6
Most read
7
Most read
9
Most read
ERROR CONTROL CODING TECHNIQUES
CYCLIC REDUNDANCY CHECK
DONE BY: ENG. SALEH ALRKIYAN | HTTPS://WWW.LINKEDIN.COM/IN/SALRKIYAN
INFORMATION THEORY & CODING
CYCLIC REDUNDANCY CODES
 Cyclic Redundancy Codes (CRCs) provide a first line of defense against data
corruption in many networks. Unfortunately, many commonly used CRC
polynomials provide significantly less error detection capability than they
might. An exhaustive exploration reveals that most previously published CRC
polynomials are either inferior to alternatives or are only good choices for
particular message lengths.
CYCLIC REDUNDANCY CODES
 The cyclic redundancy check, or CRC, is a technique for detecting errors in
digital data, but not for making corrections when errors are detected.
 It is used primarily in data transmission. In the CRC method, a certain number
of check bits, often called a checksum, are appended to the message being
transmitted.
 The receiver can determine whether or not the check bits agree with the data,
to ascertain with a certain degree of probability whether or not an error
occurred in transmission. If an error occurred, the receiver sends a “negative
acknowledgement” (NAK) back to the sender, requesting that the message be
retransmitted.
 The technique is also sometimes applied to data storage devices, such as a
disk drive.
DATA STORING
 Data are stored in bytes, which consist of 8 bits each. Thus any set of data can
be considered as sequence of bytes or bits. In computer communication
usually the bits are considered to be independent and a bit sequence is
limited by the size of data blocks (or frames, packets, datagrams etc.). Thus we
consider the problem to check whether a finite sequence of bits is changed
unintentionally, e.g. by transmission errors or faulty memories.
 Cyclic redundancy check performs a special operation that can be interpreted
as polynomial division. The residual of this division is used as redundancy
information and we will explore in this paper which types of errors can be
detected by this method.
EXPLAINED STEP BY STEP
 First of all, we should know the major rule of CRC which is: The Power of
each term shows the position of the bit, and the coefficient shows the
value of the bit.
AT THE SENDER
 Step #1: At sender side, a string of n 0s is appended to the data unit to be
transmitted where n is less than the number of bits in the CRC generator.
 Step #2: The newly formed data unit is divided by the divisor using binary
division and reminder is obtained this reminder is called CRC, and when we
divide we use XOR Gate.
 Step #3: String on n 0s appended to the data unit earlier is replaced by the CRC
reminder –which us also n bit.
 Step #4: (Data unit + CRC) is transmitted to the receiver.
XOR
A B Y
0 0
0 1
1 0
1 1
0
1
1
0
EXAMPLE: SUPPOSE, CRC GENERATOR = 𝑥4 + 𝑥 + 1, AND SUPPOSE DATA UNIT TO BE
TRANSMITTED = 1101011011, FIND THE MESSAGE TO BE TRANSMITTED.
 Codeword after
appending the 4 zeroes
= 11010110110000,
Reminder ‘CRC’= 1110.
 After replacing,
Codeword =
11010110111110.
 Now, the message
will transmit to the
receiver.
AT THE RECEIVER
 Step #1: The receiver on receiving the codeword, divides (Data
unit + CRC) by the same division and checks the reminder.
 Step #2: The receiver checks if the reminder is zero.
 If Yes, Receiver assume that there is no error in data and and therefore accept it.
 If No, There is an error in data and therefore reject it.
XOR
A B Y
0 0
0 1
1 0
1 1
0
1
1
0
EXAMPLE: SUPPOSE, CRC GENERATOR =10011, AND SUPPOSE DATA UNIT RECEIVED =
11010110111110, FIND THE RECEIVED MESSAGE AND CHECKS ERROR.
 Now, the receiver accepts the
message.
Cyclic redundancy check

More Related Content

PPTX
Presentation on cyclic redundancy check (crc)
PPTX
Cyclic Redundancy Check in Computers Network
PPT
Error Detection And Correction
PPTX
Error Detection and Correction presentation
PDF
Star and Delta Connection.pdf
PPTX
Connection Establishment & Flow and Congestion Control
PPT
Network layer tanenbaum
PPTX
PPT on Data Science Using Python
Presentation on cyclic redundancy check (crc)
Cyclic Redundancy Check in Computers Network
Error Detection And Correction
Error Detection and Correction presentation
Star and Delta Connection.pdf
Connection Establishment & Flow and Congestion Control
Network layer tanenbaum
PPT on Data Science Using Python

What's hot (20)

PPTX
Point to-point protocol (ppp)
PPT
Lecture 20
PPTX
Framing in data link layer
PPTX
Data link layer
PPTX
Error control
PPTX
Ethernet
PPT
Packet switching
PPTX
BIT Error Rate
PPT
Chapter 4 data link layer
PPTX
Leaky bucket A
PPTX
DCN Error Detection & Correction
PPT
Chapter 2 - Network Models
PPTX
Transmission Control Protocol (TCP)
PPTX
Go back-n protocol
PPTX
ALOHA Protocol (in detail)
PPTX
Tcp and udp
PPT
Selective repeat protocol
PPTX
Go Back N ARQ
PPT
Multiple access techniques
PPTX
The medium access sublayer
Point to-point protocol (ppp)
Lecture 20
Framing in data link layer
Data link layer
Error control
Ethernet
Packet switching
BIT Error Rate
Chapter 4 data link layer
Leaky bucket A
DCN Error Detection & Correction
Chapter 2 - Network Models
Transmission Control Protocol (TCP)
Go back-n protocol
ALOHA Protocol (in detail)
Tcp and udp
Selective repeat protocol
Go Back N ARQ
Multiple access techniques
The medium access sublayer
Ad

Viewers also liked (20)

PPTX
CRC Error coding technique
PPTX
PPTX
Parity check(Error Detecting Codes)
PPTX
Error Detection and Correction - Data link Layer
PPT
Error detection and correction
PPTX
Computer Networks - Error Detection & Error Correction
DOCX
OperacióN Binaria
PPT
05 directnets errors
PPTX
Status register
PPTX
Introduction of digital communication
PPT
E.s unit 4 and 5
PPTX
How to Use Dreamweaver cs6
PDF
Dreamweaver cs6 step by step
PPT
Lecture 21
PPT
Chapter 03 cyclic codes
PPTX
Synthesis
PPT
Ch10
PPTX
E.s (2)
PPT
Pure Aloha and Slotted Aloha
CRC Error coding technique
Parity check(Error Detecting Codes)
Error Detection and Correction - Data link Layer
Error detection and correction
Computer Networks - Error Detection & Error Correction
OperacióN Binaria
05 directnets errors
Status register
Introduction of digital communication
E.s unit 4 and 5
How to Use Dreamweaver cs6
Dreamweaver cs6 step by step
Lecture 21
Chapter 03 cyclic codes
Synthesis
Ch10
E.s (2)
Pure Aloha and Slotted Aloha
Ad

Similar to Cyclic redundancy check (20)

PPTX
Flow control and error control techniques in the data link layer protocol
PPTX
Error correction and Detection technique while sending the message
PPTX
Introduction to data link layer
PPTX
III_UNIT_ErrorCorrecting.pptx
PPTX
dccn ppt.pptx
PDF
B0210714
PPTX
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PDF
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
PPTX
Error detection techniques
PPTX
Error detection and correction
PDF
Data link layer tutorial
PPTX
CN module for the second od momodule.ppt
PPTX
data link layer - Chapter 3
PPTX
Error Detection in Data link layer or Transport layer
PPT
Error correction and detection th
PPTX
Error detection.
PPT
computer Networks Error Detection and Correction.ppt
PPTX
computer network-unit 2
PPT
5 DLL-LLC- Book
Flow control and error control techniques in the data link layer protocol
Error correction and Detection technique while sending the message
Introduction to data link layer
III_UNIT_ErrorCorrecting.pptx
dccn ppt.pptx
B0210714
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
Error detection techniques
Error detection and correction
Data link layer tutorial
CN module for the second od momodule.ppt
data link layer - Chapter 3
Error Detection in Data link layer or Transport layer
Error correction and detection th
Error detection.
computer Networks Error Detection and Correction.ppt
computer network-unit 2
5 DLL-LLC- Book

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
IP : I ; Unit I : Preformulation Studies
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PDF
HVAC Specification 2024 according to central public works department
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Education and Perspectives of Education.pptx
PPTX
Module on health assessment of CHN. pptx
PDF
semiconductor packaging in vlsi design fab
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
IP : I ; Unit I : Preformulation Studies
Climate and Adaptation MCQs class 7 from chatgpt
HVAC Specification 2024 according to central public works department
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Introduction to pro and eukaryotes and differences.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Empowerment Technology for Senior High School Guide
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Journal of Dental Science - UDMY (2022).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Education and Perspectives of Education.pptx
Module on health assessment of CHN. pptx
semiconductor packaging in vlsi design fab
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
English Textual Question & Ans (12th Class).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx

Cyclic redundancy check

  • 1. ERROR CONTROL CODING TECHNIQUES CYCLIC REDUNDANCY CHECK DONE BY: ENG. SALEH ALRKIYAN | HTTPS://WWW.LINKEDIN.COM/IN/SALRKIYAN INFORMATION THEORY & CODING
  • 2. CYCLIC REDUNDANCY CODES  Cyclic Redundancy Codes (CRCs) provide a first line of defense against data corruption in many networks. Unfortunately, many commonly used CRC polynomials provide significantly less error detection capability than they might. An exhaustive exploration reveals that most previously published CRC polynomials are either inferior to alternatives or are only good choices for particular message lengths.
  • 3. CYCLIC REDUNDANCY CODES  The cyclic redundancy check, or CRC, is a technique for detecting errors in digital data, but not for making corrections when errors are detected.  It is used primarily in data transmission. In the CRC method, a certain number of check bits, often called a checksum, are appended to the message being transmitted.  The receiver can determine whether or not the check bits agree with the data, to ascertain with a certain degree of probability whether or not an error occurred in transmission. If an error occurred, the receiver sends a “negative acknowledgement” (NAK) back to the sender, requesting that the message be retransmitted.  The technique is also sometimes applied to data storage devices, such as a disk drive.
  • 4. DATA STORING  Data are stored in bytes, which consist of 8 bits each. Thus any set of data can be considered as sequence of bytes or bits. In computer communication usually the bits are considered to be independent and a bit sequence is limited by the size of data blocks (or frames, packets, datagrams etc.). Thus we consider the problem to check whether a finite sequence of bits is changed unintentionally, e.g. by transmission errors or faulty memories.  Cyclic redundancy check performs a special operation that can be interpreted as polynomial division. The residual of this division is used as redundancy information and we will explore in this paper which types of errors can be detected by this method.
  • 5. EXPLAINED STEP BY STEP  First of all, we should know the major rule of CRC which is: The Power of each term shows the position of the bit, and the coefficient shows the value of the bit.
  • 6. AT THE SENDER  Step #1: At sender side, a string of n 0s is appended to the data unit to be transmitted where n is less than the number of bits in the CRC generator.  Step #2: The newly formed data unit is divided by the divisor using binary division and reminder is obtained this reminder is called CRC, and when we divide we use XOR Gate.  Step #3: String on n 0s appended to the data unit earlier is replaced by the CRC reminder –which us also n bit.  Step #4: (Data unit + CRC) is transmitted to the receiver. XOR A B Y 0 0 0 1 1 0 1 1 0 1 1 0
  • 7. EXAMPLE: SUPPOSE, CRC GENERATOR = 𝑥4 + 𝑥 + 1, AND SUPPOSE DATA UNIT TO BE TRANSMITTED = 1101011011, FIND THE MESSAGE TO BE TRANSMITTED.  Codeword after appending the 4 zeroes = 11010110110000, Reminder ‘CRC’= 1110.  After replacing, Codeword = 11010110111110.  Now, the message will transmit to the receiver.
  • 8. AT THE RECEIVER  Step #1: The receiver on receiving the codeword, divides (Data unit + CRC) by the same division and checks the reminder.  Step #2: The receiver checks if the reminder is zero.  If Yes, Receiver assume that there is no error in data and and therefore accept it.  If No, There is an error in data and therefore reject it. XOR A B Y 0 0 0 1 1 0 1 1 0 1 1 0
  • 9. EXAMPLE: SUPPOSE, CRC GENERATOR =10011, AND SUPPOSE DATA UNIT RECEIVED = 11010110111110, FIND THE RECEIVED MESSAGE AND CHECKS ERROR.  Now, the receiver accepts the message.