SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Presented by :
Ahtesham Ullah Khan
1604610013
CSE 3RD YR
ERROR CONTROL IN
NETWORK LAYER
There are two main types of errors in transmissions:
1. Single bit error : It means only one bit of data unit is
changed from 1 to 0 or from 0 to 1.
TYPES OF ERRORS
2. Burst error : It means two or more bits in data unit
are changed from 1 to 0 from 0 to 1. In burst error, it is
not necessary that only consecutive bits are changed.
The length of burst error is measured from first
changed bit to last changed bit
ERROR CONTROL
1. Parity Checking
2. Cyclic Redundancy Check
3. Checksum
There are two types of attacks against errors:
1. Error Detecting Codes: Include enough redundancy bits
to detect errors and use ACKs and retransmissions to
recover from the errors.
2. Error Correcting Codes: Include enough redundancy to
detect and correct errors. The use of error-correcting
codes is often referred to as forward error correction.
ERROR CONTROL TECHNIQUE
PARITY CHECK TECHNIQUE
A parity check is the process that ensures accurate data
transmission between nodes during communication. A parity
bit is appended to the original data bits to create an even or
odd bit number; the number of bits with value one. The
source then transmits this data via a link, and bits are checked
and verified at the destination. Data is considered accurate if
the number of bits (even or odd) matches the number
transmitted from the source.
TYPE OF PARITY
1. Even Parity
2. Odd Parity
Error Control In Network Layer
CYCLIC REDUNDANCY CHECK
1. In CRC, a sequence of redundant bits, called cyclic
redundancy check bits, are appended to the end
of data unit so that the resulting data unit
becomes exactly divisible by a second,
predetermined binary number.
2. At the destination, the incoming data unit is
divided by the same number. If at this step there
is no remainder, the data unit is assumed to be
correct and is therefore accepted.
3. A remainder indicates that the data unit has been
damaged in transit and therefore must be
rejected.
Error Control In Network Layer
EXAMPLE :
Data word : 1010 Divisor : 1011
1011 1010000
1
1011
1000
1011
011 CRC
1011 1010
1
1011
1011
1011
0000 ACCEPTED
00 1
001
CHECKSUM
1. In checksum error detection scheme, the data is
divided into k segments each of m bits.
2. In the sender’s end the segments are added using 1’s
complement arithmetic to get the sum. The sum is
complemented to get the checksum.
3. The checksum segment is sent along with the data
segments.
4. At the receiver’s end, all received segments are added
using 1’s complement arithmetic to get the sum. The
sum is complemented.
5. If the result is zero, the received data is accepted;
otherwise discarded.
Error Control In Network Layer
EXAMPLE
Error Control In Network Layer

More Related Content

What's hot (20)

PDF
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
PPT
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
PPTX
Data link layer
Mukesh Chinta
 
PPT
signal encoding techniques
Srinivasa Rao
 
PPTX
Computer network switches & their structures
Sweta Kumari Barnwal
 
PPTX
Framing in data link layer
Ahtesham Ullah khan
 
PPTX
Chapter 11: Data Link Control
JeoffnaRuth
 
PPTX
Multiple Access Protocal
tes31
 
PDF
Cs8591 Computer Networks - UNIT V
pkaviya
 
PPTX
Go back-n protocol
STEFFY D
 
PPTX
Media Access Control (MAC Layer)
Meenakshi Paul
 
PPT
Error Detection and Correction
TechiNerd
 
PPTX
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
PPT
Error correction error detection in digital communication
swatihalunde
 
PDF
Data Communication & Computer Networks : Serial and parellel transmission
Dr Rajiv Srivastava
 
PPTX
Electronic mail - Computer Networks
Umme Jamal
 
PPTX
Data link layer
I World Tech
 
PPT
Unit 3 Network Layer PPT
KalpanaC14
 
PDF
Transport layer services
Melvin Cabatuan
 
PPTX
Tcp
Varsha Kumar
 
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Data link layer
Mukesh Chinta
 
signal encoding techniques
Srinivasa Rao
 
Computer network switches & their structures
Sweta Kumari Barnwal
 
Framing in data link layer
Ahtesham Ullah khan
 
Chapter 11: Data Link Control
JeoffnaRuth
 
Multiple Access Protocal
tes31
 
Cs8591 Computer Networks - UNIT V
pkaviya
 
Go back-n protocol
STEFFY D
 
Media Access Control (MAC Layer)
Meenakshi Paul
 
Error Detection and Correction
TechiNerd
 
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Error correction error detection in digital communication
swatihalunde
 
