SlideShare a Scribd company logo
ERROR DETECTION AND ERROR
CORRECTION TECHNIQUE WHILE
SENDING THE MESSAGE
Introduction
Data communications is the exchange of data
between two devices via some form of transmission
medium such as a wire cable. For data
communications to occur the communicating devices
must be part of a communication system made up of a
combination of hardware and software.
communication of two devices
Data communications system depends on three
fundamental characteristics: delivery, accuracy and
timeliness.
A data communications system has five components-
Message, sender, Receiver, Medium and Protocol.
• Data can be corrupted during transmission. For
reliable communication, errors must be detected
and corrected.
•Error detection and correction are implemented
either at data link layer or the transport layer of
the OSI model.or reliable communication, errors
must be detected and corr
Error correction and Detection technique while sending the message
ERROR DETECTION
 Error detecting code is to include only
enough redundancy to allow the receiver to
deduce that an error occurred, but not which
error, and have it request a re- transmission.
 Error detection uses the concept of
redundancy, which means adding extra bits
for detecting error at the destination.
Redundancy
Instead of repeating the entire data stream, a shorter
group of bits may be appended to the end of each
unit. This technique is called Redundancy because
the extra bit are redundant to the information. They
are discarded as soon as the accuracy of the
transmission has been determined.
 There are basically four types of
redundancy checks. They are:
I. VRC (Vertical Redundancy Check).
II. LRC (Longitudinal Redund. Check).
III. CRC (Cyclical Redundancy Check).
ERROR DETECTION
 VERTICAL REDUNDUNCY CHECK
 LONGITUDINAL REDUNDANCY CHECK
 CYCLIC REDUNDANCY CHECK
VERTICAL REDUNDANCY CHECK
 It is also known as parity check
 It is least expensive mechanism for error
detection
 In this technique , the redundant bit called parity
bit is appended to every data unit so that the total
number of 1s in the unit becomes even (including
parity bit)
Error correction and Detection technique while sending the message
VERTICAL REDUNDANCY CHECK
Example :
1110110 1101111 1110010
- After adding the parity bit 11101101 11011110
11100100
Error correction and Detection technique while sending the message
Advantage :
 LRC of n bits can easily detect
burst error of n bits.
Disadvantage :
 If two bits in one data units are damaged
and two bits in exactly same position in
another data unit are also damaged , the
LRC checker will not detect the error.
CYCLIC REDUNDANCY
CHECK (CRC)
In this method , a sequence of redundant bits ,
called the CRC or the CRC remainder, is appended
to the end of the unit so that the resulting data unit
become exactly divisible by a second,
predetermined binary number. At its destination , the
incoming data unit is divided by the same number. If
at this step there is no remainder ,the data unit
assume to be correct and is accepted, otherwise it
indicate that data unit has been damaged in
transmission and therefore must be rejected.
The redundancy bits is used by CRC are derived by
dividing the data unit by a predetermined
divisor. The remainder is the CRC.
Error correction and Detection technique while sending the message
ERROR CORRECTION
 Error correcting code is to include enough
redundant information along with each block of data
sent to enable the receiver to deduce what the
transmitted character must have been.
 Error Correction must be handled in two ways :
 When an error is discovered, the receiver can
have the sender retransmit the entire data unit.
 Receiver can use an error correcting code, which
automatically corrects certain errors.
 There are two types of Error Correcting
techniques :
1. Single bit error correction.
2. Burst error correction.
 Error Correction can be done with the help
of HAMMING CODE.
HAMMING CODE
 It is a technique developed
by R. W. Hamming.
 Hamming code can be applied to data
units of any length and uses the
relationship between data and redundancy
bits. For eg.
 A 7 bit ASCII code requires 4 Redundancy
bits that can be added to the end of the
data unit or interspersed with the original
data bits.
 These bits are placed in positions 1,2,4
and 8. We refer to these bits as r1,r2,r4
and r8.
These bits also represented as r in the
below fig.
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
Ad

More Related Content

What's hot (20)

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Transport layer
Transport layerTransport layer
Transport layer
Sri Manakula Vinayagar Engineering College
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 
transport layer
transport layertransport layer
transport layer
priyadharshini murugan
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Serial communication in 8051 microcontroller
Serial communication in 8051 microcontrollerSerial communication in 8051 microcontroller
Serial communication in 8051 microcontroller
IshwarNirale2
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
Diwaker Pant
 
Line coding
Line codingLine coding
Line coding
srkrishna341
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Devices and gateways
Devices and gatewaysDevices and gateways
Devices and gateways
Nikil S Raaju
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Transport services
Transport servicesTransport services
Transport services
Navin Kumar
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
STEFFY D
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
Data link control
Data link controlData link control
Data link control
Iffat Anjum
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Serial communication in 8051 microcontroller
Serial communication in 8051 microcontrollerSerial communication in 8051 microcontroller
Serial communication in 8051 microcontroller
IshwarNirale2
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
Diwaker Pant
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Siddique Ibrahim
 
Devices and gateways
Devices and gatewaysDevices and gateways
Devices and gateways
Nikil S Raaju
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Transport services
Transport servicesTransport services
Transport services
Navin Kumar
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
STEFFY D
 

Similar to Error correction and Detection technique while sending the message (20)

computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Data link layer
Data link layerData link layer
Data link layer
IndrajaMeghavathula
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Anwal Mirza
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
Swapnadeep Reloaded
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
SakthiVinoth78
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
Shashank HP
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
ASHOKA INSTITUTE OF TECHNOLOGY & MANAGEMENT,VARANASI,U.P.
 
