SlideShare a Scribd company logo
Error Control
Course
Computer Networks
Kifayat Ullah
(PhD/Postdoc) Associate
Professor
DEPARTMENT OF COMPUTER SCIENCE
CECOS University of IT & Emerging Sciences Peshawar, Pakistan
Error Control
=> There will be errors.
=> Change of one or more bits
=> Some applications can tolerate a small level of
error. => If a frame is corrupted between the two
nodes, it needs to be corrected before it continues its
journey to other nodes.
2
Error Control
3
Error Control
- Error detection codes
- Forward error correction (FEC) codes -
Automatic Repeat reQuest (ARQ)
protocols
4
Error Control
- Error detection codes
→Redundancy
→Detects the presence of error
- Forward error correction (FEC)
codes →Redundancy
→Detects and correct errors
- Automatic Repeat reQuest (ARQ)
protocols →Discard frames
→Retransmits
5
Types of Errors
6
Types of Errors
7
Error Detection vs. Correction
=> Correction is more difficult.
Detection
=> Looking to see if any error has occurred.
Correction
=> Need to know the exact number of bits that are
corrupted => Their location in the message.
=> Two important factors:
- Number of errors
- Size of the message
8
Redundancy
=> The central concept in detecting or correcting
errors is redundancy.
=> To be able to detect or correct errors, we need to
send some extra bits with our data.
=> These redundant bits are added by the sender
and removed by the receiver.
=> Their presence allows the receiver to detect or
correct corrupted bits.
9
Redundan
cy (Coding)
10
Coding
(Block coding)
11
Error Detection
12
Error Detection
(Example)
=> Assume the sender encodes the 01 as 011
and sends. => Consider the following cases.
- 011 is received.
- 111 is received.
- 000 is received.
13
Error Detection Techniques
14
Parity Check
=> Simplest and most common error-detecting
scheme. => Append a parity bit to the end of a block
of data. => Parity refers to the evenness or oddness
of the number of bits.
Even parity
=> The total number of 1’s transmitted must be
even Odd parity
=> The total number of 1’s transmitted must be odd.
15
Parity Check
16
Parity Check
17
Parity Check
Discuss advantages and disadvantages
18
Checksum
=> Error-detection mechanism used to verify the
integrity of data during transmission.
=> Works by calculating a small-sized fixed block of
data (the checksum) from a larger block of data.
=> If a bit(s) changes in the original data, the
checksum will likely be different.
=> Can be applied to a message of any length. => In
the Internet, the checksum technique is mostly used
at the network and transport layer.
19
Checksum
20
Checksum
(Example)
=> Suppose the message is a list of five 4-bit
numbers. => In addition to sending these numbers,
we send the sum of the numbers.
=> If the set of numbers is (7, 11, 12, 0, 6), we send
(7, 11, 12, 0, 6, 36), where 36 is the sum of the
original numbers. => The receiver adds the five
numbers and compares the result with the sum.
=> If the two are the same, the receiver assumes no
error, accepts the five numbers, and discards the
sum.
21
Checksum
(One’s complement)
=> The above example has one major drawback.
=> Each number can be written as a 4-bit word (each
is less than 15) except for the sum.
=> One solution is to use one’s complement
arithmetic. - If a number has more than m bits, the
extra leftmost bits need to be added to the m
rightmost bits (wrapping).
22
Checksum
(One’s complement - Example)
=> In the previous example, 36 in binary is (100100)2. =>
To change it to a 4-bit number we add the extra leftmost
bit to the right four bits.
(10)2 + (0100)2 = (0110)2 → (6)10.
=> Instead of sending 36 as the sum, we can send 6 as
the sum (7, 11, 12, 0, 6, 6).
=> The receiver can add the first five numbers in
one’s complement arithmetic.
=> If the result is 6, the numbers are accepted; otherwise,
they
are rejected. 23
Checksum
=> We can make the job of the receiver easier if we send the
complement of the sum, the checksum.
One’s complement arithmetic:
=> Complement of a number=changing all 1s to 0s and all 0s
to 1s). => We have two 0s: one positive and one negative.
=> Positive zero= All bits set to 0.
=> Negative zero= All bits set to 1.
=> If we add a number with its complement, we get a negative zero.
=> When the receiver adds all five numbers (including the
checksum), it gets a negative zero.
=> The receiver can complement the result again to get a positive
zero.
24
Checksu
m
(Example)
25
Internet Checksum
=> Error detecting code used in many standard
protocols. => Makes use of one’s complement
arithmetic. => Provides greater error-detection
capability than a parity bit.
=> Less effective than the CRC.
=>The primary reason for its adoption in Internet
protocols is efficiency.
=> Traditionally, the Internet has used a 16-bit
checksum.
26
Internet Checksum
27
Cyclic Redundancy Check
(CRC) In Assignment#02
28
Thank You

More Related Content

PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PPSX
Error control
PPT
111111111111111111111111111111111111lect5.ppt
PPT
lect5.ppt
PDF
datalinklayer-130407001728-phpapp01.pdf sa
PDF
Computer Networks Module II
PPT
Error correction and detection th
PPTX
Data link layar
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Error control
111111111111111111111111111111111111lect5.ppt
lect5.ppt
datalinklayer-130407001728-phpapp01.pdf sa
Computer Networks Module II
Error correction and detection th
Data link layar

Similar to Computer Networking and Data Transmission.pdf (20)

