Download presentation

Presentation is loading. Please wait.

Published byCiera Mencer Modified over 2 years ago

1
Error Detection and Correction Parity Schemes: Modulo 2 addition (XOR) Word parity Block Parity

2
CRC Error Correction CRC error correction schemes are mechanized using the binary symbol alphabet {0,1} and modulo 2 arithmetic. However the math behind it is applicable with any symbol alphabet and any legitimate algebra. We will explore the method using normal, decimal arithmetic. Consider a message: [m N-1,m N-2, m 1,m 0 ] where the m i are symbols selected from the symbol alphabet M = {0,1,2,3,..,8,9}. The number of symbols in the alphabet is x = 10, each symbol carries 3.32 bits of information. If we were to see the actual digits written out, we would intuitively associate a value with the message, represented by the polynomial: M(x) = m N-1 x N-1 + m N-2 x N-2 +.. + m 1 x 1 + m 0 x 0 We are going to append two check digits to the message, [c 1,c 0 ]. The polynomial representing the check digits is of order C = 2: C(x) = c 1 x 1 + c 0 x 0

3
The Message digits must be shifted to the left to make room for the check digits, do the final data word will be represented by the polynomial: D(x) = x c M(x) + C(x) =M’(x) + C(x) Here’s the trick. We want to pick C(x) such that D(x) represents a number which is evenly divisible by some other number, G, called the generator, represented by the “generator polynomial” G(x). Stated mathematically: Where R 0 (x) =0 is the remainder polynomial after division. Consider for a moment performing the division with the check digits set to zero: Where R 1 (x) is the remainder polynomial after division. If we set C(x) = G(x) – R 1 (x), then we can write...

4
And we have zero remainder, as desired. When the message is received at the destination, it is divided by the generator, and if the remainder is zero, we may be certain that a single digit error did not occur. If the generator is judiciously chosen, when an error occurs, the remainder will uniquely identify which digit was corrupted. Consideration of the number of check digits There must be a unique remainder for every possible error that can occur. In a binary code (x = 2), there is one possible error for each digit in D(x). Since the remainder must be less than G, it is clear that G > N + C. Since the order of G must be equal to the order of C(x) i.e. C, the maximum value for G is x C -1. Thus or,

5
Example We’ll consider an example using decimal arithmetic. We will construct a message of 5 digits. For simplicity, we will consider the only possible transmission errors to consist of increasing or decreasing each digit by one, so two possible errors per digit in the message (including check digits), so G > 2(N+C), and G < 10 C. Thus, for this scheme: or, So C = 2 digits will work, and G > 14. Lets try G = 17 (prime numbers usually work well). We need to verify that each possible error creates a unique remainder, so lets pick a typical message, determine the check digits, introduce each possible error, and see if we get a unique remainder. If we don’t, we have to try another generator.

6
Verification The remainders for each possible error are: These are all unique, so we gave a good generator. The sorted remainders, and their corresponding corrections are:

7
+ 1 0 0 1 0 11 0 1 1 0 1 0 1 0 1 1 0 1 0 0 1 0 1 0 0 0 0 0 0 10 0 1 0 0 0 0 1 0 1 1 0 10 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 0 0 0 1 1 0 0 0 0 0 ++ x 000010111x00010001001xx10010011x0xx00100101xxxx011000x0xxxx100110xxxxxx0011101010011 1 0 0 0 0 1 0 1 1 0 0 1 0 0 0 1 1 0 1 0 0 0 1 1 0 0 1 1 0 0 0x101xxxxxx0 Modulo 2 Division

8
+ + 00000 1101001 11001 x 01101 1x0xxxx 1101001010 Initial StateAfter 5 Shifts Final State xxxxxxx xxxxx Manipulate the Structure: + + 01010 Data Flip Again ++ 0 Data Flip Over 0 11 0 1 0 0 1 0 (1)

9
Notes on Generator Choice Generator must have one more digit than Check Digits. Generator must be of the form: 1 X X … X 1

Similar presentations

Presentation is loading. Please wait....

OK

EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao

EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao

© 2018 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on pivot table in excel 2007 Ppt on hydroelectric power generation Ppt on northern rivers of india Ppt on holographic technology major Download ppt on graphical user interface Download ppt on school management system Ppt on missing numbers for kindergarten Ppt on pre ignition knock Download ppt on civil disobedience movement Ppt on marketing management by philip kotler marketing