SlideShare a Scribd company logo
ERROR DETECTION
Error Detection
• Data can be corrupted during transmission.
• For reliable communication, errors must be detection and correction.
• Using some error correct detection and correction algorithm, the
receiver reconstructs the message
Error Detection Techniques
• Common technique for detecting transmission error
• CRC (Cyclic Redundancy Check)
• Two Dimensional Parity
• Checksum
Error Detection
• Extra bits are redundant
• They add no new information to the message
• Derived from the original message using some algorithm
• Both the sender and receiver know the algorithm
Two-Dimensional Parity
• Two-dimensional parity is exactly what the name suggests
• It is based on “simple” (one-dimensional) parity, which usually
involves adding one extra bit to a 7-bit code to balance the number of
1s in the byte. For example,
• Odd parity sets the eighth bit to 1 if needed to give an odd number of 1s in the
byte, and
• Even parity sets the eighth bit to 1 if needed to give an even number of 1s in
the byte
Two-Dimensional Parity
• Two-dimensional parity does a similar calculation for each bit position
across each of the bytes contained in the frame
• This results in an extra parity byte for the entire frame, in addition to a
parity bit for each byte
• Two-dimensional parity catches all 1-, 2-, and 3-bit errors.
Two-Dimensional Parity
Checksum
• Add up all the words that are transmitted and then transmit the result
of that sum
• The result is called the checksum
• The receiver performs the same calculation on the received data and
compares the result with the received checksum
• If any transmitted data, including the checksum itself, is corrupted,
then the results will not match, so the receiver knows that an error
occurred
Cyclic Redundancy Check (CRC)
• Reduce the number of extra bits and maximize protection
• Given a bit string 110001 we can associate a polynomial on a single
variable x for it.
1.x5
+1.x4
+0.x3
+0.x2
+0.x1
+1.x0
= x5
+x4
+1 and the degree is 5.
A k-bit frame has a maximum degree of k-1
• Let M(x) be a message polynomial and C(x) be a generator
polynomial
Cyclic Redundancy Check (CRC)

More Related Content

PPTX
Error detection.
PDF
07 Data Link LayerError Control.pdf
PPTX
M3 Error detection & correction in data communication.pptx
PPT
Error correction and detection th
PDF
Error detection and correction
PPTX
Error Detection in Data link layer or Transport layer
PPTX
DCN Error Detection & Correction
PDF
4 implementation of various error detection and correction techniques in c...
Error detection.
07 Data Link LayerError Control.pdf
M3 Error detection & correction in data communication.pptx
Error correction and detection th
Error detection and correction
Error Detection in Data link layer or Transport layer
DCN Error Detection & Correction
4 implementation of various error detection and correction techniques in c...

Similar to error detection and Error control detection .ppt (20)

PPTX
Error detection and correction of computer network
PPTX
Lecture 4 errors detection
PPTX
Computer_Communication_Networking_L07Data_Link_Error_control.pptx
PPTX
Group Presentation - Cyclic Redundancy Checks.pptx
PPTX
Error detection and correction
PDF
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
PPT
Errror Detection and Correction
PPT
PPTX
Parity check, redundancy, and errors
PPTX
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
PPT
DOCX
Error dectation and correction
PPT
Skr+3200+chapter+3+(kweh)
PPTX
Error Detection and Correctiouionvn.pptx
PPSX
Error control
PPT
computer Networks Error Detection and Correction.ppt
PDF
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
PPTX
22BA013 IM.pptx
PDF
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
PPTX
Error detection methods-computer networks
Error detection and correction of computer network
Lecture 4 errors detection
Computer_Communication_Networking_L07Data_Link_Error_control.pptx
Group Presentation - Cyclic Redundancy Checks.pptx
Error detection and correction
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
Errror Detection and Correction
Parity check, redundancy, and errors
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Error dectation and correction
Skr+3200+chapter+3+(kweh)
Error Detection and Correctiouionvn.pptx
Error control
computer Networks Error Detection and Correction.ppt
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
22BA013 IM.pptx
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
Error detection methods-computer networks
Ad

More from RAJESH S (20)

PDF
Service Operation Managements Unit 1.pdf
PPT
Unit II Ethernet devices and Sub categories.ppt
PPT
Connecting devices in Computer parts.ppt
PPTX
unitios-22112405585Operational 3-5fc1b7da.pptx
PPT
Analysis of Algorithm DAA notes Part 1.ppt
PPTX
Logical link protocols and service data.pptx
PPT
Analysis of Algorithm Part one analysis.ppt
PPT
Entreprise Resource Planning s unit 2.ppt
PPTX
Decision support systems in information management
PPT
IM Unit 4 Security and its a control.ppt
PPT
unit5 Enterprise Resource Planning new trends.ppt
PPTX
science engineering and technology .pptx
PPTX
policies in economics trends for engineers
PDF
Product Decisions and its aplication in global world
PPT
Database management system basics and it applications
PPTX
Computer Animation.pptx
PPTX
IOT in agriculture.pptx
PPTX
18copy.pptx
PPT
ERP unit 1.ppt
PPT
fiscalpolicy.ppt
Service Operation Managements Unit 1.pdf
Unit II Ethernet devices and Sub categories.ppt
Connecting devices in Computer parts.ppt
unitios-22112405585Operational 3-5fc1b7da.pptx
Analysis of Algorithm DAA notes Part 1.ppt
Logical link protocols and service data.pptx
Analysis of Algorithm Part one analysis.ppt
Entreprise Resource Planning s unit 2.ppt
Decision support systems in information management
IM Unit 4 Security and its a control.ppt
unit5 Enterprise Resource Planning new trends.ppt
science engineering and technology .pptx
policies in economics trends for engineers
Product Decisions and its aplication in global world
Database management system basics and it applications
Computer Animation.pptx
IOT in agriculture.pptx
18copy.pptx
ERP unit 1.ppt
fiscalpolicy.ppt
Ad

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Well-logging-methods_new................
PPT
introduction to datamining and warehousing
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Digital Logic Computer Design lecture notes
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
PPT on Performance Review to get promotions
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
OOP with Java - Java Introduction (Basics)
Automation-in-Manufacturing-Chapter-Introduction.pdf
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
Well-logging-methods_new................
introduction to datamining and warehousing
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
R24 SURVEYING LAB MANUAL for civil enggi
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Digital Logic Computer Design lecture notes
CYBER-CRIMES AND SECURITY A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Model Code of Practice - Construction Work - 21102022 .pdf
Safety Seminar civil to be ensured for safe working.
Embodied AI: Ushering in the Next Era of Intelligent Systems
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPT on Performance Review to get promotions
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks

error detection and Error control detection .ppt

  • 2. Error Detection • Data can be corrupted during transmission. • For reliable communication, errors must be detection and correction. • Using some error correct detection and correction algorithm, the receiver reconstructs the message
  • 3. Error Detection Techniques • Common technique for detecting transmission error • CRC (Cyclic Redundancy Check) • Two Dimensional Parity • Checksum
  • 4. Error Detection • Extra bits are redundant • They add no new information to the message • Derived from the original message using some algorithm • Both the sender and receiver know the algorithm
  • 5. Two-Dimensional Parity • Two-dimensional parity is exactly what the name suggests • It is based on “simple” (one-dimensional) parity, which usually involves adding one extra bit to a 7-bit code to balance the number of 1s in the byte. For example, • Odd parity sets the eighth bit to 1 if needed to give an odd number of 1s in the byte, and • Even parity sets the eighth bit to 1 if needed to give an even number of 1s in the byte
  • 6. Two-Dimensional Parity • Two-dimensional parity does a similar calculation for each bit position across each of the bytes contained in the frame • This results in an extra parity byte for the entire frame, in addition to a parity bit for each byte • Two-dimensional parity catches all 1-, 2-, and 3-bit errors.
  • 8. Checksum • Add up all the words that are transmitted and then transmit the result of that sum • The result is called the checksum • The receiver performs the same calculation on the received data and compares the result with the received checksum • If any transmitted data, including the checksum itself, is corrupted, then the results will not match, so the receiver knows that an error occurred
  • 9. Cyclic Redundancy Check (CRC) • Reduce the number of extra bits and maximize protection • Given a bit string 110001 we can associate a polynomial on a single variable x for it. 1.x5 +1.x4 +0.x3 +0.x2 +0.x1 +1.x0 = x5 +x4 +1 and the degree is 5. A k-bit frame has a maximum degree of k-1 • Let M(x) be a message polynomial and C(x) be a generator polynomial