SlideShare a Scribd company logo
Chapter 5
Chapter 5
Error Detection
Error Detection
1
Types of Errors
Types of Errors
• A network system that cannot guarantee that
y g
the data received are completely identical to
the data transmitted is essentially useless.
y
• Reliable systems must have a mechanism for
detecting and correcting the errors
detecting and correcting the errors.
• There are two types of errors:
Si l bi bi i h d f 0 1
– Single‐bit error: one bit is changed from 0 to 1 or
from 1 to 0
B t lti l bit h d
– Burst error: multiple bits are changed
2
Figure 5-1
Types of Errors
3
Figure 5-2
Single Bit Error
Single-Bit Error
ASCII STX
ASCII LF
4
Single‐Bit Error
Single Bit Error
• Single‐bit errors are least likely type of error in
Single bit errors are least likely type of error in
serial transmission – the duration of the noise
is normally much longer than that of a bit
is normally much longer than that of a bit.
• However single‐bit error can happen in
parallel transmission such as data transfer
parallel transmission, such as data transfer
inside a computer, between CPU and memory,
or between a computer and a printer
or between a computer and a printer.
– E.g. one noisy line out of eight in a parallel printer
cable can corrupt one bit in each byte
cable can corrupt one bit in each byte.
5
Figure 5-3
Burst Error of Length Five
g
6
Burst Error
Burst Error
• Burst errors is most likely to happen in a serial
Burst errors is most likely to happen in a serial
transmission.
• Burst errors does not mean errors occur in
Burst errors does not mean errors occur in
consecutive bits.
• The number of bits affected depends on the data
• The number of bits affected depends on the data
rate and duration of noise.
• E g if date rate is 1 Mbps and noise duration is
• E.g. if date rate is 1 Mbps and noise duration is
1/100 s, the number of bits affected is
1 Mbps × 1/100 s = 10 000 bits
1 Mbps × 1/100 s = 10,000 bits
7
Error Detection
Error Detection
• To detect an error, the redundancy technique is
To detect an error, the redundancy technique is
used, where a short group of bits are appended to
the end of each data unit to be sent.
• The extra redundant bits carry information for error
detection for the data unit.
• If the received data stream pass the checking
function, the redundant bits are discarded.
• Three types of redundancy checks are used: vertical
redundancy check (VRC), longitudinal redundancy
h k (LRC) d li d d h k (CRC)
check (LRC), and cyclic redundancy check (CRC).
8
Figure 5-4
Redundancy
9
Figure 5-5
Detection Methods
Detection Methods
10
Vertical Redundancy Check (VRC)
Vertical Redundancy Check (VRC)
• Most common and least expensive mechanism
Most common and least expensive mechanism
for error detection, often called parity check
• A parity bit is appended to every data unit so that
A parity bit is appended to every data unit so that
the total number of 1s in the unit, including the
parity bit, is even (or odd).
parity bit, is even (or odd).
• Can detect all single‐bit errors and burst errors
that change odd (or even) number of bits.
that change odd (or even) number of bits.
• Cannot detect errors that change even (or odd)
number of bits
number of bits.
11
Figure 5-6
Even Parity VRC Concept
12
Longitudinal Redundancy Check (LRC)
Longitudinal Redundancy Check (LRC)
• A block of data is organized in a table of rows and
A block of data is organized in a table of rows and
columns. The parity bit for each column is then
calculated. All parity bits are grouped and appended
to the original data to be sent (Fig. 5‐7).
• LRC increases the likelihood of detecting burst errors
– an LRC of n bits can detect a burst error of n bits.
• Cannot detect errors where there are even number
f d d b h l d h l
of damaged bits that are located in the same column
position of different rows.
13
Figure 5-7
LRC
14
An LRC Example
An LRC Example
• Suppose the following block is sent:
<=== 10101001 00111001 11011101 11100111 10101010
(LRC)
• However it is hit by a burst noise of length eight
<=== 10100011 10001001 11011101 11100111 10101010
(LRC)
(LRC)
• The receiver checks the LRC and finds some bits do
not follow even parity rule so the whole block is
not follow even‐parity rule, so the whole block is
discarded.
<=== 10100011 10001001 11011101 11100111 10101010
< 10100011 10001001 11011101 11100111 10101010
(LRC)
15
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
• The most powerful redundancy checking technique
