SlideShare una empresa de Scribd logo
1 de 48
Data Link Layer PART III
Position of the  data-link  layer
Data link layer  duties
LLC and MAC sublayers
IEEE standards for LANs
Chapters Chapter 10   Error Detection and Correction Chapter 11   Data Link Control and Protocols Chapter 12   Point-To-Point Access Chapter 13 Multiple Access Chapter 14 Local Area Networks Chapter 15   Wireless LANs Chapter 16   Connecting LANs Chapter 17   Cellular Telephone and Satellite Networks Chapter 18   Virtual Circuit Switching
Chapter 10 Error Detection and Correction
Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note :
10.1  Types of Error Single-Bit Error Burst Error
In a single-bit error, only one bit in the data unit has changed. Note :
10.1   Single-bit error
A burst error means that 2 or more bits in the data unit have changed. Note :
10.2   Burst error of length 5
10.2  Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note :
10.3   Redundancy
10.4   Detection methods
10.5   Even-parity concept
In parity check, a parity bit is added to every data unit so that the total number of 1s is even  (or odd for odd-parity). Note :
Example 1 Suppose the sender wants to send the word  world . In ASCII the five characters are coded as  1110111  1101111  1110010  1101100  1100100 The following shows the actual bits sent 1110111 0   1101111 0   1110010 0   1101100 0   1100100 1
Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.  11101110  11011110  11100100  11011000  11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
Example 3 Now suppose the word world in Example 1 is corrupted during transmission.  11111110  11011110  11101100  11011000  11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note :
10.6   Two-dimensional parity
Example 4 Suppose the following block is sent: 10101001  00111001  11011101  11100111  10101010  However, it is hit by a burst noise of length 8, and some bits are corrupted.  1010 0011   1000 1001  11011101  11100111  10101010  When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011  10001001  11011101  11100111  1 0 101 0 1 0
In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note :
10.7   CRC generator and checker
10.8   Binary division in a CRC generator
10.9   Binary division in CRC checker
10.10   A polynomial
10.11   A polynomial representing a divisor
Table 10.1  Standard polynomials x 32   +   x 26  +   x 23   +   x 22   +   x 16   +   x 12   +   x 11   +   x 10   +  x 8  +   x 7   +   x 5   +   x 4   +   x 2   +   x  +  1 x 16   +   x 12   +   x 5  +  1 x 10   +   x 9  +   x 5  +   x 4  +   x  2   +  1 x 8  +   x 2  +   x   +  1 Polynomial LANs ITU-32 HDLC ITU-16 ATM AAL CRC-10 ATM header CRC-8 Application Name
Example 5 It is obvious that we cannot choose  x  (binary 10) or  x 2  + x  (binary 110) as the polynomial because both are divisible by x. However, we can choose  x + 1  (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose  x 2  + 1  (binary 101) because it is divisible by x + 1 (binary division).
Example 6 The CRC-12  x 12  + x 11  + x 3  + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
10.12   Checksum
10.13   Data unit and checksum
[object Object],[object Object],[object Object],[object Object],[object Object],Note :
[object Object],[object Object],[object Object],[object Object],[object Object],Note :
Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits.  10101001  00111001  The numbers are added using one’s complement 10101001  00111001   ------------ Sum   11100010 Checksum  00011101 The pattern sent is  10101001  00111001  00011101
Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error.  10101001  00111001  00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error.  10101001 00111001  00011101  Sum 11111111  Complement  00000000   means that the pattern is OK.
Example 9 Now suppose there is a burst error of length 5 that affects 4 bits.  10101 111   11 111001  00011101 When the receiver adds the three sections, it gets  10101111 11111001  00011101  Partial Sum  1  11000101 Carry   1 Sum 11000110  Complement  00111001   the pattern is corrupted.
10.3  Correction Retransmission Forward Error Correction Burst Error Correction
Table 10.2  Data and redundancy bits 11 4 7 7 3 4 9 4 5 10 4 6 3 3 2 Number of  redundancy bits r 6 3 5 2 3 1 Total  bits m + r Number of data bits m
10.14   Positions of redundancy bits in Hamming code
10.15   Redundancy bits calculation
10.16   Example of redundancy bit calculation
10.17   Error detection using Hamming code
10.18   Burst error correction example

Más contenido relacionado

La actualidad más candente

Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 

La actualidad más candente (20)

Number System
Number SystemNumber System
Number System
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)3. line coding( bipolar, multilevel, multitransition)
3. line coding( bipolar, multilevel, multitransition)
 
Bit pair recoding
Bit pair recodingBit pair recoding
Bit pair recoding
 
Booth's algorithm part 2
Booth's algorithm part 2Booth's algorithm part 2
Booth's algorithm part 2
 
Physical Layer Numericals - Data Communication & Networking
Physical Layer  Numericals - Data Communication & NetworkingPhysical Layer  Numericals - Data Communication & Networking
Physical Layer Numericals - Data Communication & Networking
 
Checksum explaination
Checksum explainationChecksum explaination
Checksum explaination
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Wired and Wireless Examples in ns2
Wired and Wireless Examples in ns2Wired and Wireless Examples in ns2
Wired and Wireless Examples in ns2
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 

