 0 bit (0=n−1), check 1 bit (n), skip
1 bit (n), check 1 bit (n), skip 1 bit (n), etc.
(1,3,5,7,9,11...)
• Position 2 (n=2): skip 1 bit (1=n−1), check 2 bits (n), skip
2 bits (n), check 2 bits (n), skip 2 bits (n), etc.
(2,3,6,7,10,11...)
• Position 4 (n=4): skip 3 bits (3=n−1), check 4 bits (n),
skip 4 bits (n), check 4 bits (n), skip 4 bits (n), etc.
(4,5,6,7,12...)
• Position 8 (n=8): skip 7 bits (7=n−1), check 8 bits (n),
skip 8 bits (n), check 8 bits (n), skip 8 bits (n), etc. (815,24-31,40-47,...)
Redundancy bits calculation

30
Example of redundancy bit calculation

31
Single-Bit Error

32
Error detection using Hamming code

Error
Detection

33

More Related Content

What's hot

The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layerrobbbminson
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and CorrectionTarjMehta1
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibraribrar562
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy CheckRajan Shah
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 
CRC Error coding technique
CRC Error coding techniqueCRC Error coding technique
CRC Error coding techniqueMantra VLSI
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst errorTanzila Islam
 

What's hot (18)

network
networknetwork
network
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Check sum
Check sumCheck sum
Check sum
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error control
Error controlError control
Error control
 
Data link layar
Data link layarData link layar
Data link layar
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
CRC Error coding technique
CRC Error coding techniqueCRC Error coding technique
CRC Error coding technique
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 

Similar to Skr+3200+chapter+3+(kweh)

Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module IIAjit Nayak
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
 
Data link layar
Data link layarData link layar
Data link layarjaysans
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and CorrectionMahesh Kumar Attri
 
Lecture 5 from virtual university of pakistan
Lecture 5 from virtual university of pakistanLecture 5 from virtual university of pakistan
Lecture 5 from virtual university of pakistanSaba Hanif
 
9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink LayerZahouAmel1
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfBalasubramanian699229
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptnesarahmad37
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksNt Arvind
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networksDHIVYADEVAKI
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxgadisaAdamu
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.pptDrPreethiD1
 

Similar to Skr+3200+chapter+3+(kweh) (20)

Ch3 datalink
Ch3 datalinkCh3 datalink
Ch3 datalink
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Data link layar
Data link layarData link layar
Data link layar
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5 from virtual university of pakistan
Lecture 5 from virtual university of pakistanLecture 5 from virtual university of pakistan
Lecture 5 from virtual university of pakistan
 
Data link layar
Data link layarData link layar
Data link layar
 
9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer9-Lect_9-2.pptx DataLink Layer DataLink Layer
9-Lect_9-2.pptx DataLink Layer DataLink Layer
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 

More from Ammar Shafiq

50 strategi pemasaran Internet
50 strategi pemasaran Internet50 strategi pemasaran Internet
50 strategi pemasaran InternetAmmar Shafiq
 
Blueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyBlueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyAmmar Shafiq
 
Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sectorAmmar Shafiq
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notesAmmar Shafiq
 

More from Ammar Shafiq (7)

50 strategi pemasaran Internet
50 strategi pemasaran Internet50 strategi pemasaran Internet
50 strategi pemasaran Internet
 
Blueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyBlueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube Strategy
 
Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sector
 
Quality costing
Quality costingQuality costing
Quality costing
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 

Recently uploaded

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Skr+3200+chapter+3+(kweh)

