SlideShare a Scribd company logo
Error control coding
Error Control Coding 
 Purpose – to enable receiver to detect, or even 
correct errors in transmitted data 
 The idea is to introduce some redundancies into 
the data to be transmitted 
 Data communications errors: 
 Single bit 
 Only one bit in data stream is in error 
 Multiple bit 
 Two or more non-consecutive bits in data stream are in error 
 Burst 
 Two or more consecutive bits in data stream are in error
 Probability of error, P[e] = the theoretical 
expectation of the rate at which errors will occur 
 Bit error rate (BER) = actual historical record of a 
system’s error performance 
 Two general categories of error control: 
 Error detection 
 Error correction
Example 1 
 Given P[e] = 10-5. If 1 Mbits of data are transmitted, 
how many bits may be in error?
Error Detection 
 Error detection = determine when errors have occur 
 Error detection indicates only when an error has 
occur. It does not prevent the error 
 Most common technique is redundancy checking, 
which includes: 
 Vertical redundancy checking 
 Checksum 
 Longitudinal redundancy checking 
 Cyclic redundancy checking
Redundancy Checking 
 Redundancy is a form of error detection in which each 
data unit is duplicated 
 Effective but costly (complex) especially with long 
messages 
 Redundancy checking = adding redundant bits for 
error detection
Vertical redundancy checking (VRC) 
 VRC is also referred to as parity 
 Each character has its own error-detection bit, called 
the parity bit 
 Single parity bit is added to each character so that the 
total no. of logic 1’s in the character plus the parity bit, 
will be an odd number (for odd parity) or even number 
(for even parity)
Example 2 
 Determine the odd and even parity bits for the ASCII 
character R
 Advantage of VRC: 
 Simple 
 Disadvantage of VRC: 
 If an even no. of bits are in error, the parity checker will 
not detect them because the parity of the character 
remains the same 
 Parity will theoretically detect only 50% of transmission 
errors
Checksum 
 Each character has a numerical value (known as 
‘checksum’) assigned to it 
 Receiver’s checksum is compared to the checksum 
appended to the message, and if they are same, no 
errors. If different, there are errors
Longitudinal redundancy checking 
(LRC) 
 Uses parity to determine whether a message has an 
error 
 LRC is sometimes called message parity 
 Each bit position has a parity bit 
 LRC bits are calculated in the transmitter and 
appended at the end of message as redundant 
character 
 At receiver, LRC is recomputed from the data. If the 
two LRC values are the same, no error. If not, there is 
error
 Bit sequence for LRC is often called block check 
sequence (BCS) 
 Using LRC, all messages (regardless of their length) 
have the same no. of error-detection characters
Example 3 
 Determine VRC and LRC for the following ASCII-encoded 
message: THE CAT. Use odd parity for VRCs 
and even parity for LRC
Cyclic redundancy checking (CRC) 
 Is a convolutional coding scheme 
 In CRC generation, modulo-2 division is used; 
remainder is derived from an exclusive OR (XOR) 
operation 
 At receiver, the data stream, including the CRC code, is 
divided using the same generating function. If 
remainder is zero, means no error
 CRC can be expressed as: 
G x 
( ) 
P x 
( ) 
Q x R x 
  
G(x) = message polynomial 
P(x) = generator polynomial 
Q(x) = quotient 
R(x) = remainder 
( ) ( ) 
 No. of bits in CRC character is always twice the no. of 
bits in a data character
Error Correction 
 Two basic types of error messages: 
 Lost message 
 Never arrives 
 Damaged message 
 Arrives but contains errors 
 Error-correcting codes include extra information so 
that receiver will know if there is an error, and where 
 Two methods of error correction: 
 Retransmission 
 Forward-error correction
Retransmission 
 Retransmission: 
 If received message is in error, the receiver asks 
transmitter to resend the message 
 Forward error correction (FEC): 
 Errors are detected and corrected 
 Redundant bits are used to determine which bit is in 
error, and to correct it, simply complement the 
redundant bits 
 No. of redundant bits must be much greater than the no. 
of bits needed to only detect errors 
 Is generally limited to one-, two- or three-bit errors
Hamming Code 
 Is an error-correcting code 
 Can only correct one-bit errors 
 Hamming bits are inserted into a character at random 
locations
Ad

More Related Content

What's hot (20)