PPT
Skr+3200+chapter+3+(kweh)
PPTX
Error detection and correction
PPTX
Data link layar
PPTX
Data link layar
PPTX
Error detection methods-computer networks
PDF
04_Digital Data Communication Techniques - Part 2.pdf
PPTX
III_UNIT_ErrorCorrecting.pptx
PPTX
Error Detection in Data link layer or Transport layer
PDF
07 Data Link LayerError Control.pdf
PPTX
Error detection.
PPTX
Lecture 4 errors detection
PPTX
Coding Scheme/ Information theory/ Error coding scheme
PPT
Error Detect and Correct.ppt
PPTX
Data link layer
PPTX
Parity check, redundancy, and errors
PPTX
Error Control In Network Layer
PPT
computer Networks Error Detection and Correction.ppt
PDF
Error.pdf
PPT
PPTX
DCN Error Detection & Correction
Skr+3200+chapter+3+(kweh)
Error detection and correction
Data link layar
Data link layar
Error detection methods-computer networks
04_Digital Data Communication Techniques - Part 2.pdf
III_UNIT_ErrorCorrecting.pptx
Error Detection in Data link layer or Transport layer
07 Data Link LayerError Control.pdf
Error detection.
Lecture 4 errors detection
Coding Scheme/ Information theory/ Error coding scheme
Error Detect and Correct.ppt
Data link layer
Parity check, redundancy, and errors
Error Control In Network Layer
computer Networks Error Detection and Correction.ppt
Error.pdf
DCN Error Detection & Correction
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
PPH.pptx obstetrics and gynecology in nursing
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Complications of Minimal Access Surgery at WLH
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Module 4: Burden of Disease Tutorial Slides S2 2025
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
TR - Agricultural Crops Production NC III.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Microbial diseases, their pathogenesis and prophylaxis
Ad

Computer Networking and Data Transmission.pdf

  • 1. Error Control Course Computer Networks Kifayat Ullah (PhD/Postdoc) Associate Professor DEPARTMENT OF COMPUTER SCIENCE CECOS University of IT & Emerging Sciences Peshawar, Pakistan
  • 2. Error Control => There will be errors. => Change of one or more bits => Some applications can tolerate a small level of error. => If a frame is corrupted between the two nodes, it needs to be corrected before it continues its journey to other nodes. 2
  • 4. - Error detection codes - Forward error correction (FEC) codes - Automatic Repeat reQuest (ARQ) protocols
  • 5. 4 Error Control - Error detection codes →Redundancy →Detects the presence of error
  • 6. - Forward error correction (FEC) codes →Redundancy →Detects and correct errors - Automatic Repeat reQuest (ARQ) protocols →Discard frames →Retransmits 5 Types of Errors
  • 9. => Correction is more difficult. Detection => Looking to see if any error has occurred. Correction => Need to know the exact number of bits that are corrupted => Their location in the message. => Two important factors: - Number of errors - Size of the message 8
  • 10. Redundancy => The central concept in detecting or correcting errors is redundancy. => To be able to detect or correct errors, we need to send some extra bits with our data. => These redundant bits are added by the sender and removed by the receiver. => Their presence allows the receiver to detect or correct corrupted bits.
  • 12. 10
  • 16. (Example) => Assume the sender encodes the 01 as 011 and sends. => Consider the following cases. - 011 is received. - 111 is received. - 000 is received. 13
  • 18. Parity Check => Simplest and most common error-detecting scheme. => Append a parity bit to the end of a block of data. => Parity refers to the evenness or oddness of the number of bits. Even parity => The total number of 1’s transmitted must be even Odd parity => The total number of 1’s transmitted must be odd. 15
  • 21. Parity Check Discuss advantages and disadvantages 18
  • 22. Checksum => Error-detection mechanism used to verify the integrity of data during transmission. => Works by calculating a small-sized fixed block of data (the checksum) from a larger block of data. => If a bit(s) changes in the original data, the checksum will likely be different. => Can be applied to a message of any length. => In the Internet, the checksum technique is mostly used at the network and transport layer.
  • 25. (Example) => Suppose the message is a list of five 4-bit numbers. => In addition to sending these numbers, we send the sum of the numbers. => If the set of numbers is (7, 11, 12, 0, 6), we send (7, 11, 12, 0, 6, 36), where 36 is the sum of the original numbers. => The receiver adds the five numbers and compares the result with the sum. => If the two are the same, the receiver assumes no error, accepts the five numbers, and discards the
  • 26. sum. 21 Checksum (One’s complement) => The above example has one major drawback. => Each number can be written as a 4-bit word (each is less than 15) except for the sum. => One solution is to use one’s complement arithmetic. - If a number has more than m bits, the
  • 27. extra leftmost bits need to be added to the m rightmost bits (wrapping). 22 Checksum (One’s complement - Example) => In the previous example, 36 in binary is (100100)2. => To change it to a 4-bit number we add the extra leftmost bit to the right four bits. (10)2 + (0100)2 = (0110)2 → (6)10. => Instead of sending 36 as the sum, we can send 6 as the sum (7, 11, 12, 0, 6, 6).
  • 28. => The receiver can add the first five numbers in one’s complement arithmetic. => If the result is 6, the numbers are accepted; otherwise, they are rejected. 23 Checksum => We can make the job of the receiver easier if we send the complement of the sum, the checksum. One’s complement arithmetic: => Complement of a number=changing all 1s to 0s and all 0s to 1s). => We have two 0s: one positive and one negative. => Positive zero= All bits set to 0.
  • 29. => Negative zero= All bits set to 1. => If we add a number with its complement, we get a negative zero. => When the receiver adds all five numbers (including the checksum), it gets a negative zero. => The receiver can complement the result again to get a positive zero. 24 Checksu m (Example)
  • 31. => Error detecting code used in many standard protocols. => Makes use of one’s complement arithmetic. => Provides greater error-detection capability than a parity bit. => Less effective than the CRC. =>The primary reason for its adoption in Internet protocols is efficiency. => Traditionally, the Internet has used a 16-bit checksum. 26
  • 33. Cyclic Redundancy Check (CRC) In Assignment#02