SlideShare a Scribd company logo
Communication
Networks
- Data Link Layer
[Error Detection
& Correction Codes]
Hamming Code – solved Example
Error Detection Codes
•
•
•
Error Correction Codes
•
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Hamming Code – Error Correction Code
•
•
•
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Hamming Code Structure
•
•
•
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Transmitter Side – Computation of Parity Values
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Receiver Side – Without Error
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Receiver Side - With Error
Please refer the Video Lecture at
www.youtube.com/GURUKULA
References:
• ―
• ―
•
Please refer the Video Lecture at
www.youtube.com/GURUKULA
Ad

More Related Content

What's hot (20)

Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
DILSHAD AHMAD
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
Umesh Gupta
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
Fddi
FddiFddi
Fddi
Anuj Gupta
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Source coding
Source codingSource coding
Source coding
Shamna Saleem
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
Shafaan Khaliq Bhatti
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
information theory
information theoryinformation theory
information theory
Dr Naim R Kidwai
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Faisal Mehmood
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
Umesh Gupta
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
JAIGANESH SEKAR
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
JAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
JAIGANESH SEKAR
 
Ad

Recently uploaded (20)

Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Journal of Soft Computing in Civil Engineering
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Construction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.pptConstruction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.ppt
ssuser2ffcbc
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Construction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.pptConstruction-Chemicals-For-Waterproofing.ppt
Construction-Chemicals-For-Waterproofing.ppt
ssuser2ffcbc
 
Ad

9. data link layer error correction codes - hamming code

  翻译: