SlideShare a Scribd company logo
3
Most read
4
Most read
8
Most read
Block coding, error detection (Parity checking, Cyclic redundancy checking (CRC) and Hamming codes).
 Whenever bits flow from one point to another, they are
subject to unpredictable changes because of
interference. This interference can change the shape of
the signal.
 In a single-bit error, a 0 is changed to a 1 or a 1 to a O.
In a burst error, multiple bits are changed. For example,
a 11100 s burst of impulse noise on a transmission with
a data rate of 1200 bps might change all or some of
the12 bits of information.
 Block coding
 In block coding, we divide our message into blocks, each of k bits,
called datawords. We add r redundant bits to each block to make
the length n = k + r. The resulting n-bit blocks are called codewords.
[1]
 We have a set of datawords, each of size k, and a set of
codewords, each of size of n. With k bits, we can create a
combination of 2k datawords; with n bits, we can create a
combination of 2n codewords. Since n > k, the number of possible
codewords is larger than the number of possible datawords. The
block coding process is one-to-one; the same dataword is always
encoded as the same codeword. This means that we have 2n - 2k
codewords that are not used. We call these codewords invalid or
illegal. [1]
 If the following two conditions are met, the receiver can detect a
change in the original codeword. [2]
 The receiver has (or can find) a list of valid codewords.
 The original codeword has changed to an invalid one.
 The sender creates codewords out of datawords by using a
generator that applies the rules and procedures of encoding. Each
codeword sent to the receiver may change during transmission. If
the received codeword is the same as one of the valid codewords,
the word is accepted; the corresponding dataword is extracted for
use. If the received codeword is not valid, it is discarded. However,
if the codeword is corrupted during transmission but the received
word still matches a valid codeword, the error remains undetected.
[2]
 This type of coding can detect only single errors. Two or more
errors may remain undetected.
 Parity checking is a technique of adding an extra bit to the
end of a block of data to detect error.
 There are two types of parity checking: Even parity and
Odd parity.
 Even parity is a technique of adding an extra bit to the end
of block so that the numbers of 1’s becomes even.
 When the block arrives, the receiver will check if the
numbers of 1’s are even, if not there is an error.
 Odd parity is a technique of adding an extra bit to the end
of block so that the numbers of 1’s becomes odd.
 If the numbers of 1’s in a block are even, the receiver will
detect error.
 In Computer Memory,Computer Networking parity checking
is used as a way to ensure data integrity and prevent errors,
or detect them in the event they are occurring.
 Parity does not indicate which bit contained the error,
even when it can detect it.
 If the number of bits changed is even, the error will not
be detected.
 It can only detect one, three, or any odd number of
errors in each character.
 The data must be discarded entirely, and retransmitted
from scratch.
 One of the most common and one of the most powerful,
error-detecting codes is the cyclic redundancy check
(CRC). [3]
 It is used to protect blocks of data called Frames.
 Given a k-bit block of bits, or message, the transmitter
generates an sequence, known as a frame check
sequence (FCS), such that the resulting frame, consisting
of n bits, is exactly divisible by some predetermined
number. The receiver then divides the incoming frame by
that number and, if there is no remainder, assumes there
was no error. [3]
 CRC is simple to implement in binary hardware,
Mathematical analysis of CRC is very simple, and it is
good at detecting common errors caused by noise in
transmission.
 It has two important qualities:
 1. It must be one less than the number of divisor bits.
 2. After appending these bits data unit must be exactly
divisible by divisor.
Limitations
 CRC is not suitable for protecting against intentional
alteration of data, and overflow of data is possible in
CRC.
 In Hamming codes K parity bits are added to an n-bit data word,
forming a new word of n + k bits. The bit positions are numbered in
sequence from 1 to n + k. Those positions numbered with powers of
two are reserved for the parity bits. The code can be used with words
of any length.
Limitations
 One of the main disadvantages of Hamming codes is the
fixed Hamming distance and the problem of implementing
coders for large blocks. The fixed Hamming distance of
Hamming codes allows for detection of two errored bits
and the ability to correct only a single errored bit. A code
which enables the implementer to select the desired
Hamming distance would be advantageous.
 Error correction is much more difficult than error
detection. In error detection, the receiver needs
to know only that the received codeword is
invalid; in error correction the receiver needs to
find (or guess) the original codeword sent. We
can say that we need more redundant bits for
error correction than for error detection. [2]
 In block coding, we divide our message into blocks,
each of k bits, called datawords. We add r redundant
bits to each block to make the length n = k + r. The
resulting n-bit blocks are called codewords.
 Parity checking, Cyclic redundancy checking (CRC) and
Hamming codes are some error detection techniques
that I discussed in this assignment.
 Parity checking is a technique of adding an extra bit to
the end of a block of data to detect error.
 There are two types of parity checking: Even parity and
Odd parity.
 One of the most common and one of the most powerful,
error-detecting codes is the cyclic redundancy check
(CRC).
 It is used to protect blocks of data called Frames.
 Given a k-bit block of bits, or message, the transmitter
generates an sequence, known as a frame check
sequence (FCS), such that the resulting frame,
consisting of n bits, is exactly divisible by some
predetermined number. The receiver then divides the
incoming frame by that number and, if there is no
remainder, assumes there was no error.
 And in Hamming codes K parity bits are added to an n-
bit data word, forming a new word of n + k bits. The bit
positions are numbered in sequence from 1 to n + k.
Those positions numbered with powers of two are
reserved for the parity bits. The code can be used with
words of any length.
[1] B. A. Forouzan, Data Communications and Networking, vol.
Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 271.
[2] B. A. Forouzan, Data Communications and Networking, vol.
Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 272.
[3] W. Stallings, Data and Computer Communications, vol. Eighth
Edition, Upper Saddle Rivar, NJ 07458: Pearson Education, Inc, 2007,
p. 189.

