SlideShare a Scribd company logo
6
Most read
8
Most read
9
Most read
MCWC
ERROR DETECTION
TECHNIQUES
Kunjan Shah
170 410 107 103
LY CE 2
Batch c
ERROR CONTROL AND DETECTION
• For reliable communication, errors must be detected and corrected.
• Data can be corrupted during transmission.
• Need to understand how errors is controlled and to know what type of errors may
occur.
• Error detection and correction are implemented either at the data link layer or the
transport layer of the OSI model.
TYPES OF ERRORS
1. Single bit: In a frame is only one bit, anywhere though which is corrupt.
2. Multiple bit: Frame is received with more than one bits in corrupted state.
TYPES OF ERRORS
3. Burst: Frame contains more than 1 bits corrupted.
ERROR DETECTION METHOD
 Error detection means to decide whether the received data is correct or not without having a
copy of the original message.
 Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
SIMPLE PARITY CHECK
• In this technique, a redundant bit called parity bit, is appended to every data unit so that the
number of 1s in the unit including the parity becomes even.
• Blocks of data from the source are subjected to a check bit or parity bit generator form,
where a parity of :
1 is added to the block if it contains odd number of 1’s, and
0 is added if it contains even number of 1’s
• This scheme makes the total number of 1’s even,
that is why it is called even parity checking.
TWO-DIMENSIONAL PARITY CHECK
• Parity check bits are calculated for each
row, which is equivalent to a simple
parity check bit.
• Parity check bits are also calculated for
all columns, then both are sent along
with the data.
• At the receiving end these are
compared with the parity bits calculated
on the received data.
CHECKSUM
 Here, the data is divided into k segments each
of m bits.
 In the sender’s end the segments are added
using 1’s complement arithmetic to get the
sum.
 The sum is complemented to get the
checksum.
 The checksum segment is sent along with the
data segments.
CHECKSUM
• At the receiver’s end, all received segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise discarded.
Performance
 The checksum detects all errors involving an odd number of bits.
 It also detects most errors involving even number of bits.
CYCLIC REDUNDANCY CHECKS (CRC)
 CRC is the most powerful and easy to implement technique.
 CRC is based on binary division.
 The divisor is generated using polynomials.
 It is commonly used to detect accidental changes to data transmitted via
telecommunications networks and storage devices.
CYCLIC REDUNDANCY CHECKS (CRC)
 The sender performs a division operation on the bits
being sent and calculates the remainder.
 Before sending the actual bits, the sender adds the
remainder at the end of the actual bits.
 Actual data bits plus the remainder is called a codeword.
The sender transmits data bits as codewords.
 At the other end, the receiver performs division
operation on codewords using the same CRC divisor.
 If the remainder contains all zeros the data bits are
accepted, otherwise it is considered as there some data
corruption occurred in transit.
CYCLIC REDUNDANCY CHECKS (CRC)
Error detection techniques

More Related Content

PPT
PPTX
Error Control In Network Layer
PPTX
computer network-unit 2
PPSX
Triggering transmission
PPTX
Ethernet communication with robot
PPTX
Cyclic Redundancy Check in Computers Network
PPTX
Parity check(Error Detecting Codes)
PPT
Lecture 21
Error Control In Network Layer
computer network-unit 2
Triggering transmission
Ethernet communication with robot
Cyclic Redundancy Check in Computers Network
Parity check(Error Detecting Codes)
Lecture 21

What's hot (12)

PDF
Error detection and correction
PPTX
Parity check, redundancy, and errors
PPTX
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
PPTX
Parity Generator and Parity Checker
PPTX
Error detection and correction
PPTX
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
PPTX
Parity bits
PPTX
Faxes Received
PPT
Error Detection And Correction
PPT
Even odd parity
PPTX
Slidecast - Workshop
PPT
Error correction error detection in digital communication
Error detection and correction
Parity check, redundancy, and errors
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Parity Generator and Parity Checker
Error detection and correction
Footprint: Detecting Sybil Attacks in Urban Vehicular Network
Parity bits
Faxes Received
Error Detection And Correction
Even odd parity
Slidecast - Workshop
Error correction error detection in digital communication
Ad

Similar to Error detection techniques (20)