Error detection & correctoin
Error detection    & correctoinError detection    & correctoin
Error detection & correctoin
DIPTOsarker6
 
Error detection techniques
Error detection techniquesError detection techniques
Error detection techniques
kunjan shah
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
MI RAKIB
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
IJRAT
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Shubham Bammi
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
BON SECOURS COLLEGE FOR WOMEN
 
Data Communication and Computer Networks unit 2
Data Communication and Computer Networks unit 2Data Communication and Computer Networks unit 2
Data Communication and Computer Networks unit 2
ShanmukhaRao35
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Error detection.ppt
Error detection.pptError detection.ppt
Error detection.ppt
PawanRaj48
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
SakthiVinoth78
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
Shashank HP
 
Error detection & correctoin
Error detection    & correctoinError detection    & correctoin
Error detection & correctoin
DIPTOsarker6
 
Error detection techniques
Error detection techniquesError detection techniques
Error detection techniques
kunjan shah
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
MI RAKIB
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
IJRAT
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Shubham Bammi
 
Data Communication and Computer Networks unit 2
Data Communication and Computer Networks unit 2Data Communication and Computer Networks unit 2
Data Communication and Computer Networks unit 2
ShanmukhaRao35
 
Ad

Recently uploaded (20)

Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Ad

Error correction and Detection technique while sending the message

  • 1. ERROR DETECTION AND ERROR CORRECTION TECHNIQUE WHILE SENDING THE MESSAGE
  • 2. Introduction Data communications is the exchange of data between two devices via some form of transmission medium such as a wire cable. For data communications to occur the communicating devices must be part of a communication system made up of a combination of hardware and software. communication of two devices
  • 3. Data communications system depends on three fundamental characteristics: delivery, accuracy and timeliness. A data communications system has five components- Message, sender, Receiver, Medium and Protocol. • Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. •Error detection and correction are implemented either at data link layer or the transport layer of the OSI model.or reliable communication, errors must be detected and corr
  • 5. ERROR DETECTION  Error detecting code is to include only enough redundancy to allow the receiver to deduce that an error occurred, but not which error, and have it request a re- transmission.  Error detection uses the concept of redundancy, which means adding extra bits for detecting error at the destination.
  • 6. Redundancy Instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called Redundancy because the extra bit are redundant to the information. They are discarded as soon as the accuracy of the transmission has been determined.
  • 7.  There are basically four types of redundancy checks. They are: I. VRC (Vertical Redundancy Check). II. LRC (Longitudinal Redund. Check). III. CRC (Cyclical Redundancy Check).
  • 8. ERROR DETECTION  VERTICAL REDUNDUNCY CHECK  LONGITUDINAL REDUNDANCY CHECK  CYCLIC REDUNDANCY CHECK
  • 9. VERTICAL REDUNDANCY CHECK  It is also known as parity check  It is least expensive mechanism for error detection  In this technique , the redundant bit called parity bit is appended to every data unit so that the total number of 1s in the unit becomes even (including parity bit)
  • 11. VERTICAL REDUNDANCY CHECK Example : 1110110 1101111 1110010 - After adding the parity bit 11101101 11011110 11100100
  • 13. Advantage :  LRC of n bits can easily detect burst error of n bits. Disadvantage :  If two bits in one data units are damaged and two bits in exactly same position in another data unit are also damaged , the LRC checker will not detect the error.
  • 14. CYCLIC REDUNDANCY CHECK (CRC) In this method , a sequence of redundant bits , called the CRC or the CRC remainder, is appended to the end of the unit so that the resulting data unit become exactly divisible by a second, predetermined binary number. At its destination , the incoming data unit is divided by the same number. If at this step there is no remainder ,the data unit assume to be correct and is accepted, otherwise it indicate that data unit has been damaged in transmission and therefore must be rejected. The redundancy bits is used by CRC are derived by dividing the data unit by a predetermined divisor. The remainder is the CRC.
  • 16. ERROR CORRECTION  Error correcting code is to include enough redundant information along with each block of data sent to enable the receiver to deduce what the transmitted character must have been.  Error Correction must be handled in two ways :  When an error is discovered, the receiver can have the sender retransmit the entire data unit.  Receiver can use an error correcting code, which automatically corrects certain errors.
  • 17.  There are two types of Error Correcting techniques : 1. Single bit error correction. 2. Burst error correction.  Error Correction can be done with the help of HAMMING CODE.
  • 18. HAMMING CODE  It is a technique developed by R. W. Hamming.  Hamming code can be applied to data units of any length and uses the relationship between data and redundancy bits. For eg.
  • 19.  A 7 bit ASCII code requires 4 Redundancy bits that can be added to the end of the data unit or interspersed with the original data bits.  These bits are placed in positions 1,2,4 and 8. We refer to these bits as r1,r2,r4 and r8. These bits also represented as r in the below fig.
  翻译: