SlideShare a Scribd company logo
4
Most read
8
Most read
10
Most read
4.2.3 Error Correction
4.2.3 Error Correction Once Detected, an error must be corrected. Two basic approaches to error correction are available, which are: Automatic-repeat-request (ARQ): Forward error correction (FEC):
4.2.3 Error Correction Automatic-repeat request (ARQ): ARQ procedures require the transmitter to resend the portions of the exchange in which error have been detected. Forward error correction (FEC): FEC techniques employ special codes that allow the receiver to detect and correct a limited number of errors without referring to the transmitter.
ARQ Techniques Generally, ARQ procedures include the following actions by the receiver or the sender:
ARQ Techniques Receiver: Discard those frames in which errors are detected. For frames in which no error was detected, the receiver returns a positive acknowledgment to the sender. For the frame in which errors have been detected, the receiver returns negative acknowledgement to the sender.
ARQ Techniques Sender: Retransmit the frames in which the receiver has identified errors.  After a pre-established time, the sender retransmits a frame that has not been acknowledged.
ARQ Techniques Three Common ARQ Techniques are: Stop-and-Wait Go-back-n Selective-repeat
ARQ Techniques Stop-and-Wait The sender sends a frame and waits for acknowledgment from the receiver. This technique is slow Suited for half-duplex connection.
ARQ Techniques Stop-and-Wait
ARQ Techniques Go-back-n: The sender sends frames in a sequence and receives acknowledgements from the receiver. On detecting an error, the receiver discards the corrupted frame, and ignores any further frames. The receiver notifies the sender of the number of frame it expects to receive.
ARQ Techniques Go-back-n: On receipt of information, the sender begins re-sending the data sequence starting from that frame. This technique is faster than stop-and-wait technique.
ARQ Techniques Selective-repeat: Used on duplex connections. The sender only repeats those frames for which negative acknowledgment are received from the receiver, or no acknowledgment is received. The appearance of a repeated frame out of sequence may provide the receiver with additional complications.
Forward Error Correction Possible for the receiver to detect and correct errors without reference to the sender. This convenience is bought at the expense of adding more bits.
Forward Error Correction For example If we only have two massages to send. we represent one (A) by the bits 10101010, And the other (B) by the bits 01010101. If the receiver knows that the message is A or B and no other, and it is provided with the ability to determine the logical distance between each incoming massage and the two known messages, this strategy will allow the receiver to correct for up to three bits in error. The prove is as follows.
Forward Error Correction Proof: Suppose A is in error by 1 bit, so that A’ =  0 0101010 The logical distance between the received pattern and A is 1 And logical distance between the received pattern and B is 7;  Thus A’ is likely to be A.
Forward Error Correction Suppose A is in error by 2 bit, so that A’ =  01 101010 The logical distance between the received pattern and A is 2 And logical distance between the received pattern and B is 6;  Thus A’ is likely to be A.
Forward Error Correction Suppose A is in error by 3 bit, so that A’ =  010 01010 The logical distance between the received pattern and A is 3 And logical distance between the received pattern and B is 5;  Thus A’ is likely to be A.
Forward Error Correction Suppose A is in error by 4 bit, so that A’ =  0101 1010 The logical distance between the received pattern and A is 4 And logical distance between the received pattern and B is 4;  Thus A’ is likely to be A or B.
Forward Error Correction Continuing the sequence to higher levels of error makes A’ more likely to be B than A.  For this particular case, the limit of correction is 3-bits in error.
Forward Error Correction Codes used to provide FEC (Forward Error Correction) are more sophisticated than our example. They can be divided into two types. Linear Block Codes Convolutional Codes

More Related Content

PPT
Chapter 4 data link layer
Naiyan Noor
 
PPT
Framming data link layer
PREMAL GAJJAR
 
PDF
GSM Bands and Frame Structure
Dr. Ramchandra Mangrulkar
 
PPTX
Transport layer protocol
N.Jagadish Kumar
 
PPT
Wireless networking
METHODIST COLLEGE OF ENGG & TECH
 
PPT
Fading Seminar
Rajesh Kumar
 
PPTX
Mobile Transport layer
Pallepati Vasavi
 
PPT
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
prem kamal
 
Chapter 4 data link layer
Naiyan Noor
 
Framming data link layer
PREMAL GAJJAR
 
GSM Bands and Frame Structure
Dr. Ramchandra Mangrulkar
 
Transport layer protocol
N.Jagadish Kumar
 
Fading Seminar
Rajesh Kumar
 
Mobile Transport layer
Pallepati Vasavi
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
prem kamal
 

What's hot (20)

PPTX
Introduction to data link layer
swarna sudha
 
PPT
Hamming codes
GIGI JOSEPH
 
PPTX
Handoff in Mobile Communication
Noushad Hasan
 
PPTX
Transmission control protocol
Sundra Anand
 
PPT
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
PPT
Unit 3 Network Layer PPT
KalpanaC14
 