Dc unit 2
Dc unit 2Dc unit 2
Dc unit 2
kaivalyayanamadala
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Multiplexing : FDM
Multiplexing : FDMMultiplexing : FDM
Multiplexing : FDM
Dr Rajiv Srivastava
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
HimaBindu Valiveti
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
Manoj Krishna Yadavalli
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Matched filter
Matched filterMatched filter
Matched filter
srkrishna341
 
Checksum explaination
Checksum explainationChecksum explaination
Checksum explaination
Mohammed Fuzail
 
Windowing techniques of fir filter design
Windowing techniques of fir filter designWindowing techniques of fir filter design
Windowing techniques of fir filter design
Rohan Nagpal
 
Parallel adder
Parallel adderParallel adder
Parallel adder
Kamil Hussain
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
ibrar562
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
Nidhi Baranwal
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
ShivangiSingh241
 
Line coding
Line codingLine coding
Line coding
Rina Ahire
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
Sanjeev Patel
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
DILSHAD AHMAD
 
Dsss final
Dsss finalDsss final
Dsss final
AJAL A J
 
Instruction set of 8086
Instruction set of 8086Instruction set of 8086
Instruction set of 8086
9840596838
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
swatihalunde
 
Windowing techniques of fir filter design
Windowing techniques of fir filter designWindowing techniques of fir filter design
Windowing techniques of fir filter design
Rohan Nagpal
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
ibrar562
 
Digital modulation techniques...
Digital modulation techniques...Digital modulation techniques...
Digital modulation techniques...
Nidhi Baranwal
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
ShivangiSingh241
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
Sanjeev Patel
 
Dsss final
Dsss finalDsss final
Dsss final
AJAL A J
 
Instruction set of 8086
Instruction set of 8086Instruction set of 8086
Instruction set of 8086
9840596838
 

Viewers also liked (6)

Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
Burdwan University
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
skysunilyadav
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
jknm
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
Burdwan University
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
skysunilyadav
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
jknm
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Ad

Similar to Error control coding (20)

computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
Rohan Bhatkar
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Anil Kumar Sonkar Sonkar
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
KARIMU KHATWABI
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Data link layer
Data link layerData link layer
Data link layer
IndrajaMeghavathula
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
Umme habiba
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
Jayaprasanna4
 
5 DLL-LLC- Book
5 DLL-LLC- Book5 DLL-LLC- Book
5 DLL-LLC- Book
Water Birds (Ali)
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Shubham Bammi
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
DCN Error Detection & Correction
DCN Error Detection & CorrectionDCN Error Detection & Correction
DCN Error Detection & Correction
Rohan Bhatkar
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Anil Kumar Sonkar Sonkar
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Parity check, redundancy, and errors
Parity check, redundancy, and errorsParity check, redundancy, and errors
Parity check, redundancy, and errors
KARIMU KHATWABI
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
Umme habiba
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Shubham Bammi
 
Ad

More from Mohammad Bappy (16)

Multiplexing
MultiplexingMultiplexing
Multiplexing
Mohammad Bappy
 
Eeng 3810 chapter 4
Eeng 3810 chapter 4Eeng 3810 chapter 4
Eeng 3810 chapter 4
Mohammad Bappy
 
Digital communication methods
Digital communication methodsDigital communication methods
Digital communication methods
Mohammad Bappy
 
Broadcasting and video systems
Broadcasting and video systemsBroadcasting and video systems
Broadcasting and video systems
Mohammad Bappy
 
Antenna and propagation
Antenna and propagationAntenna and propagation
Antenna and propagation
Mohammad Bappy
 
311 pulse modulation
311 pulse modulation311 pulse modulation
311 pulse modulation
Mohammad Bappy
 
311 linear modulation
311 linear modulation311 linear modulation
311 linear modulation
Mohammad Bappy
 
311 introduction to communication system
311 introduction to communication system311 introduction to communication system
311 introduction to communication system
Mohammad Bappy
 
311 communication system concepts
311 communication system concepts311 communication system concepts
311 communication system concepts
Mohammad Bappy
 
311 angle modulation
311 angle modulation311 angle modulation
311 angle modulation
Mohammad Bappy
 
Digital design chap 5
Digital design   chap 5Digital design   chap 5
Digital design chap 5
Mohammad Bappy
 
Digital e chap 4
Digital e   chap 4Digital e   chap 4
Digital e chap 4
Mohammad Bappy
 