The most powerful redundancy checking technique
• A sequence of redundant bits, called CRC, is
appended to the end of a data unit so that the
pp
resulting data unit is exactly divisible by a
predetermined binary number.
• At the destination, the data unit is divided by the
same binary number. If remainder is 0, the data is
d b d d f d
assumed to be intact and accepted. If remainder is
not 0, the data is considered damaged and rejected.
16
CRC Generation
CRC Generation
• CRC bits are derived by dividing the data unit by
the predetermined divisor – the remainder is the
CRC.
• CRC is always one bit less than the divisor.
• CRC is found as follows:
1) First a string of n 0s is appended to the data unit
(assume divisor has n+1 bits)
2) Second the new data unit is divided by the divisor
using binary division. The remainder is the CRC.
) h d h b l h d d
3) Third the n CRC bits replace the appended 0s.
17
Figure 5-8
CRC Generator and Checker
CRC Generator and Checker
18
Figure 5-9
Bi Di i i
Binary Division
in a
CRC G
CRC Generator
19
Figure 5-10
Binary Division
in a
CRC Checker
20
Binary Division in a CRC Generator
• Suppose we want to transmit the
information string: 1111101
information string: 1111101.
• The receiver and sender decide
to use the (arbitrary) polynomial
pattern, 1101.
• The information string is shifted
left by one position less than the
left by one position less than the
number of positions in the
divisor.
• The remainder is found through
modulo 2 division (at right) and
added to the information string:
21
added to the information string:
1111101000 + 111 = 1111101111.
Binary Division in a CRC Checker
If no bits are lost or
t d di idi th
corrupted, dividing the
received information
string by the agreed upon
string by the agreed upon
pattern will give a
remainder of zero.
We see this is so in the
calculation at the right.
R l li ti
Real applications use
longer binary numbers to
cover larger information
22
cover larger information
strings.
Polynomials
Polynomials
• The CRC divisor is most often represented as an
The CRC divisor is most often represented as an
algebraic polynomial, rather than a binary number,
for purpose of mathematical proof.
• The degree of a polynomial is its highest power.
• Any polynomial selected must have the following
y p y g
properties:
– It should not be divisible by x
– It should be divisible by x+1
• Several common polynomials are used (see Fig. 5‐13)
23
Figure 5-11
A Polynomial of Degree Seven
A Polynomial of Degree Seven
24
Figure 5-12
A Polynomial Representing a Divisor
y p g
25
Figure 5-13
Standard Polynomials
CRC‐32 is used in both Ethernet and Token Ring network.
26
Performance
Performance
• CRC can detect all burst errors affecting an odd
CRC can detect all burst errors affecting an odd
number of bits.
• CRC can detect all burst errors of length less than or
g
equal to the degree of the polynomial
• It can detect with a very high probability burst errors
y g p y
of length greater than the degree of the polynomial.
• E.g. CRC‐12 will detect all burst errors affecting an
odd number of bits, will detect all burst errors with
length ≤ 12, and will detect 99.97% of the burst
ith l th ≥ 12
errors with a length ≥ 12.
27
Error Correction
Error Correction
• Error correction can be handled in two ways:
y
– When an error is detected, the sender is notified and the
entire data unit is retransmitted
– The receiver uses an error‐correcting code to correct the
errors automatically
• Error correction by retransmission is practical and
• Error correction by retransmission is practical and
common method in networking and communication.
• Error correcting codes are more complicated than
Error correcting codes are more complicated than
error detecting codes. Hamming code is a popular
single‐bit error correction method.
g
28
Summary
y
• Errors can be categorized as a single bit or burst.
h f d d h k d i
• Three types of redundancy checks are used in LANs:
VRC, LRC and CRC.
I VRC it bit i dd d t th d t it
• In VRC, a parity bit is added to the data unit.
• In LRC, data unit is organized into a table, and a
parity bit is calculated from each column
parity bit is calculated from each column.
• CRC, the most powerful of the three, is based on
binary division
binary division.
• In CRC, the generator, using a specific divisor, creates
redundant bits that are appended to the data The
redundant bits that are appended to the data. The
checker uses the same divisor to verify the data.
29
Ad