More Related Content

What's hot (20)

PDF
Manchester & Differential Manchester encoding scheme
Arunabha Saha
 
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
PPTX
Hamming code system
DILSHAD AHMAD
 
PPTX
Chapter 10
bheemsain
 
PDF
Error Control Coding -Introduction
Burdwan University
 
PPT
Multiplexing and spreading
Shankar Gangaju
 
PPTX
Multiple Access Protocal
tes31
 
PPT
Chapter 4 data link layer
Naiyan Noor
 
PPTX
Transposition cipher techniques
SHUBHA CHATURVEDI
 
PPT
Error Detection And Correction
Renu Kewalramani
 
PPTX
Wireless transmission
Rajapriya82
 
PDF
Target language in compiler design
Muhammad Haroon
 
PPT
Error detection correction (CRC)
Karam Munir Butt
 
PPTX
Go Back N ARQ
guesta1b35273
 
PPT
Error detection and correction
Maria Akther
 
PPTX
Guided Transmission Media
Rajapriya82
 
PPTX
Computer networks - Channelization
Elambaruthi Elambaruthi
 
PPTX
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
PPTX
Cellular system
Prashant Srivastav
 
Manchester & Differential Manchester encoding scheme
Arunabha Saha
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Hamming code system
DILSHAD AHMAD
 
Chapter 10
bheemsain
 
Error Control Coding -Introduction
Burdwan University
 
Multiplexing and spreading
Shankar Gangaju
 
Multiple Access Protocal
tes31
 
Chapter 4 data link layer
Naiyan Noor
 
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Error Detection And Correction
Renu Kewalramani
 
Wireless transmission
Rajapriya82
 
Target language in compiler design
Muhammad Haroon
 
Error detection correction (CRC)
Karam Munir Butt
 
Go Back N ARQ
guesta1b35273
 
Error detection and correction
Maria Akther
 
Guided Transmission Media
Rajapriya82
 
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
Cellular system
Prashant Srivastav
 

Similar to Block coding, error detection (Parity checking, Cyclic redundancy checking (CRC) and Hamming codes). (20)

PPTX
DCN Error Detection & Correction
Rohan Bhatkar
 
PDF
Paper id 312201514
IJRAT
 
PPTX
V semester, computer networks BCS502 Module-2_DataLinkLayer
ambikavenkatesh2
 
PPTX
chp2 - data link layer.pptx
Chakra Pani
 
PDF
Survey on Error Control Coding Techniques
IJTET Journal
 
PPT
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
PDF
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Universitas Pembangunan Panca Budi
 
PDF
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
PPT
Error correction and detection th
ShardaSalunkhe1
 
PPT
Error detection.ppt
PawanRaj48
 
PPTX
Data link layer
IndrajaMeghavathula
 
PPTX
linear block code.pptxjdkdidjdjdkdkidndndjdj
urawaashish3
 
DOCX
Error dectation and correction
fg657
 
PPT
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
PDF
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
PPTX
Parity check, redundancy, and errors
KARIMU KHATWABI
 
PPTX
Satellite error detection and correction presentation
AhmedMuhumed2
 
PDF
Error Correction of Burst error
Tanzila Islam
 
PPTX
Presentation for the Project on VLSI and Embedded
lthanuja01
 
PPTX
Introduction to data link layer
Shashank HP
 
DCN Error Detection & Correction
Rohan Bhatkar
 
Paper id 312201514
IJRAT
 
V semester, computer networks BCS502 Module-2_DataLinkLayer
ambikavenkatesh2
 
chp2 - data link layer.pptx
Chakra Pani
 
Survey on Error Control Coding Techniques
IJTET Journal
 
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Universitas Pembangunan Panca Budi
 
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error correction and detection th
ShardaSalunkhe1
 
Error detection.ppt
PawanRaj48
 
Data link layer
IndrajaMeghavathula
 
linear block code.pptxjdkdidjdjdkdkidndndjdj
urawaashish3
 
Error dectation and correction
fg657
 
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
Parity check, redundancy, and errors
KARIMU KHATWABI
 
Satellite error detection and correction presentation
AhmedMuhumed2
 
Error Correction of Burst error
Tanzila Islam
 
Presentation for the Project on VLSI and Embedded
lthanuja01
 
Introduction to data link layer
Shashank HP
 
Ad

Recently uploaded (20)

PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Thermal runway and thermal stability.pptx
godow93766
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Design Thinking basics for Engineers.pdf
CMR University
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Ad

Block coding, error detection (Parity checking, Cyclic redundancy checking (CRC) and Hamming codes).