Digital design chap 3
Digital design   chap 3Digital design   chap 3
Digital design chap 3
Mohammad Bappy
 
Digital design chap 2
Digital design    chap 2Digital design    chap 2
Digital design chap 2
Mohammad Bappy
 
Digital design chap 1
Digital design  chap 1Digital design  chap 1
Digital design chap 1
Mohammad Bappy
 
Digital design chap 6
Digital design  chap 6Digital design  chap 6
Digital design chap 6
Mohammad Bappy
 

Recently uploaded (20)

Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 

Error control coding

  • 2. Error Control Coding  Purpose – to enable receiver to detect, or even correct errors in transmitted data  The idea is to introduce some redundancies into the data to be transmitted  Data communications errors:  Single bit  Only one bit in data stream is in error  Multiple bit  Two or more non-consecutive bits in data stream are in error  Burst  Two or more consecutive bits in data stream are in error
  • 3.  Probability of error, P[e] = the theoretical expectation of the rate at which errors will occur  Bit error rate (BER) = actual historical record of a system’s error performance  Two general categories of error control:  Error detection  Error correction
  • 4. Example 1  Given P[e] = 10-5. If 1 Mbits of data are transmitted, how many bits may be in error?
  • 5. Error Detection  Error detection = determine when errors have occur  Error detection indicates only when an error has occur. It does not prevent the error  Most common technique is redundancy checking, which includes:  Vertical redundancy checking  Checksum  Longitudinal redundancy checking  Cyclic redundancy checking
  • 6. Redundancy Checking  Redundancy is a form of error detection in which each data unit is duplicated  Effective but costly (complex) especially with long messages  Redundancy checking = adding redundant bits for error detection
  • 7. Vertical redundancy checking (VRC)  VRC is also referred to as parity  Each character has its own error-detection bit, called the parity bit  Single parity bit is added to each character so that the total no. of logic 1’s in the character plus the parity bit, will be an odd number (for odd parity) or even number (for even parity)
  • 8. Example 2  Determine the odd and even parity bits for the ASCII character R
  • 9.  Advantage of VRC:  Simple  Disadvantage of VRC:  If an even no. of bits are in error, the parity checker will not detect them because the parity of the character remains the same  Parity will theoretically detect only 50% of transmission errors
  • 10. Checksum  Each character has a numerical value (known as ‘checksum’) assigned to it  Receiver’s checksum is compared to the checksum appended to the message, and if they are same, no errors. If different, there are errors
  • 11. Longitudinal redundancy checking (LRC)  Uses parity to determine whether a message has an error  LRC is sometimes called message parity  Each bit position has a parity bit  LRC bits are calculated in the transmitter and appended at the end of message as redundant character  At receiver, LRC is recomputed from the data. If the two LRC values are the same, no error. If not, there is error
  • 12.  Bit sequence for LRC is often called block check sequence (BCS)  Using LRC, all messages (regardless of their length) have the same no. of error-detection characters
  • 13. Example 3  Determine VRC and LRC for the following ASCII-encoded message: THE CAT. Use odd parity for VRCs and even parity for LRC
  • 14. Cyclic redundancy checking (CRC)  Is a convolutional coding scheme  In CRC generation, modulo-2 division is used; remainder is derived from an exclusive OR (XOR) operation  At receiver, the data stream, including the CRC code, is divided using the same generating function. If remainder is zero, means no error
  • 15.  CRC can be expressed as: G x ( ) P x ( ) Q x R x   G(x) = message polynomial P(x) = generator polynomial Q(x) = quotient R(x) = remainder ( ) ( )  No. of bits in CRC character is always twice the no. of bits in a data character
  • 16. Error Correction  Two basic types of error messages:  Lost message  Never arrives  Damaged message  Arrives but contains errors  Error-correcting codes include extra information so that receiver will know if there is an error, and where  Two methods of error correction:  Retransmission  Forward-error correction
  • 17. Retransmission  Retransmission:  If received message is in error, the receiver asks transmitter to resend the message  Forward error correction (FEC):  Errors are detected and corrected  Redundant bits are used to determine which bit is in error, and to correct it, simply complement the redundant bits  No. of redundant bits must be much greater than the no. of bits needed to only detect errors  Is generally limited to one-, two- or three-bit errors
  • 18. Hamming Code  Is an error-correcting code  Can only correct one-bit errors  Hamming bits are inserted into a character at random locations
  翻译: