Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Advertisements

Computer Interfacing and Protocols
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Chapter 6 Errors, Error Detection, and Error Control
Error Detection and Correction
Transmission Errors Error Detection and Correction
Error Detection and Correction
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Transmission Errors1 Error Detection and Correction.
The Data Link Layer Chapter 3. Position of the data-link layer.
The OSI Reference Model
Chapter 6: Errors, Error Detection, and Error Control
Practical Session 11 Codes. Hamming Distance General case: The distance between two code words is the amount of 1-bit changes required to reach from one.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
Chapter 6 Errors, Error Detection, and Error Control
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Transmission Errors Error Detection and Correction
Data link layer: services
William Stallings Data and Computer Communications 7th Edition
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Data and Computer Communications
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
Errors, Error Detection, and Error Control
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
10/27/ Data Link Layer - Lin 1 CPET/ECET Data Link Layer Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Error Detection.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Block Coding Messages are made up of k bits. Transmitted packets have n bits, n > k: k-data bits and r-redundant bits. n = k + r.
Review.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Error Detection and Correction
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
1 Kyung Hee University Error Detection and Correction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Transmission Errors Error Detection and Correction.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Part III: Data Link Layer Error Detection and Correction
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Dr. Clincy Professor of CS
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
ERROR DETECTION AND CORRECTION
Subject Name: COMPUTER NETWORKS-1
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Transmission Errors Error Detection and Correction
Error Detection Neil Tang 9/26/2008
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Protocols and the TCP/IP Suite
Transmission Errors Error Detection and Correction
Chapter 10 Error Detection and Correction
Presentation transcript:

Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection

2 Topics l Introduction l Error Correction l Error Detection

3 Introduction l Transmission impairments (errors)  Attenuation  Loss of energy as signal propagates  Delay Distortion  Components travel at different speeds  Noise  Unwanted energy from other sources

4 Figure 3.21 Attenuation

5 Figure 3.23 Distortion

6 Figure 3.24 Noise

7 Isolated and Burst Error l Isolated: 0 -> 1, or 1 -> 0 l Burst: errors in consecutive bits  2 or more bits in the data unit have changed

8 Isolated and Burst Error l Compare burst errors to isolated errors  Fewer error blocks given a fixed error rate  Example: error rate: per bit (1 error out of 1000 bits) block size: 1000 bits burst size: 100 isolated error: an error contained in most blocks burst error: 1 or 2 error blocks out of 100 blocks  Error correction/detection much harder

9 Error Correcting/Detecting Codes l Redundancy added to data l Error correction  Referred to as forward error correction  Detect and correct error l Error detection  Detect error and request retransmission l Codeword (n bits)  data + redundancy (m bits) (r bits)  n = m + r When to use which one?

Redundancy

11 Error Correction l Hamming Code  For m-bit data we need r-bit redundancy, where (m+r+1)  2 r  Redundancy bits are placed in position of 2’s power l Example: If m = 7, then r = 4

Redundancy bits calculation

Example of redundancy bit calculation

Error detection using Hamming code

15 Correct Burst Errors l Organize k codewords into a (k x n) matrix  (k x r) check bits for (k x m) data l Transmit one column at a time l Reconstruct matrix after received l Correct burst errors of length  k

16 Correct Burst Errors k m n

Burst error correction example

18 Error Detection l Parity bit  Error detection  Added to data so that number of 1 bits in codeword is  Even (even parity)  Odd (odd parity)  E.g., ASCII of ‘H’ is , its codeword is  ________ if even parity is used  ________ if odd parity is used

Even-parity concept

20 Error Detection vs. Correction l Error-detecting and retransmission  More efficient than error-correction when error rate is low l Example:  error rate: per bit block size: 1000 bits check bits per block: Hamming code error correction: 10 Parity code error detection: 1 overhead for 1M data: e. c bits e. d bits

21 Use Parity to Detect Burst Errors l Organize a block into (k x n) matrix l One parity for each column  one row of parities at the bottom l Transmit one row at a time l Can detect burst errors of length  n

22 Example Original data Organized into  LRC Transmitted Burst error Error detected  whole block is discarded

23 Error-Detecting Code - CRC l Bit stream is treated as polynomial w/ coefficients 0 and 1 l Example:  data: polynomial: degree = 7 l Modulo 2 arithmetic is used  Example:  XOR

24 Error-Detecting Code - CRC l Use generator polynomial G(x) to calculate checksum  Frame: P(x)generator: G(x) degree of G(x) = d Transmitted: checksummed frame P(x)·x d + R(x) l It’s guaranteed that P(x)·x d + R(x) is divisible by G(x)!!

25 Error-Detecting Code - CRC l Receiver divides checksummed frame by G(x)  If remainder is zero  No error, CRC is removed  Otherwise  Error, the frame is discarded

Binary division in a CRC generator l Frame: l Generator: l Frame transmitted:

Binary division in CRC checker

28 CRC - Example l Frame: l Generator:

29 CRC Properties l Single error detection l Double error detection w/ carefully chosen G(x) l Odd number error detection if (x + 1) is a factor of G(x) l Detect burst error length  r for r check bits l Can be implemented in hardware using simple shift register circuit

30 Table 10.1 Standard polynomials NamePolynomialApplication CRC-8x 8 + x 2 + x + 1ATM header CRC-10x 10 + x 9 + x 5 + x 4 + x 2 + 1ATM AAL ITU-16x 16 + x 12 + x 5 + 1HDLC ITU-32 x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 LANs