10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Slides:



Advertisements
Similar presentations
10. Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Cyclic Code.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Chapter 10 Error Detection and Correction
PART III DATA LINK LAYER. Position of the Data-Link Layer.
ECOM 4314 Data Communications Fall September, 2010.
Error detection and correction
Error Detection and Correction
Error Detection and Correction Rizwan Rehman Centre for Computer Studies Dibrugarh University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Copyright © NDSL, Chang Gung University. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 長庚大學資訊工程學系 陳仁暉 副教授.
PART III DATA LINK LAYER. Position of the Data-Link Layer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
British Computer Society
CIT 307 Online Data Communications Error Detection Module 11 Kevin Siminski, Instructor.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer: Error Detection and Correction
Chapter 10. Error Detection and Correction
Data Communications, Kwangwoon University10-1 Part 3 Data Link Layer Chapter 10 Error Detection and Correction Chapter 11 Data Link Control Chapter 12.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
ECE453 – Introduction to Computer Networks Lecture 4 – Data Link Layer (I)
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Error Detection and Correction
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor St. Francis Institute of Technology, Mount Poinsur, S.V.P Road, Borivli (west), Mumbai
Error Detection and Correction
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
Lecture Focus: Data Communications and Networking  Data Link Layer  Error Control Lecture 19 CSCS 311.
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Communication & Networks Lecture 10 Datalink Layer: Error Correction Waleed Ejaz
1 Block Coding Messages are made up of k bits. Transmitted packets have n bits, n > k: k-data bits and r-redundant bits. n = k + r.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
1 Kyung Hee University Position of the data-link layer.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Chapter 10 Error Detection And Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
Error Detection and Correction
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Data Communications and Networking
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
10.1 UNIT - IV Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected.
Hamming Distance & Hamming Code
Transmission Errors Error Detection and Correction.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part III: Data Link Layer Error Detection and Correction
Data Link Layer 1. 2 Single-bit error 3 Multiple-bit error 4.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Part III. Data Link Layer
Error Detection and Correction
Subject Name: COMPUTER NETWORKS-1
DATA COMMUNICATION AND NETWORKINGS
Part III Datalink Layer 10.
Chapter 10 Error Detection And Correction
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Chapter 10 Error Detection And Correction
Welcome to the presentation. Linear Block Codes Almost all block codes used today belong to a subset called linear block codes. The exclusive OR of two.
Position of the data-link layer
Error Detection and Correction
Error Detection and Correction
Error Detection and Correction
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Chapter 10 Error Detection and Correction
Presentation transcript:

10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

10.2 Data can be corrupted during transmission. Some applications require that errors be detected and corrected. Note

INTRODUCTION Let us first discuss some issues related, directly or indirectly, to error detection and correction. Types of Errors Redundancy Detection Versus Correction Forward Error Correction Versus Retransmission Coding Modular Arithmetic Topics discussed in this section:

10.4 In a single-bit error, only 1 bit in the data unit has changed. Note

10.5 Figure 10.1 Single-bit error

10.6 A burst error means that 2 or more bits in the data unit have changed. Note

10.7 Figure 10.2 Burst error of length 8

10.8 To detect or correct errors, we need to send extra (redundant) bits with data. Note

10.9 In modulo-N arithmetic, we use only the integers in the range 0 to N −1, inclusive. Note

10.10 Figure 10.4 XORing of two single bits or two words

BLOCK CODING In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. Error Detection Error Correction Hamming Distance Minimum Hamming Distance Topics discussed in this section:

10.12 Figure 10.7 Structure of encoder and decoder in error correction

10.13 The Hamming distance between two words is the number of differences between corresponding bits. Note

10.14 Let us find the Hamming distance between two pairs of words. 1. The Hamming distance d(000, 011) is 2 because Example The Hamming distance d(10101, 11110) is 3 because

10.15 The minimum Hamming distance is the smallest Hamming distance between all possible pairs in a set of words. Note

10.16 Find the minimum Hamming distance of the coding scheme in Table Solution We first find all Hamming distances. Example 10.5 The d min in this case is 2.

10.17 Find the minimum Hamming distance of the coding scheme in Table Solution We first find all the Hamming distances. The d min in this case is 3. Example 10.6

10.18 To guarantee the detection of up to s errors in all cases, the minimum Hamming distance in a block code must be d min = s + 1. Note

10.19 To guarantee correction of up to t errors in all cases, the minimum Hamming distance in a block code must be d min = 2t + 1. Note

10.20 A simple parity-check code is a single-bit error-detecting code in which n = k + 1 with d min = 2. Note

10.21 Table 10.3 Simple parity-check code C(5, 4)

10.22 A simple parity-check code can detect an odd number of errors. Note

10.23 Figure Two-dimensional parity-check code

10.24 Figure Two-dimensional parity-check code

10.25 Figure Two-dimensional parity-check code

10.26 Hamming code Example: 7 bit ASCII code + 4 parity bits Bits are numbered from left to right, 1,2,4,8 are check bits. Bits 3,5,6,7,9,10,11 are data bits. Check bits are set to make the total number of 1’s in the checked positions an even number. Bit1 checks bits 1,3,5,7,9,11 Bit 22,3,6,7,10,11 Bit 44,5,6,7 Bit 88,9,10,11 E.g., bit 11 is checked by 1,2,8~ 11=1+2+8

10.27 (cont.) ACSII b (check bits are bold) Assume that the left most bit changes during transmission: Bit 1 incorrect because 1,3,5,7,9,11 contains 3 1’s Bit 2 correct (2 1’s) 2,3,6,7,10,11 are correct Bit 4 correct (2 1’s) 4,5,6,7 are correct Bit 8 correct 2 1’s) 8,9,10,11 are correct, therefore the incorrect bit

10.28 Table 10.4 Hamming code C(7, 4)

CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword is cyclically shifted (rotated), the result is another codeword. Cyclic Redundancy Check Hardware Implementation Polynomials Cyclic Code Analysis Advantages of Cyclic Codes Other Cyclic Codes Topics discussed in this section:

10.30 Figure Division in CRC encoder

10.31 Figure Division in the CRC decoder for two cases

10.32 Figure A polynomial to represent a binary word

10.33 Figure CRC division using polynomials

10.34 The divisor in a cyclic code is normally called the generator polynomial or simply the generator. Note

10.35 Table 10.7 Standard polynomials

CHECKSUM The last error detection method we discuss here is called the checksum. The checksum is used in the Internet by several protocols although not at the data link layer. However, we briefly discuss it here to complete our discussion on error checking Idea One’s Complement Internet Checksum Topics discussed in this section:

10.37 Figure Example 10.23