PPTX
TELECOMMUNICATIONS SYSTEMS
junnubabu
 
PPTX
Chap 5 (small scale fading)
asadkhan1327
 
PPTX
Mpls technology
Naveen Sihag
 
PDF
2.3 time division multiple access
JAIGANESH SEKAR
 
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
PPTX
Cdma2000
vivek kumar
 
PPSX
Mac protocols of adhoc network
shashi712
 
PPT
17 SONET/SDH
Ahmar Hashmi
 
PPTX
Linear Block Codes
NilaNila16
 
PPSX
Error control
selvakumar_b1985
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PPTX
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
PPTX
Unit 2 data link control
Vishal kakade
 
Introduction to data link layer
swarna sudha
 
Hamming codes
GIGI JOSEPH
 
Handoff in Mobile Communication
Noushad Hasan
 
Transmission control protocol
Sundra Anand
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Jayaprasanna4
 
Unit 3 Network Layer PPT
KalpanaC14
 
TELECOMMUNICATIONS SYSTEMS
junnubabu
 
Chap 5 (small scale fading)
asadkhan1327
 
Mpls technology
Naveen Sihag
 
2.3 time division multiple access
JAIGANESH SEKAR
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Cdma2000
vivek kumar
 
Mac protocols of adhoc network
shashi712
 
17 SONET/SDH
Ahmar Hashmi
 
Linear Block Codes
NilaNila16
 
Error control
selvakumar_b1985
 
Csma cd and csma-ca
kazim Hussain
 
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Unit 2 data link control
Vishal kakade
 
Ad

Viewers also liked (8)

PPTX
Stop And Wait
Harsh Singh
 
PPTX
Stop And Wait ARQ
Anitha Selvan
 
PPTX
Turbo codes.ppt
Prasant Barik
 
PPT
Convolutional Codes And Their Decoding
Kakali Saharia
 
PPTX
Convolution codes and turbo codes
Manish Srivastava
 
PPTX
Convolution Codes
Pratishtha Ram
 
DOC
Network lab manual
Prabhu D
 
PDF
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Stop And Wait
Harsh Singh
 
Stop And Wait ARQ
Anitha Selvan
 
Turbo codes.ppt
Prasant Barik
 
Convolutional Codes And Their Decoding
Kakali Saharia
 
Convolution codes and turbo codes
Manish Srivastava
 
Convolution Codes
Pratishtha Ram
 
Network lab manual
Prabhu D
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Madhumita Tamhane
 
Ad

Similar to Error correction, ARQ, FEC (20)

PPTX
Error detection and correction
Cathryn Kuteesa
 
PPTX
Error control
Bhupendra sahu
 
PPT
5 DLL-LLC- Book
Water Birds (Ali)
 
PPT
stop and wait _
SwatiHans10
 
PPT
stop and wait
swati463221
 
PPT
09 Data Link LayerFlow Control.ppt
ShaliniKumariGupta1
 
PPTX
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
PPTX
Satellite error detection and correction presentation
AhmedMuhumed2
 
PPTX
Data link layar
jaysanshrestha
 
PPTX
Data link layar
jaysanshrestha
 
PPT
Flow & Error Control
tameemyousaf
 
PPTX
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
PPTX
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
PPTX
CN module for the second od momodule.ppt
NISHASOMSCS113
 
PPTX
CN UNIT-3 PPT R20 computer networks .pptx
SrinuM21
 
PPTX
Unit IV_Flow.pptx
TejasRao8
 
PDF
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
PPT
Presentation on dll
Alisha Korpal
 
PPT
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
Error detection and correction
Cathryn Kuteesa
 
Error control
Bhupendra sahu
 
5 DLL-LLC- Book
Water Birds (Ali)
 
stop and wait _
SwatiHans10
 
stop and wait
swati463221
 
09 Data Link LayerFlow Control.ppt
ShaliniKumariGupta1
 
III_UNIT_ErrorCorrecting.pptx
ShantanuDharekar
 
Satellite error detection and correction presentation
AhmedMuhumed2
 
Data link layar
jaysanshrestha
 
Data link layar
jaysanshrestha
 
Flow & Error Control
tameemyousaf
 
Lecture 36-43_DATA_COMMUNICATION_PPT.pptx
SuhaniTalreja
 
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
CN module for the second od momodule.ppt
NISHASOMSCS113
 
CN UNIT-3 PPT R20 computer networks .pptx
SrinuM21
 
Unit IV_Flow.pptx
TejasRao8
 
Unit 2_ Flow & Error Control in computer networks
Balasubramanian699229
 
Presentation on dll
Alisha Korpal
 
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 

More from Huawei Technologies (12)

PPT
Mian Nawaz Sharif PMLN
Huawei Technologies
 
PPT
Mian nawaz sharif pmln
Huawei Technologies
 
PPTX
Biography of nawaz sharif
Huawei Technologies
 
PPTX
Compiler Chapter 1
Huawei Technologies
 
PPT
Analysis of the source program
Huawei Technologies
 
PPTX
The analysis synthesis model of compilation
Huawei Technologies
 
PPT
What is Compiler?
Huawei Technologies
 
PPT
Binary signal, Uni-polar,
Huawei Technologies
 
PPT
Data encryption, Description, DES
Huawei Technologies
 
PPT
Error control, parity check, check sum, vrc
Huawei Technologies
 
PPT
Asynchronous and synchronous operation
Huawei Technologies
 
PPT
Binary Codes
Huawei Technologies
 
Mian Nawaz Sharif PMLN
Huawei Technologies
 
Mian nawaz sharif pmln
Huawei Technologies
 
Biography of nawaz sharif
Huawei Technologies
 
Compiler Chapter 1
Huawei Technologies
 
Analysis of the source program
Huawei Technologies
 
The analysis synthesis model of compilation
Huawei Technologies
 
What is Compiler?
Huawei Technologies
 
Binary signal, Uni-polar,
Huawei Technologies
 
Data encryption, Description, DES
Huawei Technologies
 
Error control, parity check, check sum, vrc
Huawei Technologies
 
Asynchronous and synchronous operation
Huawei Technologies
 
Binary Codes
Huawei Technologies
 

Recently uploaded (20)

PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 

Error correction, ARQ, FEC

  • 2. 4.2.3 Error Correction Once Detected, an error must be corrected. Two basic approaches to error correction are available, which are: Automatic-repeat-request (ARQ): Forward error correction (FEC):
  • 3. 4.2.3 Error Correction Automatic-repeat request (ARQ): ARQ procedures require the transmitter to resend the portions of the exchange in which error have been detected. Forward error correction (FEC): FEC techniques employ special codes that allow the receiver to detect and correct a limited number of errors without referring to the transmitter.
  • 4. ARQ Techniques Generally, ARQ procedures include the following actions by the receiver or the sender:
  • 5. ARQ Techniques Receiver: Discard those frames in which errors are detected. For frames in which no error was detected, the receiver returns a positive acknowledgment to the sender. For the frame in which errors have been detected, the receiver returns negative acknowledgement to the sender.
  • 6. ARQ Techniques Sender: Retransmit the frames in which the receiver has identified errors. After a pre-established time, the sender retransmits a frame that has not been acknowledged.
  • 7. ARQ Techniques Three Common ARQ Techniques are: Stop-and-Wait Go-back-n Selective-repeat
  • 8. ARQ Techniques Stop-and-Wait The sender sends a frame and waits for acknowledgment from the receiver. This technique is slow Suited for half-duplex connection.
  • 10. ARQ Techniques Go-back-n: The sender sends frames in a sequence and receives acknowledgements from the receiver. On detecting an error, the receiver discards the corrupted frame, and ignores any further frames. The receiver notifies the sender of the number of frame it expects to receive.
  • 11. ARQ Techniques Go-back-n: On receipt of information, the sender begins re-sending the data sequence starting from that frame. This technique is faster than stop-and-wait technique.
  • 12. ARQ Techniques Selective-repeat: Used on duplex connections. The sender only repeats those frames for which negative acknowledgment are received from the receiver, or no acknowledgment is received. The appearance of a repeated frame out of sequence may provide the receiver with additional complications.
  • 13. Forward Error Correction Possible for the receiver to detect and correct errors without reference to the sender. This convenience is bought at the expense of adding more bits.
  • 14. Forward Error Correction For example If we only have two massages to send. we represent one (A) by the bits 10101010, And the other (B) by the bits 01010101. If the receiver knows that the message is A or B and no other, and it is provided with the ability to determine the logical distance between each incoming massage and the two known messages, this strategy will allow the receiver to correct for up to three bits in error. The prove is as follows.
  • 15. Forward Error Correction Proof: Suppose A is in error by 1 bit, so that A’ = 0 0101010 The logical distance between the received pattern and A is 1 And logical distance between the received pattern and B is 7; Thus A’ is likely to be A.
  • 16. Forward Error Correction Suppose A is in error by 2 bit, so that A’ = 01 101010 The logical distance between the received pattern and A is 2 And logical distance between the received pattern and B is 6; Thus A’ is likely to be A.
  • 17. Forward Error Correction Suppose A is in error by 3 bit, so that A’ = 010 01010 The logical distance between the received pattern and A is 3 And logical distance between the received pattern and B is 5; Thus A’ is likely to be A.
  • 18. Forward Error Correction Suppose A is in error by 4 bit, so that A’ = 0101 1010 The logical distance between the received pattern and A is 4 And logical distance between the received pattern and B is 4; Thus A’ is likely to be A or B.
  • 19. Forward Error Correction Continuing the sequence to higher levels of error makes A’ more likely to be B than A. For this particular case, the limit of correction is 3-bits in error.
  • 20. Forward Error Correction Codes used to provide FEC (Forward Error Correction) are more sophisticated than our example. They can be divided into two types. Linear Block Codes Convolutional Codes