PPTX
Error detection.
PPTX
M3 Error detection & correction in data communication.pptx
PPTX
Error Detection in Data link layer or Transport layer
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PDF
07 Data Link LayerError Control.pdf
PPT
Error correction and detection th
PPSX
Error control
PPTX
Error detection and Correction
PPTX
Error correction and Detection technique while sending the message
PPT
error detection and Error control detection .ppt
PPTX
Group Presentation - Cyclic Redundancy Checks.pptx
PPTX
DCN Error Detection & Correction
PPTX
Coding Scheme/ Information theory/ Error coding scheme
PDF
4 implementation of various error detection and correction techniques in c...
PPTX
III_UNIT_ErrorCorrecting.pptx
PPT
computer Networks Error Detection and Correction.ppt
PPT
Skr+3200+chapter+3+(kweh)
PPTX
Error detection and correction
PPTX
Lecture 4 errors detection
PDF
Computer Networking and Data Transmission.pdf
Error detection.
M3 Error detection & correction in data communication.pptx
Error Detection in Data link layer or Transport layer
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
07 Data Link LayerError Control.pdf
Error correction and detection th
Error control
Error detection and Correction
Error correction and Detection technique while sending the message
error detection and Error control detection .ppt
Group Presentation - Cyclic Redundancy Checks.pptx
DCN Error Detection & Correction
Coding Scheme/ Information theory/ Error coding scheme
4 implementation of various error detection and correction techniques in c...
III_UNIT_ErrorCorrecting.pptx
computer Networks Error Detection and Correction.ppt
Skr+3200+chapter+3+(kweh)
Error detection and correction
Lecture 4 errors detection
Computer Networking and Data Transmission.pdf
Ad

More from kunjan shah (6)

PPTX
Multidimensional schema of data warehouse
PPTX
Dynamic storage allocation techniques in Compiler design
PPT
season management in php (WT)
PPTX
Web browser and web servers (WT)
PPTX
Decision and looping examples with php (WT)
PPTX
Generic view of software engineering SE
Multidimensional schema of data warehouse
Dynamic storage allocation techniques in Compiler design
season management in php (WT)
Web browser and web servers (WT)
Decision and looping examples with php (WT)
Generic view of software engineering SE

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Construction Project Organization Group 2.pptx
PDF
PPT on Performance Review to get promotions
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
R24 SURVEYING LAB MANUAL for civil enggi
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Construction Project Organization Group 2.pptx
PPT on Performance Review to get promotions
OOP with Java - Java Introduction (Basics)
Foundation to blockchain - A guide to Blockchain Tech
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT 4 Total Quality Management .pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Automation-in-Manufacturing-Chapter-Introduction.pdf

Error detection techniques

  • 2. ERROR CONTROL AND DETECTION • For reliable communication, errors must be detected and corrected. • Data can be corrupted during transmission. • Need to understand how errors is controlled and to know what type of errors may occur. • Error detection and correction are implemented either at the data link layer or the transport layer of the OSI model.
  • 3. TYPES OF ERRORS 1. Single bit: In a frame is only one bit, anywhere though which is corrupt. 2. Multiple bit: Frame is received with more than one bits in corrupted state.
  • 4. TYPES OF ERRORS 3. Burst: Frame contains more than 1 bits corrupted.
  • 5. ERROR DETECTION METHOD  Error detection means to decide whether the received data is correct or not without having a copy of the original message.  Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.
  • 6. SIMPLE PARITY CHECK • In this technique, a redundant bit called parity bit, is appended to every data unit so that the number of 1s in the unit including the parity becomes even. • Blocks of data from the source are subjected to a check bit or parity bit generator form, where a parity of : 1 is added to the block if it contains odd number of 1’s, and 0 is added if it contains even number of 1’s • This scheme makes the total number of 1’s even, that is why it is called even parity checking.
  • 7. TWO-DIMENSIONAL PARITY CHECK • Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. • Parity check bits are also calculated for all columns, then both are sent along with the data. • At the receiving end these are compared with the parity bits calculated on the received data.
  • 8. CHECKSUM  Here, the data is divided into k segments each of m bits.  In the sender’s end the segments are added using 1’s complement arithmetic to get the sum.  The sum is complemented to get the checksum.  The checksum segment is sent along with the data segments.
  • 9. CHECKSUM • At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented. • If the result is zero, the received data is accepted; otherwise discarded. Performance  The checksum detects all errors involving an odd number of bits.  It also detects most errors involving even number of bits.
  • 10. CYCLIC REDUNDANCY CHECKS (CRC)  CRC is the most powerful and easy to implement technique.  CRC is based on binary division.  The divisor is generated using polynomials.  It is commonly used to detect accidental changes to data transmitted via telecommunications networks and storage devices.
  • 11. CYCLIC REDUNDANCY CHECKS (CRC)  The sender performs a division operation on the bits being sent and calculates the remainder.  Before sending the actual bits, the sender adds the remainder at the end of the actual bits.  Actual data bits plus the remainder is called a codeword. The sender transmits data bits as codewords.  At the other end, the receiver performs division operation on codewords using the same CRC divisor.  If the remainder contains all zeros the data bits are accepted, otherwise it is considered as there some data corruption occurred in transit.