  • 2. Learning Outcome • Show how to detect an error (P2) • Show how the errors being corrected (P2) • Explain the method being used to detect and corrected the errors (A3)
  • 3. Contents • Types of Error – Single bit error – Burst error • Error Detection – Parity Check – CRC – Checksum • Error Correction – Hamming Code 3
  • 4. Types of Errors  Single bit error – only one bit is changed from 1 to 0 or from 0 to 1.  Burst error – two or more bits in the data unit have changed. 4
  • 5. Error Detection  Error detection uses the concepts of redundancy, which means adding extra bits detecting errors at the destination. 5
  • 6. 3 common error detection techniques Parity Check Checksum (most basic) (used primarily by upper layers) Cyclic Redundancy Check (CRC) (normally implemented in link layer) 6
  • 7. Parity Check     Simplest technique. A redundant bit (parity bit), is appended to every data unit. Even parity - the total number of 1's in the data plus parity bit must be an even number. VRC – Vertical Redundancy Check 7
  • 8. Even Parity Generator Data 0110110 0011111 0000000 1010100 1111111 #1's in data 4 (Even) 5 (Odd) 0 (Even) 3 (Odd) 7 (Odd) P 0 1 0 1 1 Total # 1's (data and P) 4 (Even) 6 (Even) 0 (Even) 4 (Even) 8 (Even) 8
  • 9. 9
  • 10. Example 1 Even Parity Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001 10
  • 11. Example 2 Even Parity Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted. 11
  • 12. Example 3 Even Parity Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission. 12
  • 13. CRC     The most powerful of the redundancy checking technique. Based on binary division. The redundancy bits used by CRC are derived by dividing the data unit by a predetermined divisor; the remainder is the CRC. A CRC must:  have exactly one less bit than the divisor  appending it to the end of the data string must make the resulting bit sequence exactly divisible by the divisor. 13
  • 14. CRC generator and checker 1. 2. 3. Receive the frame. Divide it by divisor. Check the remainder. 1. 2. 3. 4. Get the raw frame. Left shift the raw frame by n bits and divide it by divisor. The remainder is the CRC bit. Append the CRC bit to the frame and transmit. 14
  • 15. Division in CRC encoder 15
  • 16. Division in the CRC decoder for two cases 16
  • 17.    CRC generator – at the sending node. CRC checker – at the receiving node. Polynomial:  The CRC generator (the divisor) is most often represented as an algebraic polynomial.  e.g. 17
  • 19. Standard polynomials Name Polynomial Application CRC-8 x8 + x2 + x + 1 ATM header CRC-10 x10 + x9 + x5 + x4 + x 2 + 1 ATM AAL ITU-16 x16 + x12 + x5 + 1 HDLC ITU-32 x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 LANs 19
  • 20. Checksum      The error detection used by the higher-layer protocols. Check generator – in the sending node Checksum checker – at receiving node SFD – Start Frame Delimiter FCS – Frame Check Sequence Ethernet frame 20
  • 21. Data unit and checksum 21
  • 22. Example 6 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits. 10101001 00111001 The numbers are added using one’s complement 10101001 Sum Checksum 00111001 -----------11100010 00011101 The pattern sent is 10101001 00111001 00011101 22
  • 23. Example 7 Now suppose the receiver receives the pattern sent in Example 6 and there is no error. 10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 -----------Sum 11111111 Complement 00000000 means that the pattern is OK. 23
  • 24. Example 8 Now suppose there is a burst error of length 5 that affects 4 bits. Original data 10101001 00111001 00011101 Corrupted data 10101111 11111001 00011101 When the receiver adds the three sections, it gets 10101111 11111001 00011101 Partial Sum 1 11000101 Carry Sum Complement 1 11000110 00111001 the pattern is corrupted. 24
  • 25. Error Correction Hamming Code  Focus on a simple case: Single-Bit Error Correction  Use the relationship between data and redundancy bits  Developed by Richard Hamming 25
  • 26. Data and redundancy bits Number of data bits m Number of redundancy bits r Total bits m+r 1 2 3 2 3 5 3 3 6 4 3 7 5 4 9 6 4 10 7 4 11 26
  • 27. Positions of redundancy bits in Hamming code (11,7) * Check bits occupy positions that are powers of 2 27
  • 28. • All bit positions that are powers of 2 are used as parity bits. (positions 1, 2, 4, 8…) • All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11…) • Each parity bit calculates the parity for some of the bits in the code word. The position of the parity bit determines the sequence of bits that it alternately checks and skips. • General rule for position n: skip n−1 bits, check n bits, skip n bits, check n bits... 28
  • 29. • Position 1 (n=1): skip 0 bit (0=n−1), check 1 bit (n), skip 1 bit (n), check 1 bit (n), skip 1 bit (n), etc. (1,3,5,7,9,11...) • Position 2 (n=2): skip 1 bit (1=n−1), check 2 bits (n), skip 2 bits (n), check 2 bits (n), skip 2 bits (n), etc. (2,3,6,7,10,11...) • Position 4 (n=4): skip 3 bits (3=n−1), check 4 bits (n), skip 4 bits (n), check 4 bits (n), skip 4 bits (n), etc. (4,5,6,7,12...) • Position 8 (n=8): skip 7 bits (7=n−1), check 8 bits (n), skip 8 bits (n), check 8 bits (n), skip 8 bits (n), etc. (815,24-31,40-47,...)
  • 31. Example of redundancy bit calculation 31
  • 33. Error detection using Hamming code Error Detection 33