Error Detection.

Slides:



Advertisements
Similar presentations
Computer Interfacing and Protocols
Advertisements

10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Information Technologies
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
The Data Link Layer Chapter 3. Position of the data-link layer.
Error Detection and Correction
Chapter 10 Error Detection and Correction
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
1 Kyung Hee University Data Link Layer PART III. 2 Kyung Hee University Position of the data-link layer.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
PREPARED BY: ENGR. JO-ANN C. VIÑAS
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
Lecture 5 Checksum. 10.2CHECKSUM Checksum is an error-detecting technique that can be applied to a message of any length. In the Internet, the checksum.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Lecture Focus: Data Communications and Networking  Data Link Layer  Error Control Lecture 19 CSCS 311.
1 © Unitec New Zealand CRC calculation and Hammings code.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
1 Kyung Hee University Error Detection and Correction.
Error Detection & Correction  Data can be corrupted during transmission.  For reliable transmission, errors must be detected and corrected.  Error detection.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part III: Data Link Layer Error Detection and Correction
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
10.1 Types of Errors 10.2 Detection 10.3 Error Correction.
Computer Network Lab. 1 9 장 Error Detection and Correction 9.1 Types of Errors 9.2 Detection 9.3 Error Correction 9.4 요약.
1 Kyung Hee University Prof. Choong Seon HONG Error Detection and Correction.
Error Detection and Correction
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
9장 Error Detection and Correction
Error Detection and Correction
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Data Link Layer.
Part III. Data Link Layer
Subject Name: COMPUTER NETWORKS-1
Error Detection and Correction
CIS 321 Data Communications & Networking
Part III Datalink Layer 10.
Data Link Layer.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Packetizing Error Detection
Packetizing Error Detection
PART III Data Link Layer.
Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For.
Chapter 7 Error Detection and Correction
Chapter 9 Error Detection and Correction
Introduction to Information Technologies
DATA COMMUNICATION Lecture-35.
Packetizing Error Detection
DATA COMMUNICATION Lecture-33.
Chapter 9 Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
DATA COMMUNICATION Lecture-34.
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Error Detection

Error Detection and Correction Background Data can be corrupted during transmission For reliable communication, errors must be detected and corrected Error detection and correction can be implemented in Data link layer, or Transport layer

Types of Errors

Single-Bit Error Only one bit in the data units has changed Example sent received 00000100 00001100

Burst Error Two or more bits in the data unit have changed Errors do not occur in consecutive bits The length of the burst measured from the first corrupted bit to the last corrupted bit

Burst Error Example length of burst error 7 bits sent 0000110000110000110 received 0011110010110000110

Detection : Redundancy 1) Two copies of data unit (packet) are sent Receiving device compares them Able to detect errors Transmission time  double Computational time  slow

Detection : Redundancy 2) Only extra information is added Shorter group of bits may be added to each packet Used by the receiving device Discarded when it is used

Redundancy Check

Redundancy Check Four types of redundancy checks Vertical redundancy check (VRC) Longitudinal redundancy check (LRC) Cyclical redundancy check (CRC) Checksum

Vertical Redundancy Check (VRC) Implemented in the physical layer Most common and least expensive mechanism for error detection Also called parity bit check A redundant bit, called parity bit, is appended to every data unit The number of 1s for each data unit, including the parity bit, becomes even 0 is appended when the data unit consists of even 1s

VRC

VRC Original Data 1110111 1101111 1100100 Parity Bit added 1110111 1101111 1100100 Parity Bit added 11101110 11011110 11001001 Received data 11111110 11011110 11001001 Discard this data

VRC Performance Detects all single-bit errors (1, 3, 5, .. Bits changed) Able to detect burst errors if The total number of bits changed is odd Cannot detect errors where the total number of bits changed is even

Longitudinal Redundancy Check (LRC) 11100111 11011101 00111001 10101001 11100111 11011101 00111001 10101001 10101010 LRC 11100111 11011101 00111001 10101001 10101010  Original data + LRC

Cyclic Redundancy Check (CRC) Based on Binary Division

CRC Generator Data plus extra zeros. The number of zeros is one less than the number or bits in the divisor. When the leftmost bit is zero, we must use 0000 instead of the original divisor

CRC Checker A CRC checker functions exactly like the generator Data + CRC is divided by the predefined divisor If the remainder is all 0s, accept Otherwise discard the received data

Polynomial CRC generator (the divisor) is also represented as an algebraic polynomial It is short it can be used to prove the concept mathematically

Polynomial Polynomial properties : it should not be divisible by x it should be divisible by x+1 All burst errors of a length equal to the degree of polynomial are detected

Standard polynomial

Example of CRC Data = 1010001101 Polynomial = 110101 Calculate: 101000110100000 - 110101 = 011101110100000 Remainder = 1110 Send data frame = 10100011011110 Received Data = 10100011011110 Polynomial = 110101 Calculate: 101000110101110 - 110101 = 011101110101110 Remainder = 0

Checksum Used by the higher-layer protocols Based on concept of redundancy Consists of checksum generator and checksum checker

Checksum Checksum generator The data unit is divided into k sections, each of n bits All sections are added together using one’s complement to get the sum The sum is complemented and becomes the checksum The checksum is sent with the data

checksum Checksum checker The data unit is divided into k sections, each of n bits All sections are added together using one’s complement to get the sum The sum is complemented If the result is zero, the data are accepted, otherwise, they are rejected

Checksum

Example : Checksum Generator (sender) 10101001 00111001 10101001 + 00111001 sum 11100010 checksum 00011101  Data sent 10101001 00111001 00011101

Example : Checksum Checker Received data 10101001 00111001 00011101 sum all sections 10101001 00111001 00011101 Sum 11111111 Complement 00000000  OK

Error Correction Two methods Error-correction code The sender retransmits the entire data The receiver corrects errors using error-correction code Error-correction code More sophisticated than error-detection codes Require more redundancy bits than error-detection

Error Correction (cont.) Error-correction code (cont.) The number of bits required to correct multiple-bit or burst error is high In most case it is inefficient to do Most error correction is limited to one-, two-, or three-bit errors

Error Correction Self study if you are interested in it.