More Related Content

What's hot (20)

Representation of binary tree in memory
Representation of binary tree in memoryRepresentation of binary tree in memory
Representation of binary tree in memory
Rohini Shinde
 
Flip-Flop || Digital Electronics
Flip-Flop || Digital ElectronicsFlip-Flop || Digital Electronics
Flip-Flop || Digital Electronics
Md Sadequl Islam
 
ALGORITHM-ANALYSIS.ppt
ALGORITHM-ANALYSIS.pptALGORITHM-ANALYSIS.ppt
ALGORITHM-ANALYSIS.ppt
sapnaverma97
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
robbbminson
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
Radhakrishnan Chinnusamy
 
Hardwired control
Hardwired controlHardwired control
Hardwired control
Siddique Ibrahim
 
Database Chapter 3
Database Chapter 3Database Chapter 3
Database Chapter 3
shahadat hossain
 
Raster scan system
Raster scan systemRaster scan system
Raster scan system
Mohd Arif
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
BCD.
BCD.BCD.
BCD.
Meghana C M
 
Chapter-4 Enhanced ER Model
Chapter-4 Enhanced ER ModelChapter-4 Enhanced ER Model
Chapter-4 Enhanced ER Model
Kunal Anand
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.
CS_GDRCST
 
Dbms
DbmsDbms
Dbms
naresh sharma
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
Abhishek Singh
 
Control Units : Microprogrammed and Hardwired:control unit
Control Units : Microprogrammed and Hardwired:control unitControl Units : Microprogrammed and Hardwired:control unit
Control Units : Microprogrammed and Hardwired:control unit
abdosaidgkv
 
Floating point arithmetic operations (1)
Floating point arithmetic operations (1)Floating point arithmetic operations (1)
Floating point arithmetic operations (1)
cs19club
 
Register transfer language
Register transfer languageRegister transfer language
Register transfer language
Sanjeev Patel
 
Language processors
Language processorsLanguage processors
Language processors
Ganesh Wedpathak
 
Representation of binary tree in memory
Representation of binary tree in memoryRepresentation of binary tree in memory
Representation of binary tree in memory
Rohini Shinde
 
Flip-Flop || Digital Electronics
Flip-Flop || Digital ElectronicsFlip-Flop || Digital Electronics
Flip-Flop || Digital Electronics
Md Sadequl Islam
 
ALGORITHM-ANALYSIS.ppt
ALGORITHM-ANALYSIS.pptALGORITHM-ANALYSIS.ppt
ALGORITHM-ANALYSIS.ppt
sapnaverma97
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
robbbminson
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Raster scan system
Raster scan systemRaster scan system
Raster scan system
Mohd Arif
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
Chapter-4 Enhanced ER Model
Chapter-4 Enhanced ER ModelChapter-4 Enhanced ER Model
Chapter-4 Enhanced ER Model
Kunal Anand
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.
CS_GDRCST
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
Abhishek Singh
 
Control Units : Microprogrammed and Hardwired:control unit
Control Units : Microprogrammed and Hardwired:control unitControl Units : Microprogrammed and Hardwired:control unit
Control Units : Microprogrammed and Hardwired:control unit
abdosaidgkv
 
Floating point arithmetic operations (1)
Floating point arithmetic operations (1)Floating point arithmetic operations (1)
Floating point arithmetic operations (1)
cs19club
 
Register transfer language
Register transfer languageRegister transfer language
Register transfer language
Sanjeev Patel
 

Similar to computer networks Error Detection Methods.pdf (20)

Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
ACchapter 3-Part I Data Communication.pptx
ACchapter 3-Part I Data Communication.pptxACchapter 3-Part I Data Communication.pptx
ACchapter 3-Part I Data Communication.pptx
abdisa767
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
logesswarisrinivasan
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Unit-4.pptx
Unit-4.pptxUnit-4.pptx
Unit-4.pptx
4NM19EC140ROHITHUACH
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
Mortadha96
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptxERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
Jayaprasanna4
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
BON SECOURS COLLEGE FOR WOMEN
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
DHIVYADEVAKI
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
ACchapter 3-Part I Data Communication.pptx
ACchapter 3-Part I Data Communication.pptxACchapter 3-Part I Data Communication.pptx
ACchapter 3-Part I Data Communication.pptx
abdisa767
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptxERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
Error detection methods-computer networks
Error detection methods-computer networksError detection methods-computer networks
Error detection methods-computer networks
DHIVYADEVAKI
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Ad

More from Balasubramanian699229 (17)

Ethics_Theories about right action..pptx
Ethics_Theories about right action..pptxEthics_Theories about right action..pptx
Ethics_Theories about right action..pptx
Balasubramanian699229
 
Data raceData raceData raceData race.pptx
Data raceData raceData raceData race.pptxData raceData raceData raceData race.pptx
Data raceData raceData raceData race.pptx
Balasubramanian699229
 
Distributed Shared memory architecture.ppt
Distributed Shared memory architecture.pptDistributed Shared memory architecture.ppt
Distributed Shared memory architecture.ppt
Balasubramanian699229
 
OpenMP-Quinn17_L4bOpen <MP_Open MP_Open MP
OpenMP-Quinn17_L4bOpen <MP_Open MP_Open MPOpenMP-Quinn17_L4bOpen <MP_Open MP_Open MP
OpenMP-Quinn17_L4bOpen <MP_Open MP_Open MP
Balasubramanian699229
 
Unit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networksUnit 2_ Flow & Error Control in computer networks
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Engineers as experimenter in professional ethics
Engineers as experimenter in professional ethicsEngineers as experimenter in professional ethics
Engineers as experimenter in professional ethics
Balasubramanian699229
 
cp.docx
cp.docxcp.docx
cp.docx
Balasubramanian699229
 
Introduction to Computers.ppt
Introduction to Computers.pptIntroduction to Computers.ppt
Introduction to Computers.ppt
Balasubramanian699229
 
Unit III.ppt
Unit III.pptUnit III.ppt
Unit III.ppt
Balasubramanian699229
 
DATA COMMUNICATIONS.ppt
DATA COMMUNICATIONS.pptDATA COMMUNICATIONS.ppt
DATA COMMUNICATIONS.ppt
Balasubramanian699229
 
bargaining.pdf
bargaining.pdfbargaining.pdf
bargaining.pdf
Balasubramanian699229
 
occupational crime.pdf
occupational crime.pdfoccupational crime.pdf
occupational crime.pdf
Balasubramanian699229
 
quicksort (1).ppt
quicksort (1).pptquicksort (1).ppt
quicksort (1).ppt
Balasubramanian699229
 
Civic Virtues_Unit1.pptx
Civic Virtues_Unit1.pptxCivic Virtues_Unit1.pptx
Civic Virtues_Unit1.pptx
Balasubramanian699229
 
Titanic-Powerpoint.pdf
Titanic-Powerpoint.pdfTitanic-Powerpoint.pdf
Titanic-Powerpoint.pdf
Balasubramanian699229
 
3 Mile island.pdf
3 Mile island.pdf3 Mile island.pdf
3 Mile island.pdf
Balasubramanian699229
 
Chernobyl_Nuclear_Disaster_ppt.pptx
Chernobyl_Nuclear_Disaster_ppt.pptxChernobyl_Nuclear_Disaster_ppt.pptx
Chernobyl_Nuclear_Disaster_ppt.pptx
Balasubramanian699229
 
Ad

Recently uploaded (20)

Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 

computer networks Error Detection Methods.pdf

  • 1. Chapter 5 Chapter 5 Error Detection Error Detection 1 Types of Errors Types of Errors • A network system that cannot guarantee that y g the data received are completely identical to the data transmitted is essentially useless. y • Reliable systems must have a mechanism for detecting and correcting the errors detecting and correcting the errors. • There are two types of errors: Si l bi bi i h d f 0 1 – Single‐bit error: one bit is changed from 0 to 1 or from 1 to 0 B t lti l bit h d – Burst error: multiple bits are changed 2 Figure 5-1 Types of Errors 3 Figure 5-2 Single Bit Error Single-Bit Error ASCII STX ASCII LF 4
  • 2. Single‐Bit Error Single Bit Error • Single‐bit errors are least likely type of error in Single bit errors are least likely type of error in serial transmission – the duration of the noise is normally much longer than that of a bit is normally much longer than that of a bit. • However single‐bit error can happen in parallel transmission such as data transfer parallel transmission, such as data transfer inside a computer, between CPU and memory, or between a computer and a printer or between a computer and a printer. – E.g. one noisy line out of eight in a parallel printer cable can corrupt one bit in each byte cable can corrupt one bit in each byte. 5 Figure 5-3 Burst Error of Length Five g 6 Burst Error Burst Error • Burst errors is most likely to happen in a serial Burst errors is most likely to happen in a serial transmission. • Burst errors does not mean errors occur in Burst errors does not mean errors occur in consecutive bits. • The number of bits affected depends on the data • The number of bits affected depends on the data rate and duration of noise. • E g if date rate is 1 Mbps and noise duration is • E.g. if date rate is 1 Mbps and noise duration is 1/100 s, the number of bits affected is 1 Mbps × 1/100 s = 10 000 bits 1 Mbps × 1/100 s = 10,000 bits 7 Error Detection Error Detection • To detect an error, the redundancy technique is To detect an error, the redundancy technique is used, where a short group of bits are appended to the end of each data unit to be sent. • The extra redundant bits carry information for error detection for the data unit. • If the received data stream pass the checking function, the redundant bits are discarded. • Three types of redundancy checks are used: vertical redundancy check (VRC), longitudinal redundancy h k (LRC) d li d d h k (CRC) check (LRC), and cyclic redundancy check (CRC). 8
  • 3. Figure 5-4 Redundancy 9 Figure 5-5 Detection Methods Detection Methods 10 Vertical Redundancy Check (VRC) Vertical Redundancy Check (VRC) • Most common and least expensive mechanism Most common and least expensive mechanism for error detection, often called parity check • A parity bit is appended to every data unit so that A parity bit is appended to every data unit so that the total number of 1s in the unit, including the parity bit, is even (or odd). parity bit, is even (or odd). • Can detect all single‐bit errors and burst errors that change odd (or even) number of bits. that change odd (or even) number of bits. • Cannot detect errors that change even (or odd) number of bits number of bits. 11 Figure 5-6 Even Parity VRC Concept 12
  • 4. Longitudinal Redundancy Check (LRC) Longitudinal Redundancy Check (LRC) • A block of data is organized in a table of rows and A block of data is organized in a table of rows and columns. The parity bit for each column is then calculated. All parity bits are grouped and appended to the original data to be sent (Fig. 5‐7). • LRC increases the likelihood of detecting burst errors – an LRC of n bits can detect a burst error of n bits. • Cannot detect errors where there are even number f d d b h l d h l of damaged bits that are located in the same column position of different rows. 13 Figure 5-7 LRC 14 An LRC Example An LRC Example • Suppose the following block is sent: <=== 10101001 00111001 11011101 11100111 10101010 (LRC) • However it is hit by a burst noise of length eight <=== 10100011 10001001 11011101 11100111 10101010 (LRC) (LRC) • The receiver checks the LRC and finds some bits do not follow even parity rule so the whole block is not follow even‐parity rule, so the whole block is discarded. <=== 10100011 10001001 11011101 11100111 10101010 < 10100011 10001001 11011101 11100111 10101010 (LRC) 15 Cyclic Redundancy Check (CRC) Cyclic Redundancy Check (CRC) • The most powerful redundancy checking technique The most powerful redundancy checking technique • A sequence of redundant bits, called CRC, is appended to the end of a data unit so that the pp resulting data unit is exactly divisible by a predetermined binary number. • At the destination, the data unit is divided by the same binary number. If remainder is 0, the data is d b d d f d assumed to be intact and accepted. If remainder is not 0, the data is considered damaged and rejected. 16
