SlideShare a Scribd company logo
DCCN (Dr. Nadia Nawaz) 10-1
Part 3 Data Link Layer
Chapter 10 Error Detection and Correction
Chapter 11 Data Link Control
Chapter 12 Multiple Access
Chapter 13 Wired LANs: Ethernet
Chapter 14 Wireless LANs
Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs
DCCN (Dr. Nadia Nawaz) 10-2
Chapter 10 Error Detection and Correction
1. Introduction
2. Block Coding
3. Linear Block Codes
4. Cyclic Codes
5. Checksum
DCCN (Dr. Nadia Nawaz) 10-3
Type of Errors
• An electromagnetic signal is subject to interference from
heat, magnetism, and other forms of electricity
• Single-bit error: 0 → 1 or 1 → 0
• Burst error: 2 or more bits have changed
DCCN (Dr. Nadia Nawaz) 10-4
Single-Bit Error
• Only one bit of a given data unit is changed
• The least likely type of error in serial transmission
• Single-bit error can happen in parallel transmission
DCCN (Dr. Nadia Nawaz) 10-5
Burst Error
• Two or more bits in the data unit have changed
• Burst error does not necessarily mean that the errors occur in
consecutive bits
• Most likely to happen in a serial transmission
• Number of bits affected depends on the data rate and duration of noise
DCCN (Dr. Nadia Nawaz) 10-6
Redundancy
• Error detection uses the concept of redundancy, which
means adding extra (redundant) bits for detecting errors at
the destination
DCCN (Dr. Nadia Nawaz) 10-7
Error Control
• Detection Versus Correction
– Detection: error ? yes or no
– Correction: Need to know the exact number of bits that
are corrupted, and their location in the message
• Forward Error Correction Versus Retransmission
– Retransmission (resending) : Backward error correction
• Coding for redundancy
– Block coding: discussed in our textbook
– Convolution coding
DCCN (Dr. Nadia Nawaz) 10-8
Modular Arithmetic
• In modulo-N arithmetic, we use only the integers in the range 0 to N-
1, inclusive.
• Adding: 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0
• Subtracting: 0 – 0 = 0 0 – 1 = 1 1 – 0 = 1 1 – 1 = 0
• XORing of two single bits or two words
DCCN (Dr. Nadia Nawaz) 10-9
Block Coding
• Divide the message into blocks, each ofDivide the message into blocks, each of kk bits, calledbits, called datawords.datawords.
• AddAdd rr redundant bits to each block to make the length n = k + r. Theredundant bits to each block to make the length n = k + r. The
resulting n-bit blocks are calledresulting n-bit blocks are called codewordscodewords
• Example:Example: 4B/5B block coding
– k = 4 and n = 5.
– 2k
= 16 datawords and 2n
= 32 codewords.
DCCN (Dr. Nadia Nawaz) 10-10
Error Detection in Block Coding
• Example:
Assume that k = 2 and n = 3
(Table 10.1)
The redundent bit is added by
Xor for example 0+1=1
DCCN (Dr. Nadia Nawaz) 10-11
Error Detection: Example
• Assume the sender encodes the dataword 01 as 011 and sends it
to the receiver. Consider the following cases:
1. The receiver receives 011 which is a valid codeword. The receiver
extracts the dataword 01 from it.
2. The codeword is corrupted during transmission, and 111 is
received. This is not a valid codeword and is discarded.
3. The codeword is corrupted during transmission, and 000 is
received. This is a valid codeword. The receiver incorrectly
