Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.

Slides:



Advertisements
Similar presentations
Computer Interfacing and Protocols
Advertisements

10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 12 Layer 2 – Data Link Layer Protocols
Introduction to Information Technologies
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Data link layer: services
1 Kyung Hee University Data Link Layer PART III. 2 Kyung Hee University Position of the data-link layer.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
Practical Session 10 Error Detecting and Correcting Codes.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, October 2011.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
Error Detection.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Error Detection and Correction.
Error Detection & Correction  Data can be corrupted during transmission.  For reliable transmission, errors must be detected and corrected.  Error detection.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Transmission Errors Error Detection and Correction.
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Computer Network Lab. 1 9 장 Error Detection and Correction 9.1 Types of Errors 9.2 Detection 9.3 Error Correction 9.4 요약.
1 Kyung Hee University Prof. Choong Seon HONG Error Detection and Correction.
Error Detection and Correction
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
9장 Error Detection and Correction
Error Detection and Correction
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Data Link Layer.
Many to one/one to many Types of multiplexing Telephone system
Subject Name: COMPUTER NETWORKS-1
Error Detection and Correction
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Data Link Layer.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Packetizing Error Detection
Packetizing Error Detection
PART III Data Link Layer.
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
Chapter 7 Error Detection and Correction
Chapter 9 Error Detection and Correction
Introduction to Information Technologies
DATA COMMUNICATION Lecture-35.
Error Detection Neil Tang 9/26/2008
Packetizing Error Detection
DATA COMMUNICATION Lecture-33.
Protocols and the TCP/IP Suite
Chapter 9 Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
DATA COMMUNICATION Lecture-34.
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport layers of the OSI model

Detection Redundancy - adding extra bits that indicate information about the data without repeating it types –vertical –longitudinal –cyclical –checksum

Error Detection Vertical Redundancy Check (VRC, or simply, Parity Check) Longitudinal Redundancy Check (LRC) Cyclic Redundancy Check (CRC)

Parity Check ( Vertical Redundancy Check) Redundant bit is appended to each data unit Even parity: the bit is set to 1 if number of 1s in the data is an odd number, thus making total number of 1s transmitted an even number Odd parity: the bit is set to 1 if number of 1s in the data is an even number, thus making total number of 1s transmitted an odd number

Longitudinal Checks parity the same way as the vertical method but checks the data “horizontally” as well data is organized into columns and rows, each column is checked and given a parity bit, LRC is attached to the end of the data greatly increases the possibility of catching burst errors

Cyclical Redundancy Check (CRC) Common in data link protocols (CRC) data is binary divided (divisor is predetermined) remainder is appended to the data remainder is appended so that the data can be evenly divided by a second binary number remainder is 1 bit less than the divisor

Checksum Used in hardware and files at the sender, the data is divided into equal chunks of the same length the chunks are added together using one’s compliments so that the total is the same length as a chunk the total is then complimented and the result is added to the data

Checksum con’t The receiver chops the data up into the same size chunks and adds them using the one’s compliment the total is summed with the checksum and if the result has a compliment that is all 0’s then the data is assumed to be O.K. detects all odd and most even bit errors – can still have errors

Hamming Code Redundancy bits do not have to come at the end of the data: d d d r8 d d d r4 d r2 r1 places a series of redundancy bits within the data, each r bit checks the parity on a different group of bits r1: 1,3,5,7,9,11 r2: 2,3,6,7,10, 11 r4: 4,5,6,7 r8: 8,9,10,11

Hamming Code Receiver recalculates the VRC using the same bit sets and the parity (r) bits it assembles the parity values into a binary number in order of position –r8, r4, r2, r1 this binary number gives the position of the bit in error multiple bit errors require much more overhead