SlideShare a Scribd company logo
Error Detection and
Correction
PRESENTED BY: ABDUL RAZAQUE
abdulrazaque15tc@gmail.com
Table of content
Introduction
Types of Errors
Detection vs correction
Error detection scheme
Error correction
Hamming distance
Linear block codes
Cyclic codes
Polynomials
Checksum
CRC
One’s Complement
References
Introduction
• Network must be able to transfer data from one device to another
with acceptable accuracy, so the system must guarantee the
transmitted data should be identical to received data.
• The data can be corrupted when transmitted from one hope to next
which can be detected by some applications.
• Data can be corrupted during transmission there are few
application that require to be error detected and corrected.
Types of Errors
• Whenever data is transmitted that subject to be unpredictable that causes
change in shape of signals, here we have discussed two types of errors
i. Single error: in single error only one bit of given data unit is changed
which either be from 0 to 1 or from 1 to 0
ii. Burst error: it means there are more than 2 data unit changed from 1 to 0
or 0 to 1
Single bit error
0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0
Burst error of length 8
0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1
0 0 1 0 1 0 1 0 1 1 1 0 0 0 0 1
Corrupted bits
Corrupted bits
• Burst error: the duration of noise is
normally longer than the duration of
1 bit which means that noise affects
data.
• The number of bits affected depends
on the data rate and duration for
noise.
Single bit error: single bit errors are
least likely type or error because their
duration or noise is normally longer
than duration of 1 bit.
Single type of errors are the least likely
type of error in serial data
transmission.
Detection Vs Correction
o The correction of errors is more difficult than the detection.
o In error detection we only see if any error is occurred. The answer will be yes/no.
o In error correction, we need to know the exact number corrupted bits with their
location in the message.
o For single error we need 8-bit data unit whereas for 2 errors we need to consider
28 possibilities, so for a long size messages it is difficult to find more than 10
errors in a data unit of 1000 bits.
Error detection scheme
• Some popular techniques of error detection are:
1. Simple parity check
2. Two dimensional parity check
3. Checksum
4. Cyclic redundancy check
Simple parity check
• It is the simplest technique for detecting
and correcting errors.
• The parity of 8-bits transmitted word can
be either even parity or odd parity
• Even parity: it means that the number of
1’s should be even (2,4,6).
• Odd parity: it means that the number of
1’s should be odd (1.3.5).
Two dimensional parity check
• In simple parity check bits are
calculated for each row. Parity
check bits are also calculated for
al columns, then both are sent
along with data.
• At the receiving end these are
compared with the parity bits
calculated on the received data.
Checksum
• For error detection by checksum data is divided into fixed size frames or
segments
• Sender’s End: The sender adds the segment using 1’s complement arithmetic to
get the sum. Then the sum is also complemented to get the checksum and send
it along with data frames.
• Receiver’s End: at the receiver side perform same as sender add the incoming
segments using 1’s complement to get the sum and then complements it.
• After this if result is zero the received frames are accepted, otherwise they are
discarded
Example
Cyclic redundancy check
• It is method of detecting errors in the
communication channel
• This is the most widely used in real life
applications.
• It can detect all odd errors, CRC uses
generator polynomial which is available
in both sender and receiver side
• An example generator polynomial is of
the form like x3 + x + 1. This generator
polynomial represents key 1011
Error Correction
• As already discussed that error detection is more difficult than error
detection, it involves the sufficient redundant data to the information being
sent to enable the receiver to both detect and correct errors.
• Error-correction codes can be divided into block codes and convolution
codes. Block codes work on blocks of data of a fixed-size (e.g. packets).
Convolutional codes work for bit streams of arbitrary length. They tend to
be more complex and more difficult to implement than block codes,
• Block codes are calculated for each individual frame or packet
independently of one-another, whereas convolutional codes encode the
entire data stream for a message as one long code word, and then transmit
the message in segments.
Hamming distance
• The hamming distance between two words (of the same size) is the number of
differences between the corresponding bits.
• It can be easily found if we apply XOR operation on the two words and count the
number of Is in the result.
• Minimum Hamming Distance:
• it is the smallest hamming distance between all possible pairs in a set of words.
Example
• Let us find the Hamming distance between two pairs of words.
1. The Hamming distance d(OOO, 011)
• The hamming distance is 2
•
2. The Hamming distance d(10101, 11110)
• The hamming distance is 3
000
011
011
10101
11110
01011
Minimum Hamming distance
• Example 10.6
Find the minimum Hamming distance of the coding scheme
Solution
We first find all the Hamming distances.
• We apply XOR GATE
d(00000, 01011) = 3 d(00000, 10101) =3
d(0l011, 11110) = 3 d(00000, 11110) = 4
d(10101, 11110) =3 d(01011, 10101) =4
The dmin in this case is 3
• To guarantee the detection of
up to s errors in all cases the
minimum hamming distance
in a block code must be
dmin= s+1.
• To guarantee the correction
of up to t errors in all cases,
the minimum hamming
distance in a block code
dmin = 2t+1.
• A code scheme has a Hamming distance dmin = 4. What is
the error detection and correction capability of this scheme?
Sol. For the detection of errors:
dmin= s+1
4=s+1
S=3, so it detect upto three errors
For the correction of errors
dmin = 2t+1
4=2t+1
t=1, it can correct upto one errors
Linear block codes
• In the linear block codes, the parity bits and message bits have a linear
combination, which means that the resultant code word is the linear combination
of any two code words
• CYCLIC CODES: Cyclic codes are used for error correction. They are mainly
used to correct double errors and burst errors.
• The cyclic property of code words is that any cyclic-shift of a code word is also a
code word. Cyclic codes follow this cyclic property.
References
• Digital communication and networking by behroz frouzan 4th edition.
• Data and computer communications by William stalling 4th edition

More Related Content

What's hot

Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memory
Deepak John
 
Cache memory
Cache memoryCache memory
Cache memoryAnuj Modi
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)   Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)
Tasif Tanzim
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
United International University
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Fixed point and floating-point numbers
Fixed point and  floating-point numbersFixed point and  floating-point numbers
Fixed point and floating-point numbers
MOHAN MOHAN
 
Subroutine
SubroutineSubroutine
Loop optimization
Loop optimizationLoop optimization
Loop optimization
Vivek Gandhi
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
Kuppusamy P
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formats
Mazin Alwaaly
 
Instruction pipeline: Computer Architecture
Instruction pipeline: Computer ArchitectureInstruction pipeline: Computer Architecture
Instruction pipeline: Computer Architecture
InteX Research Lab
 
Computer architecture register transfer languages rtl
Computer architecture register transfer languages rtlComputer architecture register transfer languages rtl
Computer architecture register transfer languages rtl
Mazin Alwaaly
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controllerTech_MX
 

What's hot (20)

Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memory
 
Cache memory
Cache memoryCache memory
Cache memory
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)   Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Fixed point and floating-point numbers
Fixed point and  floating-point numbersFixed point and  floating-point numbers
Fixed point and floating-point numbers
 
Subroutine
SubroutineSubroutine
Subroutine
 
Loop optimization
Loop optimizationLoop optimization
Loop optimization
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formats
 
Instruction pipeline: Computer Architecture
Instruction pipeline: Computer ArchitectureInstruction pipeline: Computer Architecture
Instruction pipeline: Computer Architecture
 
Computer architecture register transfer languages rtl
Computer architecture register transfer languages rtlComputer architecture register transfer languages rtl
Computer architecture register transfer languages rtl
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 

Similar to Error detection and correction

CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
Mortadha96
 
New error-detection
New error-detectionNew error-detection
New error-detectionNitesh Singh
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)Nitesh Singh
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
anandhakrishnankv
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
Annymus
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
MahabubAlam97
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
Balasubramanian699229
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
DrPreethiD1
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
DrDeepakBhatia
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
skysunilyadav
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
Tanzila Islam
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 

Similar to Error detection and correction (20)

CODING.ppt
CODING.pptCODING.ppt
CODING.ppt
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
 
3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
computer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.pptcomputer Networks Error Detection and Correction.ppt
computer Networks Error Detection and Correction.ppt
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
 
Error Correction of Burst error
Error Correction of Burst errorError Correction of Burst error
Error Correction of Burst error
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 

More from Abdul Razaq

FINAL EXAM.pptx
FINAL EXAM.pptxFINAL EXAM.pptx
FINAL EXAM.pptx
Abdul Razaq
 
National anthem of pakistan mcqs
National anthem of pakistan mcqs National anthem of pakistan mcqs
National anthem of pakistan mcqs
Abdul Razaq
 
Applications of information theory in communication engineering
Applications of information theory in communication engineeringApplications of information theory in communication engineering
Applications of information theory in communication engineering
Abdul Razaq
 
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORKTHE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
Abdul Razaq
 
Pulse code modulation and Demodulation
Pulse code modulation and DemodulationPulse code modulation and Demodulation
Pulse code modulation and Demodulation
Abdul Razaq
 
Introduction to Telecommunication
Introduction to TelecommunicationIntroduction to Telecommunication
Introduction to Telecommunication
Abdul Razaq
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
Abdul Razaq
 
PEMRA REGULATION
PEMRA REGULATIONPEMRA REGULATION
PEMRA REGULATION
Abdul Razaq
 

More from Abdul Razaq (8)

FINAL EXAM.pptx
FINAL EXAM.pptxFINAL EXAM.pptx
FINAL EXAM.pptx
 
National anthem of pakistan mcqs
National anthem of pakistan mcqs National anthem of pakistan mcqs
National anthem of pakistan mcqs
 
Applications of information theory in communication engineering
Applications of information theory in communication engineeringApplications of information theory in communication engineering
Applications of information theory in communication engineering
 
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORKTHE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
THE IMPACT OF DIGITAL COMMUNICATION ON SOCIAL NETWORK
 
Pulse code modulation and Demodulation
Pulse code modulation and DemodulationPulse code modulation and Demodulation
Pulse code modulation and Demodulation
 
Introduction to Telecommunication
Introduction to TelecommunicationIntroduction to Telecommunication
Introduction to Telecommunication
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
PEMRA REGULATION
PEMRA REGULATIONPEMRA REGULATION
PEMRA REGULATION
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

Error detection and correction

  • 1. Error Detection and Correction PRESENTED BY: ABDUL RAZAQUE abdulrazaque15tc@gmail.com
  • 2. Table of content Introduction Types of Errors Detection vs correction Error detection scheme Error correction Hamming distance Linear block codes Cyclic codes Polynomials Checksum CRC One’s Complement References
  • 3. Introduction • Network must be able to transfer data from one device to another with acceptable accuracy, so the system must guarantee the transmitted data should be identical to received data. • The data can be corrupted when transmitted from one hope to next which can be detected by some applications. • Data can be corrupted during transmission there are few application that require to be error detected and corrected.
  • 4. Types of Errors • Whenever data is transmitted that subject to be unpredictable that causes change in shape of signals, here we have discussed two types of errors i. Single error: in single error only one bit of given data unit is changed which either be from 0 to 1 or from 1 to 0 ii. Burst error: it means there are more than 2 data unit changed from 1 to 0 or 0 to 1
  • 5. Single bit error 0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 Burst error of length 8 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 0 1 0 1 0 1 0 1 1 1 0 0 0 0 1 Corrupted bits Corrupted bits
  • 6. • Burst error: the duration of noise is normally longer than the duration of 1 bit which means that noise affects data. • The number of bits affected depends on the data rate and duration for noise. Single bit error: single bit errors are least likely type or error because their duration or noise is normally longer than duration of 1 bit. Single type of errors are the least likely type of error in serial data transmission.
  • 7. Detection Vs Correction o The correction of errors is more difficult than the detection. o In error detection we only see if any error is occurred. The answer will be yes/no. o In error correction, we need to know the exact number corrupted bits with their location in the message. o For single error we need 8-bit data unit whereas for 2 errors we need to consider 28 possibilities, so for a long size messages it is difficult to find more than 10 errors in a data unit of 1000 bits.
  • 8. Error detection scheme • Some popular techniques of error detection are: 1. Simple parity check 2. Two dimensional parity check 3. Checksum 4. Cyclic redundancy check
  • 9. Simple parity check • It is the simplest technique for detecting and correcting errors. • The parity of 8-bits transmitted word can be either even parity or odd parity • Even parity: it means that the number of 1’s should be even (2,4,6). • Odd parity: it means that the number of 1’s should be odd (1.3.5).
  • 10. Two dimensional parity check • In simple parity check bits are calculated for each row. Parity check bits are also calculated for al columns, then both are sent along with data. • At the receiving end these are compared with the parity bits calculated on the received data.
  • 11. Checksum • For error detection by checksum data is divided into fixed size frames or segments • Sender’s End: The sender adds the segment using 1’s complement arithmetic to get the sum. Then the sum is also complemented to get the checksum and send it along with data frames. • Receiver’s End: at the receiver side perform same as sender add the incoming segments using 1’s complement to get the sum and then complements it. • After this if result is zero the received frames are accepted, otherwise they are discarded
  • 13. Cyclic redundancy check • It is method of detecting errors in the communication channel • This is the most widely used in real life applications. • It can detect all odd errors, CRC uses generator polynomial which is available in both sender and receiver side • An example generator polynomial is of the form like x3 + x + 1. This generator polynomial represents key 1011
  • 14. Error Correction • As already discussed that error detection is more difficult than error detection, it involves the sufficient redundant data to the information being sent to enable the receiver to both detect and correct errors. • Error-correction codes can be divided into block codes and convolution codes. Block codes work on blocks of data of a fixed-size (e.g. packets). Convolutional codes work for bit streams of arbitrary length. They tend to be more complex and more difficult to implement than block codes, • Block codes are calculated for each individual frame or packet independently of one-another, whereas convolutional codes encode the entire data stream for a message as one long code word, and then transmit the message in segments.
  • 15. Hamming distance • The hamming distance between two words (of the same size) is the number of differences between the corresponding bits. • It can be easily found if we apply XOR operation on the two words and count the number of Is in the result. • Minimum Hamming Distance: • it is the smallest hamming distance between all possible pairs in a set of words.
  • 16. Example • Let us find the Hamming distance between two pairs of words. 1. The Hamming distance d(OOO, 011) • The hamming distance is 2 • 2. The Hamming distance d(10101, 11110) • The hamming distance is 3 000 011 011 10101 11110 01011
  • 17. Minimum Hamming distance • Example 10.6 Find the minimum Hamming distance of the coding scheme Solution We first find all the Hamming distances. • We apply XOR GATE d(00000, 01011) = 3 d(00000, 10101) =3 d(0l011, 11110) = 3 d(00000, 11110) = 4 d(10101, 11110) =3 d(01011, 10101) =4 The dmin in this case is 3
  • 18. • To guarantee the detection of up to s errors in all cases the minimum hamming distance in a block code must be dmin= s+1. • To guarantee the correction of up to t errors in all cases, the minimum hamming distance in a block code dmin = 2t+1. • A code scheme has a Hamming distance dmin = 4. What is the error detection and correction capability of this scheme? Sol. For the detection of errors: dmin= s+1 4=s+1 S=3, so it detect upto three errors For the correction of errors dmin = 2t+1 4=2t+1 t=1, it can correct upto one errors
  • 19. Linear block codes • In the linear block codes, the parity bits and message bits have a linear combination, which means that the resultant code word is the linear combination of any two code words • CYCLIC CODES: Cyclic codes are used for error correction. They are mainly used to correct double errors and burst errors. • The cyclic property of code words is that any cyclic-shift of a code word is also a code word. Cyclic codes follow this cyclic property.
  • 20. References • Digital communication and networking by behroz frouzan 4th edition. • Data and computer communications by William stalling 4th edition