extracts the dataword 00. Two corrupted bits have made the
error undetectable.
 An error-detecting code can detect only the types of errors for
which it is designed; other types of errors may remain
undetected
DCCN (Dr. Nadia Nawaz) 10-12
Error Correction in Block Coding
• Example:
Assume that k = 2 and r = 3
n = 5 (Table 10.2)
DCCN (Dr. Nadia Nawaz) 10-13
Error Correction: Example
• Assume the dataword is 01. The sender creates the codeword
01011. The codeword is corrupted during transmission, and
01001 is received. First, the receiver finds that the received
codeword is not in the table. This means an error has occurred.
The receiver, assuming that there is only 1 bit corrupted, uses the
following strategy to guess the correct dataword
1. Comparing the received codeword with the first codeword in the
table (01001 versus 00000), the receiver decides that the first
codeword is not the one that was sent because there are two
different bits. (the same for third or fourth one in the table)
2.. The original codeword must be the second one in the table
because this is the only one that differs from the received
codeword by 1 bit.
DCCN (Dr. Nadia Nawaz) 10-14
Cyclic Code: CRC
• Cyclic codes are special linear block codes with one extra property.Cyclic codes are special linear block codes with one extra property.
• If a codeword is cyclically shifted (rotated), the result is anotherIf a codeword is cyclically shifted (rotated), the result is another
codewordcodeword
• Cyclic Redundancy Check (CRC)
DCCN (Dr. Nadia Nawaz) 10-15
CRC Encoder and Decoder
DCCN (Dr. Nadia Nawaz) 10-16
Division in CRC Encoder
DCCN (Dr. Nadia Nawaz) 10-17
Division in CRC Decoder
DCCN (Dr. Nadia Nawaz) 10-18
Checksum
• Tendency is to replace the checksum with a CRC
• Not as strong as CRC in error-checking capability
• One’s complement arithmetic
– We can represent unsigned numbers between 0 and
2n
– 1 using only n bits
– If the number has more than n bits, the extra leftmost
bits need to be added to the n rightmost bits
(wrapping)
– A negative number can be represented by inverting
all bits. It is the same as subtracting the number from
2n
– 1
DCCN (Dr. Nadia Nawaz) 10-19
Checksum: Example
• The sender initializes the checksum to 0 and adds all data items
and the checksum. However, 36 cannot be expressed in 4 bits. The
extra two bits are wrapped and added with the sum to create the
wrapped sum value 6. The sum is then complemented, resulting in
the checksum value 9 (15 − 6 = 9).
1
1 1
0
DCCN (Dr. Nadia Nawaz) 10-20
Internet Checksum
Sender site:
1. The message is divided into 16-bit words.
2. The value of the checksum word is set to 0.
3. All words including the checksum are added using one’s complement
addition.
4. The sum is complemented and becomes the checksum.
5. The checksum is sent with the data.
Receiver site:
1. The message (including checksum) is divided into 16-bit words.
2. All words are added using one’s complement addition.
3. The sum is complemented and becomes the new checksum.
4. If the value of checksum is 0, the message is accepted; otherwise, it is
rejected.
DCCN (Dr. Nadia Nawaz) 10-21
Internet Checksum: Example
Ad

