SlideShare a Scribd company logo
Linear Block and Cyclic Codes used
for two error detection and single
error correction
--------------------------------
Anwar liwaa shakir
MSC.
Communication engineer
Uok
Basic concepts
 Networks must be able to transfer data from one device
to another with complete accuracy.
 Data can be corrupted during transmission.
 For reliable communication, errors must be detected and
corrected.
 Error detection and
correction are implemented either at the
data link layer or the transport layer of the OSI
model.
Types of Errors
Error detection
-Check if any error has occurred
-Don't care the number of errors
-Don't care the positions of errors
 Error correction
-Need to know the number of errors
-Need to know the positions of errors
-More difficult
Single-bit error
Multiple -bit error
Single bit errors are the least likely type of errors in serial
data transmission because the noise must have a very short
duration which is very rare. However this kind of errors
can happen in parallel transmission.
Example:
If data is sent at 1Mbps then each bit lasts only
1/1,000,000 sec. or 1 μs.
For a single-bit error to occur, the noise must have a
duration of only 1 μs, which is very rare.
Burst error
The term burst error means that two or more bits in the
data unit have changed from 1 to 0 or from 0 to 1.
Burst errors does not necessarily mean that the errors
occur in consecutive bits, the length of the burst is
measured from the first corrupted bit to the last corrupted
bit. Some bits in between may not have been corrupted.
 Burst error is most likely to happen in serial
transmission since the duration of noise is normally
longer than the duration of a bit.
 The number of bits affected depends on the data rate and
duration of noise.
Example:
If data is sent at rate = 1Kbps then a noise of
1/100 sec can affect 10 bits.(1/100*1000)
If same data is sent at rate = 1Mbps then a noise
of 1/100 sec can affect 10,000 bits.(1/100*106)
Error detection
 Error detection means to decide whether the received
data is correct or not
 Error detection uses the concept of redundancy,
Redundancy
Parity check Linear block
The simplest method available –
it’s a linear ,systematic block code
 Single parity check
 Two dimensional parity check
How to use parity methods?
Parity generate-sender’s side
Parity detect-receiver’s side
TWO-DIMENTIONAL PARITY CHECK
(LRC)
 In two- dimensional parity check, a block of bits is divided into
rows and redundant row of bits is added to the whole block.
 Even parity concept
Example:
 In transmitter :
compute(m+n+1) parity bits
Drawbacks of 2D parity check
Figure : Two-dimensional parity-check code
• 1 affect 3 ,2 affect 3,3 affect 4 ,4 affect 4 –so can not detect in this case
• Disadvantage :too many check bits!!
• Can not detect error, if bits in one data unit are changed and 2 bits in exactly the
same position in another data unit is changed
Figure Two-dimensional parity-check code
CYCLIC REDUNDANCY CHECK
(CRC)
• Most powerful of the
redundancy checking
• Parity is based on addition
• CRC is based on binary
division
Figure Division in CRC
encoder
Figure Division in the CRC decoder for two cases
• In a cyclic code,
• If s(x) ≠ 0, one or more bits is
corrupted.
• If s(x) = 0, either
• a. No bit is corrupted. or
• b. Some bits are corrupted, but the
decoder failed to detect them.
ADVANTAGES OF CYCLIC
CODES Cyclic
 codes have a very good performance in detecting
single-bit errors, double errors, a n odd number of
errors.
 They can easily be implemented in hardware and
software.
 They are especially fast when implemented in
hardware.
 This has made cyclic codes a good candidate for
many networks
Thank you

More Related Content

PPT
Error detection and correction.ppt
PPT
Error correction error detection in digital communication
PPT
Error Detection and Correction.ppt
PPT
901325_chapter 10 (1).ppt
PDF
Data Link Layer Error Correction and Detection
PPT
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
PPT
error detection.ppt
PPTX
Error detection and correction
Error detection and correction.ppt
Error correction error detection in digital communication
Error Detection and Correction.ppt
901325_chapter 10 (1).ppt
Data Link Layer Error Correction and Detection
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
error detection.ppt
Error detection and correction

Similar to CODING.ppt (20)