Destacado

Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
Huawei Technologies
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
Farzad Ramin
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
Robert Almazan
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 

Destacado (20)

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
 
Even odd parity
Even odd parityEven odd parity
Even odd parity
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 16
Ch 16Ch 16
Ch 16
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 24
Ch 24Ch 24
Ch 24
 
Parity bits
Parity bitsParity bits
Parity bits
 
Ch 18
Ch 18Ch 18
Ch 18
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 14
Ch 14Ch 14
Ch 14
 

Similar a Ch 10

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
Mahesh Kumar Attri
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
Error Detect and Correct.ppt
Error Detect and Correct.pptError Detect and Correct.ppt
Error Detect and Correct.ppt
ssuser0c2093
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
BeniamTekeste
 

Similar a Ch 10 (20)

network
networknetwork
network
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
 
Error Detect and Correct.ppt
Error Detect and Correct.pptError Detect and Correct.ppt
Error Detect and Correct.ppt
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
Ch10
Ch10Ch10
Ch10
 
Ch10
Ch10Ch10
Ch10
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Ch10
Ch10Ch10
Ch10
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 

Más de soumya ranjan mohanty (19)

Ch 30
Ch 30Ch 30
Ch 30
 
Ch 26
Ch 26Ch 26
Ch 26
 
Ch 25
Ch 25Ch 25
Ch 25
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 1
Ch 1Ch 1
Ch 1
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Ch 10

  • 1. Data Link Layer PART III
  • 2. Position of the data-link layer
  • 4. LLC and MAC sublayers
  • 6. Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control and Protocols Chapter 12 Point-To-Point Access Chapter 13 Multiple Access Chapter 14 Local Area Networks Chapter 15 Wireless LANs Chapter 16 Connecting LANs Chapter 17 Cellular Telephone and Satellite Networks Chapter 18 Virtual Circuit Switching
  • 7. Chapter 10 Error Detection and Correction
  • 8. Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note :
  • 9. 10.1 Types of Error Single-Bit Error Burst Error
  • 10. In a single-bit error, only one bit in the data unit has changed. Note :
  • 11. 10.1 Single-bit error
  • 12. A burst error means that 2 or more bits in the data unit have changed. Note :
  • 13. 10.2 Burst error of length 5
  • 14. 10.2 Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
  • 15. Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note :
  • 16. 10.3 Redundancy
  • 17. 10.4 Detection methods
  • 18. 10.5 Even-parity concept
  • 19. In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd-parity). Note :
  • 20. Example 1 Suppose the sender wants to send the word world . In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 1110111 0 1101111 0 1110010 0 1101100 0 1100100 1
  • 21. Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
  • 22. Example 3 Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
  • 23. Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note :
  • 24. 10.6 Two-dimensional parity
  • 25. Example 4 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 1010 0011 1000 1001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011 10001001 11011101 11100111 1 0 101 0 1 0
  • 26. In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note :
  • 27. 10.7 CRC generator and checker
  • 28. 10.8 Binary division in a CRC generator
  • 29. 10.9 Binary division in CRC checker
  • 30. 10.10 A polynomial
  • 31. 10.11 A polynomial representing a divisor
  • 32. Table 10.1 Standard polynomials x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 x 16 + x 12 + x 5 + 1 x 10 + x 9 + x 5 + x 4 + x 2 + 1 x 8 + x 2 + x + 1 Polynomial LANs ITU-32 HDLC ITU-16 ATM AAL CRC-10 ATM header CRC-8 Application Name
  • 33. Example 5 It is obvious that we cannot choose x (binary 10) or x 2 + x (binary 110) as the polynomial because both are divisible by x. However, we can choose x + 1 (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose x 2 + 1 (binary 101) because it is divisible by x + 1 (binary division).
  • 34. Example 6 The CRC-12 x 12 + x 11 + x 3 + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
  • 35. 10.12 Checksum
  • 36. 10.13 Data unit and checksum
  • 37.
  • 38.
  • 39. Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits. 10101001 00111001 The numbers are added using one’s complement 10101001 00111001 ------------ Sum 11100010 Checksum 00011101 The pattern sent is 10101001 00111001 00011101
  • 40. Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error. 10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 Sum 11111111 Complement 00000000 means that the pattern is OK.
  • 41. Example 9 Now suppose there is a burst error of length 5 that affects 4 bits. 10101 111 11 111001 00011101 When the receiver adds the three sections, it gets 10101111 11111001 00011101 Partial Sum 1 11000101 Carry 1 Sum 11000110 Complement 00111001 the pattern is corrupted.
  • 42. 10.3 Correction Retransmission Forward Error Correction Burst Error Correction
  • 43. Table 10.2 Data and redundancy bits 11 4 7 7 3 4 9 4 5 10 4 6 3 3 2 Number of redundancy bits r 6 3 5 2 3 1 Total bits m + r Number of data bits m
  • 44. 10.14 Positions of redundancy bits in Hamming code
  • 45. 10.15 Redundancy bits calculation
  • 46. 10.16 Example of redundancy bit calculation
  • 47. 10.17 Error detection using Hamming code
  • 48. 10.18 Burst error correction example