  • 5. CRC Generation CRC Generation • CRC bits are derived by dividing the data unit by the predetermined divisor – the remainder is the CRC. • CRC is always one bit less than the divisor. • CRC is found as follows: 1) First a string of n 0s is appended to the data unit (assume divisor has n+1 bits) 2) Second the new data unit is divided by the divisor using binary division. The remainder is the CRC. ) h d h b l h d d 3) Third the n CRC bits replace the appended 0s. 17 Figure 5-8 CRC Generator and Checker CRC Generator and Checker 18 Figure 5-9 Bi Di i i Binary Division in a CRC G CRC Generator 19 Figure 5-10 Binary Division in a CRC Checker 20
  • 6. Binary Division in a CRC Generator • Suppose we want to transmit the information string: 1111101 information string: 1111101. • The receiver and sender decide to use the (arbitrary) polynomial pattern, 1101. • The information string is shifted left by one position less than the left by one position less than the number of positions in the divisor. • The remainder is found through modulo 2 division (at right) and added to the information string: 21 added to the information string: 1111101000 + 111 = 1111101111. Binary Division in a CRC Checker If no bits are lost or t d di idi th corrupted, dividing the received information string by the agreed upon string by the agreed upon pattern will give a remainder of zero. We see this is so in the calculation at the right. R l li ti Real applications use longer binary numbers to cover larger information 22 cover larger information strings. Polynomials Polynomials • The CRC divisor is most often represented as an The CRC divisor is most often represented as an algebraic polynomial, rather than a binary number, for purpose of mathematical proof. • The degree of a polynomial is its highest power. • Any polynomial selected must have the following y p y g properties: – It should not be divisible by x – It should be divisible by x+1 • Several common polynomials are used (see Fig. 5‐13) 23 Figure 5-11 A Polynomial of Degree Seven A Polynomial of Degree Seven 24
  • 7. Figure 5-12 A Polynomial Representing a Divisor y p g 25 Figure 5-13 Standard Polynomials CRC‐32 is used in both Ethernet and Token Ring network. 26 Performance Performance • CRC can detect all burst errors affecting an odd CRC can detect all burst errors affecting an odd number of bits. • CRC can detect all burst errors of length less than or g equal to the degree of the polynomial • It can detect with a very high probability burst errors y g p y of length greater than the degree of the polynomial. • E.g. CRC‐12 will detect all burst errors affecting an odd number of bits, will detect all burst errors with length ≤ 12, and will detect 99.97% of the burst ith l th ≥ 12 errors with a length ≥ 12. 27 Error Correction Error Correction • Error correction can be handled in two ways: y – When an error is detected, the sender is notified and the entire data unit is retransmitted – The receiver uses an error‐correcting code to correct the errors automatically • Error correction by retransmission is practical and • Error correction by retransmission is practical and common method in networking and communication. • Error correcting codes are more complicated than Error correcting codes are more complicated than error detecting codes. Hamming code is a popular single‐bit error correction method. g 28
  • 8. Summary y • Errors can be categorized as a single bit or burst. h f d d h k d i • Three types of redundancy checks are used in LANs: VRC, LRC and CRC. I VRC it bit i dd d t th d t it • In VRC, a parity bit is added to the data unit. • In LRC, data unit is organized into a table, and a parity bit is calculated from each column parity bit is calculated from each column. • CRC, the most powerful of the three, is based on binary division binary division. • In CRC, the generator, using a specific divisor, creates redundant bits that are appended to the data The redundant bits that are appended to the data. The checker uses the same divisor to verify the data. 29
  翻译: