SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Presented by :
Ahtesham Ullah Khan
1604610013
CSE 3RD YR
ERROR CONTROL IN
NETWORK LAYER
There are two main types of errors in transmissions:
1. Single bit error : It means only one bit of data unit is
changed from 1 to 0 or from 0 to 1.
TYPES OF ERRORS
2. Burst error : It means two or more bits in data unit
are changed from 1 to 0 from 0 to 1. In burst error, it is
not necessary that only consecutive bits are changed.
The length of burst error is measured from first
changed bit to last changed bit
ERROR CONTROL
1. Parity Checking
2. Cyclic Redundancy Check
3. Checksum
There are two types of attacks against errors:
1. Error Detecting Codes: Include enough redundancy bits
to detect errors and use ACKs and retransmissions to
recover from the errors.
2. Error Correcting Codes: Include enough redundancy to
detect and correct errors. The use of error-correcting
codes is often referred to as forward error correction.
ERROR CONTROL TECHNIQUE
PARITY CHECK TECHNIQUE
A parity check is the process that ensures accurate data
transmission between nodes during communication. A parity
bit is appended to the original data bits to create an even or
odd bit number; the number of bits with value one. The
source then transmits this data via a link, and bits are checked
and verified at the destination. Data is considered accurate if
the number of bits (even or odd) matches the number
transmitted from the source.
TYPE OF PARITY
1. Even Parity
2. Odd Parity
Error Control In Network Layer
CYCLIC REDUNDANCY CHECK
1. In CRC, a sequence of redundant bits, called cyclic
redundancy check bits, are appended to the end
of data unit so that the resulting data unit
becomes exactly divisible by a second,
predetermined binary number.
2. At the destination, the incoming data unit is
divided by the same number. If at this step there
is no remainder, the data unit is assumed to be
correct and is therefore accepted.
3. A remainder indicates that the data unit has been
damaged in transit and therefore must be
rejected.
Error Control In Network Layer
EXAMPLE :
Data word : 1010 Divisor : 1011
1011 1010000
1
1011
1000
1011
011 CRC
1011 1010
1
1011
1011
1011
0000 ACCEPTED
00 1
001
CHECKSUM
1. In checksum error detection scheme, the data is
divided into k segments each of m bits.
2. In the sender’s end the segments are added using 1’s
complement arithmetic to get the sum. The sum is
complemented to get the checksum.
3. The checksum segment is sent along with the data
segments.
4. At the receiver’s end, all received segments are added
using 1’s complement arithmetic to get the sum. The
sum is complemented.
5. If the result is zero, the received data is accepted;
otherwise discarded.
Error Control In Network Layer
EXAMPLE
Error Control In Network Layer

More Related Content

PPSX
Error control
PPT
Error detection correction (CRC)
PPTX
HDLC(High level Data Link Control)
PPTX
Issues in knowledge representation
PPTX
TCP/IP 3-way Handshake
PPTX
Point to-point protocol (ppp)
PPTX
Hamming code system
Error control
Error detection correction (CRC)
HDLC(High level Data Link Control)
Issues in knowledge representation
TCP/IP 3-way Handshake
Point to-point protocol (ppp)
Hamming code system

What's hot (20)

PPTX
TCP and UDP
PDF
Network layer logical addressing
PPTX
Public Key Cryptosystem
PPTX
PPT
Design issues for the layers
PPT
Transport services
PPTX
switching techniques in data communication and networking
PPT
Error detection and correction
PPTX
Csma cd and csma-ca
PPTX
Unit 2 data link control
PPTX
Osi reference model
PPTX
Network Layer design Issues.pptx
PPTX
Congestion control algorithms.pptx
PPTX
Hdlc ppt..
PPTX
Routing algorithm
PPTX
Synchronous and Asynchronous Transmission
PPTX
Block cipher modes of operation
PPTX
Media Access Control
PPTX
Substitution techniques
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
TCP and UDP
Network layer logical addressing
Public Key Cryptosystem
Design issues for the layers
Transport services
switching techniques in data communication and networking
Error detection and correction
Csma cd and csma-ca
Unit 2 data link control
Osi reference model
Network Layer design Issues.pptx
Congestion control algorithms.pptx
Hdlc ppt..
Routing algorithm
Synchronous and Asynchronous Transmission
Block cipher modes of operation
Media Access Control
Substitution techniques
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Ad

Similar to Error Control In Network Layer (20)

PPTX
III_UNIT_ErrorCorrecting.pptx
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PPTX
Error Detection in Data link layer or Transport layer
PPT
Error correction and detection th
PPTX
Error detection techniques
PDF
07 Data Link LayerError Control.pdf
PDF
Error detection and correction
PDF
4 implementation of various error detection and correction techniques in c...
PPTX
Error Detection and Correctiouionvn.pptx
PPTX
Error detection methods-computer networks
PPTX
M3 Error detection & correction in data communication.pptx
PDF
Computer Networks Module II
PPTX
Error detection in Data comunication
PPT
computer Networks Error Detection and Correction.ppt
DOCX
Error dectation and correction
PPTX
Error detection.
PDF
Computer Networking and Data Transmission.pdf
PPTX
Lecture 4 errors detection
PDF
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
PPTX
DCN Error Detection & Correction
III_UNIT_ErrorCorrecting.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Error Detection in Data link layer or Transport layer
Error correction and detection th
Error detection techniques
07 Data Link LayerError Control.pdf
Error detection and correction
4 implementation of various error detection and correction techniques in c...
Error Detection and Correctiouionvn.pptx
Error detection methods-computer networks
M3 Error detection & correction in data communication.pptx
Computer Networks Module II
Error detection in Data comunication
computer Networks Error Detection and Correction.ppt
Error dectation and correction
Error detection.
Computer Networking and Data Transmission.pdf
Lecture 4 errors detection
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
DCN Error Detection & Correction
Ad

More from Ahtesham Ullah khan (6)

PPTX
DATA PREPROCESSING AND DATA CLEANSING
PPTX
A PRESENTATION ON INSTALLATION OF RAPID MINER & CHARTA PRESENTATION ON INSTAL...
PPTX
3D TRANSFORMATION: MATRIX REPRESENTATION
PPTX
HOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPT
PPTX
Flow control in Computer Network
PPTX
Framing in data link layer
DATA PREPROCESSING AND DATA CLEANSING
A PRESENTATION ON INSTALLATION OF RAPID MINER & CHARTA PRESENTATION ON INSTAL...
3D TRANSFORMATION: MATRIX REPRESENTATION
HOMOGENEOUS CO-ORDINATES IN COMPUTER GRAPHICS PPT
Flow control in Computer Network
Framing in data link layer

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Well-logging-methods_new................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Construction Project Organization Group 2.pptx
PPTX
web development for engineering and engineering
PPTX
Sustainable Sites - Green Building Construction
PPTX
Welding lecture in detail for understanding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Digital Logic Computer Design lecture notes
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Well-logging-methods_new................
Foundation to blockchain - A guide to Blockchain Tech
Mechanical Engineering MATERIALS Selection
Construction Project Organization Group 2.pptx
web development for engineering and engineering
Sustainable Sites - Green Building Construction
Welding lecture in detail for understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
CYBER-CRIMES AND SECURITY A guide to understanding
Lecture Notes Electrical Wiring System Components
Internet of Things (IOT) - A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
OOP with Java - Java Introduction (Basics)
Digital Logic Computer Design lecture notes
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
573137875-Attendance-Management-System-original
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

Error Control In Network Layer

  • 1. Presented by : Ahtesham Ullah Khan 1604610013 CSE 3RD YR ERROR CONTROL IN NETWORK LAYER
  • 2. There are two main types of errors in transmissions: 1. Single bit error : It means only one bit of data unit is changed from 1 to 0 or from 0 to 1. TYPES OF ERRORS
  • 3. 2. Burst error : It means two or more bits in data unit are changed from 1 to 0 from 0 to 1. In burst error, it is not necessary that only consecutive bits are changed. The length of burst error is measured from first changed bit to last changed bit
  • 4. ERROR CONTROL 1. Parity Checking 2. Cyclic Redundancy Check 3. Checksum There are two types of attacks against errors: 1. Error Detecting Codes: Include enough redundancy bits to detect errors and use ACKs and retransmissions to recover from the errors. 2. Error Correcting Codes: Include enough redundancy to detect and correct errors. The use of error-correcting codes is often referred to as forward error correction. ERROR CONTROL TECHNIQUE
  • 5. PARITY CHECK TECHNIQUE A parity check is the process that ensures accurate data transmission between nodes during communication. A parity bit is appended to the original data bits to create an even or odd bit number; the number of bits with value one. The source then transmits this data via a link, and bits are checked and verified at the destination. Data is considered accurate if the number of bits (even or odd) matches the number transmitted from the source. TYPE OF PARITY 1. Even Parity 2. Odd Parity
  • 7. CYCLIC REDUNDANCY CHECK 1. In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. 2. At the destination, the incoming data unit is divided by the same number. If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted. 3. A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.
  • 9. EXAMPLE : Data word : 1010 Divisor : 1011 1011 1010000 1 1011 1000 1011 011 CRC 1011 1010 1 1011 1011 1011 0000 ACCEPTED 00 1 001
  • 10. CHECKSUM 1. In checksum error detection scheme, the data is divided into k segments each of m bits. 2. In the sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum is complemented to get the checksum. 3. The checksum segment is sent along with the data segments. 4. At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented. 5. If the result is zero, the received data is accepted; otherwise discarded.