More Related Content

What's hot (20)

Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Abdul Razaq
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
garishma bhatia
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)
Omkar Rane
 
Ch3 physical layer.ppt
Ch3 physical layer.pptCh3 physical layer.ppt
Ch3 physical layer.ppt
Muhammad Shahroz Shahroz
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
Are-Da Shalan
 
Flow Control.pptx
Flow Control.pptxFlow Control.pptx
Flow Control.pptx
AshokRachapalli1
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
HDLC
HDLCHDLC
HDLC
Newcovenant Muro
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Abdul Razaq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
garishma bhatia
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)
Omkar Rane
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 

Similar to Data Link Layer| Error Detection (20)

chap10..................................ppt
chap10..................................pptchap10..................................ppt
chap10..................................ppt
hasan2305101837
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
15CS46 - Data communication or computer networks 1_Module-3.ppt
15CS46 - Data communication or computer networks 1_Module-3.ppt15CS46 - Data communication or computer networks 1_Module-3.ppt
15CS46 - Data communication or computer networks 1_Module-3.ppt
ranjan317165
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detection
Nitesh Singh
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
MahabubAlam97
 
Error detection.
Error detection.Error detection.
Error detection.
Wasim Akbar
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
Ch10
Ch10Ch10
Ch10
Vivek Kumar
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptxERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
ch10 Error Detection and Correction.pptttt
ch10 Error Detection and Correction.ppttttch10 Error Detection and Correction.pptttt
ch10 Error Detection and Correction.pptttt
gurpreetk8199
 
708112464-Error-detection-and-Correction.ppt
708112464-Error-detection-and-Correction.ppt708112464-Error-detection-and-Correction.ppt
708112464-Error-detection-and-Correction.ppt
Bhumi521947
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
KashfUlHuda1
 
chap10..................................ppt
chap10..................................pptchap10..................................ppt
chap10..................................ppt
hasan2305101837
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
15CS46 - Data communication or computer networks 1_Module-3.ppt
15CS46 - Data communication or computer networks 1_Module-3.ppt15CS46 - Data communication or computer networks 1_Module-3.ppt
15CS46 - Data communication or computer networks 1_Module-3.ppt
ranjan317165
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detection
Nitesh Singh
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
MahabubAlam97
 
Error detection.
Error detection.Error detection.
Error detection.
Wasim Akbar
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptxERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
ch10 Error Detection and Correction.pptttt
ch10 Error Detection and Correction.ppttttch10 Error Detection and Correction.pptttt
ch10 Error Detection and Correction.pptttt
gurpreetk8199
 
708112464-Error-detection-and-Correction.ppt
708112464-Error-detection-and-Correction.ppt708112464-Error-detection-and-Correction.ppt
708112464-Error-detection-and-Correction.ppt
Bhumi521947
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
KashfUlHuda1
 
Ad

More from Taimoor Muzaffar Gondal (20)

Basics of Computer
Basics of ComputerBasics of Computer
Basics of Computer
Taimoor Muzaffar Gondal
 
Lecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement ProcessLecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement Process
Taimoor Muzaffar Gondal
 
Introduction to Measurements-Lecture 01
Introduction to Measurements-Lecture 01Introduction to Measurements-Lecture 01
Introduction to Measurements-Lecture 01
Taimoor Muzaffar Gondal
 
Updated Lecture 01- History of Atom
Updated Lecture 01- History of AtomUpdated Lecture 01- History of Atom
Updated Lecture 01- History of Atom
Taimoor Muzaffar Gondal
 
Heat and Its Transfer
Heat and Its TransferHeat and Its Transfer
Heat and Its Transfer
Taimoor Muzaffar Gondal
 
Low, Medium and High Frequency Current
Low, Medium and High Frequency CurrentLow, Medium and High Frequency Current
Low, Medium and High Frequency Current
Taimoor Muzaffar Gondal
 
Rectification and Electrotherapy
Rectification and ElectrotherapyRectification and Electrotherapy
Rectification and Electrotherapy
Taimoor Muzaffar Gondal
 
Applications of EM Waves
Applications of EM WavesApplications of EM Waves
Applications of EM Waves
Taimoor Muzaffar Gondal
 
Electromagnetism Fundamentals
Electromagnetism FundamentalsElectromagnetism Fundamentals
Electromagnetism Fundamentals
Taimoor Muzaffar Gondal
 
Effects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and BatteriesEffects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and Batteries
Taimoor Muzaffar Gondal
 
Current Electricity
Current ElectricityCurrent Electricity
Current Electricity
Taimoor Muzaffar Gondal
 
Static Electricity
Static ElectricityStatic Electricity
Static Electricity
Taimoor Muzaffar Gondal
 
Lecture 01- Atomic Structure
Lecture 01- Atomic StructureLecture 01- Atomic Structure
Lecture 01- Atomic Structure
Taimoor Muzaffar Gondal
 
An Overview of PLC
An Overview of PLCAn Overview of PLC
An Overview of PLC
Taimoor Muzaffar Gondal
 
Regula falsi MATLAB Code
Regula falsi MATLAB CodeRegula falsi MATLAB Code
Regula falsi MATLAB Code
Taimoor Muzaffar Gondal
 
Newton's method for MATLAB Code
Newton's method for MATLAB CodeNewton's method for MATLAB Code
Newton's method for MATLAB Code
Taimoor Muzaffar Gondal
 
Langrange method for MATLAB Code
Langrange method for MATLAB CodeLangrange method for MATLAB Code
Langrange method for MATLAB Code
Taimoor Muzaffar Gondal
 
Jacobi method for MATLAB
Jacobi method for MATLAB Jacobi method for MATLAB
Jacobi method for MATLAB
Taimoor Muzaffar Gondal
 
Gauss seidal Matlab Code
Gauss seidal Matlab CodeGauss seidal Matlab Code
Gauss seidal Matlab Code
Taimoor Muzaffar Gondal
 
Finite difference Matlab Code
Finite difference Matlab CodeFinite difference Matlab Code
Finite difference Matlab Code
Taimoor Muzaffar Gondal
 
Lecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement ProcessLecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement Process
Taimoor Muzaffar Gondal
 
Effects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and BatteriesEffects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and Batteries
Taimoor Muzaffar Gondal
 
Ad

Recently uploaded (20)

01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 

Data Link Layer| Error Detection

  • 1. DCCN (Dr. Nadia Nawaz) 10-1 Part 3 Data Link Layer Chapter 10 Error Detection and Correction Chapter 11 Data Link Control Chapter 12 Multiple Access Chapter 13 Wired LANs: Ethernet Chapter 14 Wireless LANs Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs
  • 2. DCCN (Dr. Nadia Nawaz) 10-2 Chapter 10 Error Detection and Correction 1. Introduction 2. Block Coding 3. Linear Block Codes 4. Cyclic Codes 5. Checksum
  • 3. DCCN (Dr. Nadia Nawaz) 10-3 Type of Errors • An electromagnetic signal is subject to interference from heat, magnetism, and other forms of electricity • Single-bit error: 0 → 1 or 1 → 0 • Burst error: 2 or more bits have changed
  • 4. DCCN (Dr. Nadia Nawaz) 10-4 Single-Bit Error • Only one bit of a given data unit is changed • The least likely type of error in serial transmission • Single-bit error can happen in parallel transmission
  • 5. DCCN (Dr. Nadia Nawaz) 10-5 Burst Error • Two or more bits in the data unit have changed • Burst error does not necessarily mean that the errors occur in consecutive bits • Most likely to happen in a serial transmission • Number of bits affected depends on the data rate and duration of noise
  • 6. DCCN (Dr. Nadia Nawaz) 10-6 Redundancy • Error detection uses the concept of redundancy, which means adding extra (redundant) bits for detecting errors at the destination
  • 7. DCCN (Dr. Nadia Nawaz) 10-7 Error Control • Detection Versus Correction – Detection: error ? yes or no – Correction: Need to know the exact number of bits that are corrupted, and their location in the message • Forward Error Correction Versus Retransmission – Retransmission (resending) : Backward error correction • Coding for redundancy – Block coding: discussed in our textbook – Convolution coding
  • 8. DCCN (Dr. Nadia Nawaz) 10-8 Modular Arithmetic • In modulo-N arithmetic, we use only the integers in the range 0 to N- 1, inclusive. • Adding: 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 • Subtracting: 0 – 0 = 0 0 – 1 = 1 1 – 0 = 1 1 – 1 = 0 • XORing of two single bits or two words
  • 9. DCCN (Dr. Nadia Nawaz) 10-9 Block Coding • Divide the message into blocks, each ofDivide the message into blocks, each of kk bits, calledbits, called datawords.datawords. • AddAdd rr redundant bits to each block to make the length n = k + r. Theredundant bits to each block to make the length n = k + r. The resulting n-bit blocks are calledresulting n-bit blocks are called codewordscodewords • Example:Example: 4B/5B block coding – k = 4 and n = 5. – 2k = 16 datawords and 2n = 32 codewords.
  • 10. DCCN (Dr. Nadia Nawaz) 10-10 Error Detection in Block Coding • Example: Assume that k = 2 and n = 3 (Table 10.1) The redundent bit is added by Xor for example 0+1=1