Data Communication & Computer Networks : Serial and parellel transmission
Dr Rajiv Srivastava
 
Electronic mail - Computer Networks
Umme Jamal
 
Data link layer
I World Tech
 
Unit 3 Network Layer PPT
KalpanaC14
 
Transport layer services
Melvin Cabatuan
 

Similar to Error Control In Network Layer (20)

PPTX
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
PPSX
Error control
selvakumar_b1985
 
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
PPTX
Error Detection in Data link layer or Transport layer
errvmaurya563
 
PPT
Error correction and detection th
ShardaSalunkhe1
 
PPTX
Error detection techniques
kunjan shah
 
PDF
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
PDF
Error detection and correction
Sisir Ghosh
 
PDF
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
PPTX
Error Detection and Correctiouionvn.pptx
darshannaik55555
 
PPTX
Error detection methods-computer networks
DHIVYADEVAKI
 
PPTX
M3 Error detection & correction in data communication.pptx
jainsambhavsj1308
 
PDF
Computer Networks Module II
Ajit Nayak
 
PPTX
Error detection in Data comunication
Umme habiba
 
PPT
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
DOCX
Error dectation and correction
fg657
 
PPTX
Error detection.
Wasim Akbar
 
PDF
Computer Networking and Data Transmission.pdf
hinaaaghani
 
PPTX
Lecture 4 errors detection
Josh Street
 
PDF
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
Error control
selvakumar_b1985
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
Error Detection in Data link layer or Transport layer
errvmaurya563
 
Error correction and detection th
ShardaSalunkhe1
 
Error detection techniques
kunjan shah
 
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection and correction
Sisir Ghosh
 
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
Error Detection and Correctiouionvn.pptx
darshannaik55555
 
Error detection methods-computer networks
DHIVYADEVAKI
 
M3 Error detection & correction in data communication.pptx
jainsambhavsj1308
 
Computer Networks Module II
Ajit Nayak
 
Error detection in Data comunication
Umme habiba
 
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Error dectation and correction
fg657
 
Error detection.
Wasim Akbar
 
Computer Networking and Data Transmission.pdf
hinaaaghani
 
Lecture 4 errors detection
Josh Street
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
Ad

Recently uploaded (20)

PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
Structural Functiona theory this important for the theorist
cagumaydanny26
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Structural Functiona theory this important for the theorist
cagumaydanny26
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Benefits_^0_Challigi😙🏡💐8fenges[1].pptx
akghostmaker
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
Ad

Error Control In Network Layer

  • 1. Presented by : Ahtesham Ullah Khan 1604610013 CSE 3RD YR ERROR CONTROL IN NETWORK LAYER
  • 2. There are two main types of errors in transmissions: 1. Single bit error : It means only one bit of data unit is changed from 1 to 0 or from 0 to 1. TYPES OF ERRORS
  • 3. 2. Burst error : It means two or more bits in data unit are changed from 1 to 0 from 0 to 1. In burst error, it is not necessary that only consecutive bits are changed. The length of burst error is measured from first changed bit to last changed bit
  • 4. ERROR CONTROL 1. Parity Checking 2. Cyclic Redundancy Check 3. Checksum There are two types of attacks against errors: 1. Error Detecting Codes: Include enough redundancy bits to detect errors and use ACKs and retransmissions to recover from the errors. 2. Error Correcting Codes: Include enough redundancy to detect and correct errors. The use of error-correcting codes is often referred to as forward error correction. ERROR CONTROL TECHNIQUE
  • 5. PARITY CHECK TECHNIQUE A parity check is the process that ensures accurate data transmission between nodes during communication. A parity bit is appended to the original data bits to create an even or odd bit number; the number of bits with value one. The source then transmits this data via a link, and bits are checked and verified at the destination. Data is considered accurate if the number of bits (even or odd) matches the number transmitted from the source. TYPE OF PARITY 1. Even Parity 2. Odd Parity
  • 7. CYCLIC REDUNDANCY CHECK 1. In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. 2. At the destination, the incoming data unit is divided by the same number. If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted. 3. A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.
  • 9. EXAMPLE : Data word : 1010 Divisor : 1011 1011 1010000 1 1011 1000 1011 011 CRC 1011 1010 1 1011 1011 1011 0000 ACCEPTED 00 1 001
  • 10. CHECKSUM 1. In checksum error detection scheme, the data is divided into k segments each of m bits. 2. In the sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum is complemented to get the checksum. 3. The checksum segment is sent along with the data segments. 4. At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented. 5. If the result is zero, the received data is accepted; otherwise discarded.