SlideShare a Scribd company logo
1 of 32
ERROR
CORRECTION
    &
  ERROR
DETECTION
    Rutvi Shah   1
   Data can be corrupted during
    transmission. For reliable communication,
    errors must be detected and corrected.

   Error detection and correction are
    implemented either at data link layer or
    the transport layer of the OSI model.



                      Rutvi Shah                2
TYPES OF ERRORS
   Single bit error :-
    - Only one bit in the data unit has
    changed.

   Burst error :-
    - It means that two or more bits in the
       data unit has changed.

                     Rutvi Shah               3
Single bit Error
                  0 changed to 1



0 0 0 0 1 0 1 0                   0 0 0 0 0 0 1 0
   Received                               Sent

               Burst Error
  Sent


 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
                         Bits corrupted by Burst Error


 0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1
 Received
                     Rutvi Shah                          4
ERROR DETECTION
   Error detecting code is to include only
    enough redundancy to allow the receiver
    to deduce that an error occurred, but not
    which error, and have it request a re-
    transmission.

   Error detection uses the concept of
    redundancy, which means adding extra
    bits for detecting error at the destination.

                       Rutvi Shah                  5
Redundancy
   Instead of repeating the entire data
    stream, a shorter group of bits may be
    appended to the end of each unit. This
    technique is called Redundancy because
    the extra bit are redundant to the
    information. They are discarded as soon
    as the accuracy of the transmission has
    been determined.


                     Rutvi Shah               6
Rutvi Shah   7
   There are basically four types of
    redundancy checks. They are:

    1.   VRC (Vertical Redundancy Check).
    2.   LRC (Longitudinal Redundancy Check).
    3.   CRC (Cyclical Redundancy Check).




                       Rutvi Shah               8
ERROR DETECTION

   VERTICAL REDUNDUNCY CHECK

   LONGITUDINAL REDUNDANCY CHECK

   CYCLIC REDUNDANCY CHECK


                 Rutvi Shah         9
VERTICAL
 REDUNDANCY CHECK
It is also known as parity check
It is least expensive mechanism for error
detection
In this technique,the redundant bit called
parity bit is appended to every data unit
so that the total number of 1s in the unit
becomes even (including parity bit)


                 Rutvi Shah              10
VERTICAL
  REDUNDANCY CHECK

                                    1100001       Data
Checking function

                    1100001 | 1   Even – parity
 Is total number                    generator
   of 1s even ?

    Receiver                           1      VRC

                                    Sender
                    Rutvi Shah                      11
VERTICAL REDUNDANCY
              CHECK
   Example :

     1110110       1101111           1110010

     - After adding the parity bit

     11101101      11011110          11100100



                        Rutvi Shah              12
VERTICAL REDUNDANCY
              CHECK

   VRC can detect all single – bit errors
   It can detect burst errors if the total
    number of errors in each data unit is odd.
   VRC can not detect errors where the total
    number of bits changed is even.


                      Rutvi Shah             13
LONGITUDINAL REDUNDANCY CHECK(LRC)

In this method , a block of bits is
  organized in table(rows and columns)
  calculate the parity bit for each column
  and the set of this parity bit is also
  sending with original data.
  From the block of parity we can check
  the redundancy.



                   Rutvi Shah                14
LRC Example

11100111 11011101 00111001 10101001

                                           11100111
                                           11011101
                                           00111001
                                           10101001

                           LRC             10101010

        11100111 1101101 00111001 10101001 10101010


                  Original data plus
                  LRC
                         Rutvi Shah                   15
LRC Example

Suppose the following block is sent :
      10101001 00111001 11011101 11100111 10101010
                                                 (LRC)
However,it is hit by burst of length eight and some bits
  are corrupted (Yellow bits are changed) :
      10100011 10001001 11011101 11100111 10101010
                                                 (LRC)
When the receiver checks the LRC,some of the bits are
  not
 follow even parity rule and whole block is discarded
  (the non matching bits are shown in red ) :
      10100011 10001001 11011101 11100111 10101010
                        Rutvi Shah                   16
Advantage :
-> LRC of n bits can easily detect burst
   error of n bits.

  Disadvantage :
-> If two bits in one data units are damaged
  and two bits in exactly same position in
  another data unit are also damaged , the LRC
  checker will not detect the error.



                      Rutvi Shah                 17
CYCLIC REDUNDANCY CHECK
                 (CRC)
   In this method , a sequence of redundant bits ,
    called the CRC or the CRC remainder, is appended to the end of
    the unit so that the resulting data unit become exactly divisible
    by a second, predetermined binary number. At its destination ,
    the incoming data unit is divided by the same number. If at this
    step there is no remainder ,the data unit assume to be correct
    and is accepted, otherwise it indicate that data unit has been
    damaged in transmission and therefore must be rejected.

    The redundancy bits is used by CRC are derived by dividing the
    data unit by a predetermined divisor. The remainder is the
    CRC.                      Rutvi Shah                     18
   CRC generator and checker


DATA          CRC                   DATA      00…0
                                            N bits

  DIVISOR           DATA      CRC    DIVIS0R
                                              N+1 bits

REMAINDER                             CRC
Zero accept                                N bits
Nonzero reject
Receiver                             Sender
                      Rutvi Shah                    19
Divisor

  The divisor is determined according to the
 algebraic polynomial.
 for e.g.
       A polynomial is

      X^7 + x^5 + x^2            + x +1
     generation of divisor from polynomial

            X^7 + X^5 + X^2 + X + 1
                 X^6       X^4 X^3

             1    0    1    0     0     1   1   1
                           Rutvi Shah               20
A polynomial should be selected
   according to the following rule:-
3. It should not be divisible by x.

4. It should be divisible by x+1.




                  Rutvi Shah           21
    Example :-
   The CRC generator at sender end :
            111101
      1101 100100 0 0 0
           1101
            1000
            1101
              1010
              1101
               1110
               1101
                0110
                0000
                 1100
                 1101
                Rutvi0 0 1
                     Shah               22
The CRC checker at receiver end :
           111101
     1101 100100 0 0 1
          1101
           1000
           1101
             1010
             1101
              1110
              1101
               0110
               0000
                1101
                1101
                   000
               Rutvi Shah           23
ERROR CORRECTION
   Error correcting code is to include enough
    redundant information along with each block of
    data sent to enable the receiver to deduce what
    the transmitted character must have been.

   Error Correction must be handled in two ways :
    - When an error is discovered, the receiver
        can have the sender retransmit the entire
        data unit.
    - Receiver can use an error correcting code,
        which automatically corrects certain errors.
                        Rutvi Shah                     24
   There are two types of Error Correcting
    techniques :

    1. Single bit error correction.
    2. Burst error correction.

   Error Correction can be done with the help
    of HAMMING CODE.

                       Rutvi Shah             25
HAMMING CODE
   It is a technique developed by
    R.W.Hamming.
   Hamming code can be applied to data
    units of any length and uses the
    relationship between data and redundancy
    bits. For eg.



                    Rutvi Shah             26
   A 7 bit ASCII code requires 4 Redundancy
    bits that can be added to the end of the
    data unit or interspersed with the original
    data bits.

   These bits are placed in positions 1,2,4
    and 8. We refer to these bits as r1,r2,r4
    and r8.



                      Rutvi Shah                27
Positions of Redundancy Bits in Hamming Code



11   10   9     8    7     6          5   4   3   2   1


d    d    d     r    d     d          d   r   d   r   r


                    Redundancy Bits




                         Rutvi Shah                       28
   In the Hamming code, each r bit is the VRC bit
    for one combination of data bits :
    - r1 is the one combination of data bits.
    - r2 is another combination of data bits.
    and so on.

   The combination used to calculate each of the
    four values for a 7 bit data sequence are as
    follows :
    - r1 : bits 1,3,5,7,9,11.
    - r2 : bits 2,3,6,7,10,11.
    - r4 : bits 4,5,6,7.
    - r8 : bits 8,9,10,11.
                        Rutvi Shah                   29
Data : 1 0 0 1 1 0 1

  Data       1 0 0               1 1 0              1

Adding r1    1 0 0               1 1 0              1         1


Adding r2    1 0 0               1 1 0              1 0 1


Adding r4    1 0 0               1 1 0 0 1                0 1


 Adding r8   1 0 0 1 1 1 0 0 1 0 1
             11   10   9    8    7    6    5    4   3     2   1

                              Rutvi Shah                          30
                           Code : 1 0 0 1 1 1 0 0 1 0 1
1   0   0   1   1    1      0   0   1   0   1   Sent

                    Error

1   0   0   1   0    1      0   0   1   0   1   Received




                    Rutvi Shah                             31
1 0 0 1 0 1 0 0 1 0 1
11   10   9   8   7      6     5      4     3       2   1




1 0 0 1 0 1 0 0 1 0 1
11   10   9   8   7       6    5       4        3   2   1



1 0 0 1 0 1 0 0 1 0 1
11   10   9   8   7       6    5       4        3   2   1



1 0 0 1 0 1 0 0 1 0 1
11   10   9   8   7       6    5       4        3   2   1


                      The bit in position 7 is in error     0   1   1        1
                                   Rutvi Shah                           32

More Related Content

What's hot

What's hot (20)

Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
HDLC
HDLCHDLC
HDLC
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ethernet
EthernetEthernet
Ethernet
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Error control
Error controlError control
Error control
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 

Viewers also liked

Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and CorrectionTechiNerd
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication SystemIshan Sharma
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibraribrar562
 
Error identification (sparknotes p)
Error identification (sparknotes p)Error identification (sparknotes p)
Error identification (sparknotes p)Haider Shishmahal
 
Error identification exercise (5 a1)
Error identification exercise (5 a1)Error identification exercise (5 a1)
Error identification exercise (5 a1)Anna Asri
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerAbdullaziz Tagawy
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N CorrectionAnkan Adhikari
 
Virginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsVirginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsDr Vivek Kumar
 

Viewers also liked (14)

Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication System
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Error identification (sparknotes p)
Error identification (sparknotes p)Error identification (sparknotes p)
Error identification (sparknotes p)
 
Error identification exercise (5 a1)
Error identification exercise (5 a1)Error identification exercise (5 a1)
Error identification exercise (5 a1)
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Virginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsVirginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspects
 

Similar to Error Detection And Correction

Similar to Error Detection And Correction (20)

Error.pdf
Error.pdfError.pdf
Error.pdf
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
computer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdfcomputer networks Error Detection Methods.pdf
computer networks Error Detection Methods.pdf
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
Ch 10
Ch 10Ch 10
Ch 10
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Error control 20
Error control 20Error control 20
Error control 20
 
network
networknetwork
network
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 

Error Detection And Correction

  • 1. ERROR CORRECTION & ERROR DETECTION Rutvi Shah 1
  • 2. Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.  Error detection and correction are implemented either at data link layer or the transport layer of the OSI model. Rutvi Shah 2
  • 3. TYPES OF ERRORS  Single bit error :- - Only one bit in the data unit has changed.  Burst error :- - It means that two or more bits in the data unit has changed. Rutvi Shah 3
  • 4. Single bit Error 0 changed to 1 0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 0 Received Sent Burst Error Sent 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 Bits corrupted by Burst Error 0 1 0 1 1 1 0 1 0 1 0 0 0 0 1 1 Received Rutvi Shah 4
  • 5. ERROR DETECTION  Error detecting code is to include only enough redundancy to allow the receiver to deduce that an error occurred, but not which error, and have it request a re- transmission.  Error detection uses the concept of redundancy, which means adding extra bits for detecting error at the destination. Rutvi Shah 5
  • 6. Redundancy  Instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called Redundancy because the extra bit are redundant to the information. They are discarded as soon as the accuracy of the transmission has been determined. Rutvi Shah 6
  • 8. There are basically four types of redundancy checks. They are: 1. VRC (Vertical Redundancy Check). 2. LRC (Longitudinal Redundancy Check). 3. CRC (Cyclical Redundancy Check). Rutvi Shah 8
  • 9. ERROR DETECTION  VERTICAL REDUNDUNCY CHECK  LONGITUDINAL REDUNDANCY CHECK  CYCLIC REDUNDANCY CHECK Rutvi Shah 9
  • 10. VERTICAL REDUNDANCY CHECK It is also known as parity check It is least expensive mechanism for error detection In this technique,the redundant bit called parity bit is appended to every data unit so that the total number of 1s in the unit becomes even (including parity bit) Rutvi Shah 10
  • 11. VERTICAL REDUNDANCY CHECK 1100001 Data Checking function 1100001 | 1 Even – parity Is total number generator of 1s even ? Receiver 1 VRC Sender Rutvi Shah 11
  • 12. VERTICAL REDUNDANCY CHECK  Example : 1110110 1101111 1110010 - After adding the parity bit 11101101 11011110 11100100 Rutvi Shah 12
  • 13. VERTICAL REDUNDANCY CHECK  VRC can detect all single – bit errors  It can detect burst errors if the total number of errors in each data unit is odd.  VRC can not detect errors where the total number of bits changed is even. Rutvi Shah 13
  • 14. LONGITUDINAL REDUNDANCY CHECK(LRC) In this method , a block of bits is organized in table(rows and columns) calculate the parity bit for each column and the set of this parity bit is also sending with original data. From the block of parity we can check the redundancy. Rutvi Shah 14
  • 15. LRC Example 11100111 11011101 00111001 10101001 11100111 11011101 00111001 10101001 LRC 10101010 11100111 1101101 00111001 10101001 10101010 Original data plus LRC Rutvi Shah 15
  • 16. LRC Example Suppose the following block is sent : 10101001 00111001 11011101 11100111 10101010 (LRC) However,it is hit by burst of length eight and some bits are corrupted (Yellow bits are changed) : 10100011 10001001 11011101 11100111 10101010 (LRC) When the receiver checks the LRC,some of the bits are not follow even parity rule and whole block is discarded (the non matching bits are shown in red ) : 10100011 10001001 11011101 11100111 10101010 Rutvi Shah 16
  • 17. Advantage : -> LRC of n bits can easily detect burst error of n bits. Disadvantage : -> If two bits in one data units are damaged and two bits in exactly same position in another data unit are also damaged , the LRC checker will not detect the error. Rutvi Shah 17
  • 18. CYCLIC REDUNDANCY CHECK (CRC)  In this method , a sequence of redundant bits , called the CRC or the CRC remainder, is appended to the end of the unit so that the resulting data unit become exactly divisible by a second, predetermined binary number. At its destination , the incoming data unit is divided by the same number. If at this step there is no remainder ,the data unit assume to be correct and is accepted, otherwise it indicate that data unit has been damaged in transmission and therefore must be rejected. The redundancy bits is used by CRC are derived by dividing the data unit by a predetermined divisor. The remainder is the CRC. Rutvi Shah 18
  • 19. CRC generator and checker DATA CRC DATA 00…0 N bits DIVISOR DATA CRC DIVIS0R N+1 bits REMAINDER CRC Zero accept N bits Nonzero reject Receiver Sender Rutvi Shah 19
  • 20. Divisor The divisor is determined according to the algebraic polynomial. for e.g. A polynomial is X^7 + x^5 + x^2 + x +1 generation of divisor from polynomial X^7 + X^5 + X^2 + X + 1 X^6 X^4 X^3 1 0 1 0 0 1 1 1 Rutvi Shah 20
  • 21. A polynomial should be selected according to the following rule:- 3. It should not be divisible by x. 4. It should be divisible by x+1. Rutvi Shah 21
  • 22. Example :-  The CRC generator at sender end : 111101 1101 100100 0 0 0 1101 1000 1101 1010 1101 1110 1101 0110 0000 1100 1101 Rutvi0 0 1 Shah 22
  • 23. The CRC checker at receiver end : 111101 1101 100100 0 0 1 1101 1000 1101 1010 1101 1110 1101 0110 0000 1101 1101 000 Rutvi Shah 23
  • 24. ERROR CORRECTION  Error correcting code is to include enough redundant information along with each block of data sent to enable the receiver to deduce what the transmitted character must have been.  Error Correction must be handled in two ways : - When an error is discovered, the receiver can have the sender retransmit the entire data unit. - Receiver can use an error correcting code, which automatically corrects certain errors. Rutvi Shah 24
  • 25. There are two types of Error Correcting techniques : 1. Single bit error correction. 2. Burst error correction.  Error Correction can be done with the help of HAMMING CODE. Rutvi Shah 25
  • 26. HAMMING CODE  It is a technique developed by R.W.Hamming.  Hamming code can be applied to data units of any length and uses the relationship between data and redundancy bits. For eg. Rutvi Shah 26
  • 27. A 7 bit ASCII code requires 4 Redundancy bits that can be added to the end of the data unit or interspersed with the original data bits.  These bits are placed in positions 1,2,4 and 8. We refer to these bits as r1,r2,r4 and r8. Rutvi Shah 27
  • 28. Positions of Redundancy Bits in Hamming Code 11 10 9 8 7 6 5 4 3 2 1 d d d r d d d r d r r Redundancy Bits Rutvi Shah 28
  • 29. In the Hamming code, each r bit is the VRC bit for one combination of data bits : - r1 is the one combination of data bits. - r2 is another combination of data bits. and so on.  The combination used to calculate each of the four values for a 7 bit data sequence are as follows : - r1 : bits 1,3,5,7,9,11. - r2 : bits 2,3,6,7,10,11. - r4 : bits 4,5,6,7. - r8 : bits 8,9,10,11. Rutvi Shah 29
  • 30. Data : 1 0 0 1 1 0 1 Data 1 0 0 1 1 0 1 Adding r1 1 0 0 1 1 0 1 1 Adding r2 1 0 0 1 1 0 1 0 1 Adding r4 1 0 0 1 1 0 0 1 0 1 Adding r8 1 0 0 1 1 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 Rutvi Shah 30 Code : 1 0 0 1 1 1 0 0 1 0 1
  • 31. 1 0 0 1 1 1 0 0 1 0 1 Sent Error 1 0 0 1 0 1 0 0 1 0 1 Received Rutvi Shah 31
  • 32. 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 1 0 0 1 0 1 0 0 1 0 1 11 10 9 8 7 6 5 4 3 2 1 The bit in position 7 is in error 0 1 1 1 Rutvi Shah 32