  • 11. DCCN (Dr. Nadia Nawaz) 10-11 Error Detection: Example • Assume the sender encodes the dataword 01 as 011 and sends it to the receiver. Consider the following cases: 1. The receiver receives 011 which is a valid codeword. The receiver extracts the dataword 01 from it. 2. The codeword is corrupted during transmission, and 111 is received. This is not a valid codeword and is discarded. 3. The codeword is corrupted during transmission, and 000 is received. This is a valid codeword. The receiver incorrectly extracts the dataword 00. Two corrupted bits have made the error undetectable.  An error-detecting code can detect only the types of errors for which it is designed; other types of errors may remain undetected
  • 12. DCCN (Dr. Nadia Nawaz) 10-12 Error Correction in Block Coding • Example: Assume that k = 2 and r = 3 n = 5 (Table 10.2)
  • 13. DCCN (Dr. Nadia Nawaz) 10-13 Error Correction: Example • Assume the dataword is 01. The sender creates the codeword 01011. The codeword is corrupted during transmission, and 01001 is received. First, the receiver finds that the received codeword is not in the table. This means an error has occurred. The receiver, assuming that there is only 1 bit corrupted, uses the following strategy to guess the correct dataword 1. Comparing the received codeword with the first codeword in the table (01001 versus 00000), the receiver decides that the first codeword is not the one that was sent because there are two different bits. (the same for third or fourth one in the table) 2.. The original codeword must be the second one in the table because this is the only one that differs from the received codeword by 1 bit.
  • 14. DCCN (Dr. Nadia Nawaz) 10-14 Cyclic Code: CRC • Cyclic codes are special linear block codes with one extra property.Cyclic codes are special linear block codes with one extra property. • If a codeword is cyclically shifted (rotated), the result is anotherIf a codeword is cyclically shifted (rotated), the result is another codewordcodeword • Cyclic Redundancy Check (CRC)
  • 15. DCCN (Dr. Nadia Nawaz) 10-15 CRC Encoder and Decoder
  • 16. DCCN (Dr. Nadia Nawaz) 10-16 Division in CRC Encoder
  • 17. DCCN (Dr. Nadia Nawaz) 10-17 Division in CRC Decoder
  • 18. DCCN (Dr. Nadia Nawaz) 10-18 Checksum • Tendency is to replace the checksum with a CRC • Not as strong as CRC in error-checking capability • One’s complement arithmetic – We can represent unsigned numbers between 0 and 2n – 1 using only n bits – If the number has more than n bits, the extra leftmost bits need to be added to the n rightmost bits (wrapping) – A negative number can be represented by inverting all bits. It is the same as subtracting the number from 2n – 1
  • 19. DCCN (Dr. Nadia Nawaz) 10-19 Checksum: Example • The sender initializes the checksum to 0 and adds all data items and the checksum. However, 36 cannot be expressed in 4 bits. The extra two bits are wrapped and added with the sum to create the wrapped sum value 6. The sum is then complemented, resulting in the checksum value 9 (15 − 6 = 9). 1 1 1 0
  • 20. DCCN (Dr. Nadia Nawaz) 10-20 Internet Checksum Sender site: 1. The message is divided into 16-bit words. 2. The value of the checksum word is set to 0. 3. All words including the checksum are added using one’s complement addition. 4. The sum is complemented and becomes the checksum. 5. The checksum is sent with the data. Receiver site: 1. The message (including checksum) is divided into 16-bit words. 2. All words are added using one’s complement addition. 3. The sum is complemented and becomes the new checksum. 4. If the value of checksum is 0, the message is accepted; otherwise, it is rejected.
  • 21. DCCN (Dr. Nadia Nawaz) 10-21 Internet Checksum: Example
  翻译: