Data Communications Chapter 7 Error Detection. Despite the best prevention techniques, errors may still happen. To detect an error, something extra has.

Slides:



Advertisements
Similar presentations
Computer Interfacing and Protocols
Advertisements

Lecture 12 Layer 2 – Data Link Layer Protocols
Introduction to Information Technologies
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Data Link Layer – Part 1 V.T.Raja Oregon State University.
Traceroute Assignment. Base64 Encoding The SMTP protocol only allows 7 bit ASCII data, so how can you send me a picture of Avril Lavigne, which is an.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
Chapter 6: Errors, Error Detection, and Error Control
Practical Session 11 Codes. Hamming Distance General case: The distance between two code words is the amount of 1-bit changes required to reach from one.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
Chapter 6 Errors, Error Detection, and Error Control
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Synchronous - Asynchronous Data Transmission. Asynchronous ► The sender and receiver are not Synchronised. ► The sender sends only one character at a.
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Error Detection and Correction : Data Link Layer.
Data link layer: services
Lecture 06 Errors, Error Detection, and Error Control.
COM342 Networks and Data Communications
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
Data and Computer Communications
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Lecture 6: Framing and Error Detection-Data Link Layer Functions
1 Chapter 6 Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
Practical Session 10 Error Detecting and Correcting Codes.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Eighth Edition.
Errors, Error Detection, and Error Control
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Communication Systems 3.1) Characteristics of a Communication System.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
CSCI 465 D ata Communications and Networks Lecture 9 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Copyright ©2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible web site, in whole.
Error Detection.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Dr. Clincy Professor of CS
Modulo-2 Digital coding uses modulo-2 arithmetic where addition becomes the following operations: 0+0= =0 0+1= =1 It performs the.
Chapter 6 Errors, Error Detection, and Error Control
Introduction to Information Technologies
ERROR DETECTION AND CORRECTION
Chapter Six Errors, Error Detection, and Error Control
Dr. Clincy Professor of CS
Chapter Six - Errors, Error Detection, and Error Control
Part III Datalink Layer 10.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Chapter 7 Error Detection and Correction
Introduction to Information Technologies
Error Detection Neil Tang 9/26/2008
COMPUTER NETWORKS CS610 Lecture-5 Hammad Khalid Khan.
Chapter 9 Error Detection and Correction
Error Detection and Correction
Presentation transcript:

Data Communications Chapter 7 Error Detection

Despite the best prevention techniques, errors may still happen. To detect an error, something extra has to be added to the data/signal. This extra is an error detection code. Let’s examine two basic techniques for detecting errors: parity checking, and cyclic redundancy checksum.

Parity Checks Simple parity - If performing even parity, add a parity bit such that an even number of 1s are maintained. If performing odd parity, add a parity bit such that an odd number of 1s are maintained. For example, send using even parity Another example, send using even parity

Parity Checks What happens if the character is sent and the first two 0s accidentally become two 1s? Thus, the following character is received: Will there be a parity error? Problem: Simple parity only detects odd numbers of bits in error.

Parity Checks Longitudinal parity adds a parity bit to each character then adds a row of parity bits after a block of characters. The row of parity bits is actually a parity bit for each “column” of characters. The row parity bits plus the column parity bits add a great amount of redundancy to a block of characters.

Parity Checks Both simple parity and longitudinal parity do not catch all errors. Simple parity only catches odd numbers of bit errors. Longitudinal parity is better at catching errors but requires too many check bits added to a block of data. We need a better error detection method. What about cyclic redundancy checksum?

Cyclic Redundancy Checksum The CRC error detection method treats the packet of data to be transmitted as a large polynomial. The transmitter takes the message polynomial and using polynomial arithmetic, divides it by a given generating polynomial. The quotient is discarded but the remainder is “attached” to the end of the message.

Cyclic Redundancy Checksum The message (with the remainder) is transmitted to the receiver. The receiver divides the message and remainder by the same generating polynomial. If a remainder not equal to zero results, there was an error during transmission. If a remainder of zero results, there was no error during transmission.

More Formally M(x) - original message treated as a polynomial To prepare for transmission: Add r 0s to end of the message (where r = degree of generating polynomial) Divide M(x)x r by generating polynomial P(x) yielding a quotient and a remainder Q(x)+R(x)/P(x).

More Formally Add (XOR) remainder R(x) to M(x)x r giving M(x)x r +R(x) and transmit. Receiver receives message (M(x)x r +R(x)) and divides by same P(x). If remainder is 0, then there were no errors during transmission. (Any expression which has exactly P(x) as a term is evenly divisible by P(x).)

Common CRC Polynomials CRC-12: x 12 + x 11 + x 3 + x 2 + x + 1 CRC-16: x 16 + x 15 + x CRC-CCITT:x 16 + x 15 + x CRC-32: x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 ATM CRC: x 8 + x 2 + x + 1

CRC Example Given a pretend P(x) = x 5 + x 4 + x and a message M(x) = , calculate the remainder using long hand division and a shift register.

Review Questions What is the efficiency of simple parity? What is the efficiency of CRC? Be able to calculate a CRC using either shift register method or long-hand division method