PPT
Error detection.ppt
PPTX
Error Detection and Correctiouionvn.pptx
PPT
Error correction and detection th
PPT
computer Networks Error Detection and Correction.ppt
PPTX
Chapter 2.1.1.pptx
PPT
PDF
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
PPTX
Lecture 13
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PPTX
Computer Networks - Error Detection and Correction
PPTX
computer network-unit 2
PPTX
COMPUTER NETWORKS UNIT 2
PDF
Error detection and correction
PDF
computer networks Error Detection Methods.pdf
PPT
Ch6.ppt
PPTX
M3 Error detection & correction in data communication.pptx
PPT
Chapter 4 data link layer
PPTX
Error Detection in Data link layer or Transport layer
PPTX
III_UNIT_ErrorCorrecting.pptx
PPTX
computer networks Module 4.pptx for MCA students
Error detection.ppt
Error Detection and Correctiouionvn.pptx
Error correction and detection th
computer Networks Error Detection and Correction.ppt
Chapter 2.1.1.pptx
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
Lecture 13
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Computer Networks - Error Detection and Correction
computer network-unit 2
COMPUTER NETWORKS UNIT 2
Error detection and correction
computer networks Error Detection Methods.pdf
Ch6.ppt
M3 Error detection & correction in data communication.pptx
Chapter 4 data link layer
Error Detection in Data link layer or Transport layer
III_UNIT_ErrorCorrecting.pptx
computer networks Module 4.pptx for MCA students
Ad

Recently uploaded (20)

PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Construction Project Organization Group 2.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PPT on Performance Review to get promotions
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
Construction Project Organization Group 2.pptx
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT on Performance Review to get promotions
Safety Seminar civil to be ensured for safe working.
OOP with Java - Java Introduction (Basics)
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Well-logging-methods_new................
Geodesy 1.pptx...............................................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
web development for engineering and engineering
Ad

CODING.ppt

  • 1. Linear Block and Cyclic Codes used for two error detection and single error correction -------------------------------- Anwar liwaa shakir MSC. Communication engineer Uok
  • 2. Basic concepts  Networks must be able to transfer data from one device to another with complete accuracy.  Data can be corrupted during transmission.  For reliable communication, errors must be detected and corrected.  Error detection and correction are implemented either at the data link layer or the transport layer of the OSI model.
  • 4. Error detection -Check if any error has occurred -Don't care the number of errors -Don't care the positions of errors  Error correction -Need to know the number of errors -Need to know the positions of errors -More difficult
  • 6. Single bit errors are the least likely type of errors in serial data transmission because the noise must have a very short duration which is very rare. However this kind of errors can happen in parallel transmission. Example: If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs. For a single-bit error to occur, the noise must have a duration of only 1 μs, which is very rare.
  • 8. The term burst error means that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1. Burst errors does not necessarily mean that the errors occur in consecutive bits, the length of the burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may not have been corrupted.
  • 9.  Burst error is most likely to happen in serial transmission since the duration of noise is normally longer than the duration of a bit.  The number of bits affected depends on the data rate and duration of noise. Example: If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000) If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000 bits.(1/100*106)
  • 10. Error detection  Error detection means to decide whether the received data is correct or not  Error detection uses the concept of redundancy,
  • 12. Parity check Linear block The simplest method available – it’s a linear ,systematic block code  Single parity check  Two dimensional parity check How to use parity methods? Parity generate-sender’s side Parity detect-receiver’s side
  • 13. TWO-DIMENTIONAL PARITY CHECK (LRC)  In two- dimensional parity check, a block of bits is divided into rows and redundant row of bits is added to the whole block.  Even parity concept
  • 14. Example:  In transmitter : compute(m+n+1) parity bits
  • 15. Drawbacks of 2D parity check Figure : Two-dimensional parity-check code
  • 16. • 1 affect 3 ,2 affect 3,3 affect 4 ,4 affect 4 –so can not detect in this case • Disadvantage :too many check bits!! • Can not detect error, if bits in one data unit are changed and 2 bits in exactly the same position in another data unit is changed Figure Two-dimensional parity-check code
  • 17. CYCLIC REDUNDANCY CHECK (CRC) • Most powerful of the redundancy checking • Parity is based on addition • CRC is based on binary division
  • 18. Figure Division in CRC encoder
  • 19. Figure Division in the CRC decoder for two cases
  • 20. • In a cyclic code, • If s(x) ≠ 0, one or more bits is corrupted. • If s(x) = 0, either • a. No bit is corrupted. or • b. Some bits are corrupted, but the decoder failed to detect them.
  • 21. ADVANTAGES OF CYCLIC CODES Cyclic  codes have a very good performance in detecting single-bit errors, double errors, a n odd number of errors.  They can easily be implemented in hardware and software.  They are especially fast when implemented in hardware.  This has made cyclic codes a good candidate for many networks

Editor's Notes

  • #11: Make sense of message. Make sense of message.