  • 2.  Whenever bits flow from one point to another, they are subject to unpredictable changes because of interference. This interference can change the shape of the signal.  In a single-bit error, a 0 is changed to a 1 or a 1 to a O. In a burst error, multiple bits are changed. For example, a 11100 s burst of impulse noise on a transmission with a data rate of 1200 bps might change all or some of the12 bits of information.
  • 3.  Block coding  In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords. [1]  We have a set of datawords, each of size k, and a set of codewords, each of size of n. With k bits, we can create a combination of 2k datawords; with n bits, we can create a combination of 2n codewords. Since n > k, the number of possible codewords is larger than the number of possible datawords. The block coding process is one-to-one; the same dataword is always encoded as the same codeword. This means that we have 2n - 2k codewords that are not used. We call these codewords invalid or illegal. [1]
  • 4.  If the following two conditions are met, the receiver can detect a change in the original codeword. [2]  The receiver has (or can find) a list of valid codewords.  The original codeword has changed to an invalid one.  The sender creates codewords out of datawords by using a generator that applies the rules and procedures of encoding. Each codeword sent to the receiver may change during transmission. If the received codeword is the same as one of the valid codewords, the word is accepted; the corresponding dataword is extracted for use. If the received codeword is not valid, it is discarded. However, if the codeword is corrupted during transmission but the received word still matches a valid codeword, the error remains undetected. [2]  This type of coding can detect only single errors. Two or more errors may remain undetected.
  • 5.  Parity checking is a technique of adding an extra bit to the end of a block of data to detect error.  There are two types of parity checking: Even parity and Odd parity.  Even parity is a technique of adding an extra bit to the end of block so that the numbers of 1’s becomes even.  When the block arrives, the receiver will check if the numbers of 1’s are even, if not there is an error.  Odd parity is a technique of adding an extra bit to the end of block so that the numbers of 1’s becomes odd.
  • 6.  If the numbers of 1’s in a block are even, the receiver will detect error.  In Computer Memory,Computer Networking parity checking is used as a way to ensure data integrity and prevent errors, or detect them in the event they are occurring.
  • 7.  Parity does not indicate which bit contained the error, even when it can detect it.  If the number of bits changed is even, the error will not be detected.  It can only detect one, three, or any odd number of errors in each character.  The data must be discarded entirely, and retransmitted from scratch.
  • 8.  One of the most common and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC). [3]  It is used to protect blocks of data called Frames.  Given a k-bit block of bits, or message, the transmitter generates an sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error. [3]
  • 9.  CRC is simple to implement in binary hardware, Mathematical analysis of CRC is very simple, and it is good at detecting common errors caused by noise in transmission.
  • 10.  It has two important qualities:  1. It must be one less than the number of divisor bits.  2. After appending these bits data unit must be exactly divisible by divisor. Limitations  CRC is not suitable for protecting against intentional alteration of data, and overflow of data is possible in CRC.
  • 11.  In Hamming codes K parity bits are added to an n-bit data word, forming a new word of n + k bits. The bit positions are numbered in sequence from 1 to n + k. Those positions numbered with powers of two are reserved for the parity bits. The code can be used with words of any length. Limitations  One of the main disadvantages of Hamming codes is the fixed Hamming distance and the problem of implementing coders for large blocks. The fixed Hamming distance of Hamming codes allows for detection of two errored bits and the ability to correct only a single errored bit. A code which enables the implementer to select the desired Hamming distance would be advantageous.
  • 12.  Error correction is much more difficult than error detection. In error detection, the receiver needs to know only that the received codeword is invalid; in error correction the receiver needs to find (or guess) the original codeword sent. We can say that we need more redundant bits for error correction than for error detection. [2]
  • 13.  In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.  Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed in this assignment.  Parity checking is a technique of adding an extra bit to the end of a block of data to detect error.
  • 14.  There are two types of parity checking: Even parity and Odd parity.  One of the most common and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC).  It is used to protect blocks of data called Frames.  Given a k-bit block of bits, or message, the transmitter generates an sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error.
  • 15.  And in Hamming codes K parity bits are added to an n- bit data word, forming a new word of n + k bits. The bit positions are numbered in sequence from 1 to n + k. Those positions numbered with powers of two are reserved for the parity bits. The code can be used with words of any length.
  • 16. [1] B. A. Forouzan, Data Communications and Networking, vol. Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 271. [2] B. A. Forouzan, Data Communications and Networking, vol. Fourth Edition, New York: McGraw-Hill Companies. Inc, 2007, p. 272. [3] W. Stallings, Data and Computer Communications, vol. Eighth Edition, Upper Saddle Rivar, NJ 07458: Pearson Education, Inc, 2007, p. 189.