SlideShare a Scribd company logo
A. D. Patel Institute Of Technology
Mobile Computing and Wireless Communication (2170710): A. Y. 2019-20
Error Detection & Error Correction Codes
Prepared By :
Dhruv V. Shah (160010116053)
B.E. (IT) Sem - VII
Guided By :
Prof. Jayandrath Mangrolia
(Dept Of IT , ADIT)
Department Of Information Technology
A.D. Patel Institute Of Technology (ADIT)
New Vallabh Vidyanagar , Anand , Gujarat
1
Outline
 Introduction
 Types Of Error
 Error Detection
 Methods of Error Detection
 Error Correction
 Hamming Code
 Example Of Hamming Code
2
Introduction
 Networks must be able to transfer data from one device to another with complete
accuracy.
 Data can be corrupted during transmission.
 For reliable communication, errors must be detected and corrected.
 Error detection and correction are implemented either at the Data link layer or the
Transport layer of the OSI model.
3
Types Of Error
Fig (a). Types Of Error
4
1] Single Bit Error
 Single bit errors are the least likely type of errors in serial data transmission because the noise
must have a very short duration which is very rare. However this kind of errors can happen in
parallel transmission.
Fig (b). Single Bit Error
5
Example :
 If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.
 For a single-bit error to occur, the noise must have a duration of only 1 μs, which is very rare.
6
2] Burst Error
Fig (c).1 Burst Error
Fig (c).2 Burst Error
7
 The term burst error means that two or more bits in the data unit have changed from 1 to 0 or
from 0 to 1.
 Burst errors does not necessarily mean that the errors occur in consecutive bits, the length of the
burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may
not have been corrupted.
 Burst error is most likely to happen in serial transmission since the duration of noise is normally
longer than the duration of a bit.
 The number of bits affected depends on the data rate and duration of noise.
 Example :
 If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000)
 If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000 bits.(1/100*106)
8
Error Detection
 Error detection means to decide whether the received data is correct or not without having a copy
of the original message.
 Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination.
Fig (d). Redundancy
9
Methods Of Error Detection
Fig (e). Error Detection Methods
10
1] Vertical Redundancy Check (VRC)
Fig (e).1 VRC
11
 It is also known as parity check.
 It is least expensive mechanism for error detection.
 In this technique , the redundant bit called parity bit is appended to every data unit so that the
total number of 1s in the unit becomes even (including parity bit).
 VRC can detect all single – bit errors.
 It can detect burst errors if the total number of errors in each data unit is odd.
 VRC can not detect errors where the total number of bits changed is even.
12
2] Longitudinal Redundancy Check (LRC)
Fig (e).2 LRC
 LCR increases the likelihood of detecting burst errors.
 If two bits in one data units are damaged and two bits in exactly the same positions in another
data unit are also damaged, the LRC checker will not detect an error.
13
VRC and LRC :
Fig (e).3 VRC & LRC
14
Cyclic Redundancy Check (CRC)
Fig (e).4 CRC
15
Binary Division:
Fig (e).5 Binary Division
16
 Polynomial :
 Polynomial & Divisor:
 Standard Polynomial :
17
 The checksum detects all errors involving an odd number of bits.
 It detects most errors involving an even number of bits.
 If one or more bits of a segment are damaged and the corresponding bit or bits of opposite value
in a second segment are also damaged, the sums of those columns will not change and the receiver
will not detect a problem.
18
Error Correction
 It can be handled in two ways:
1) Receiver can have the sender retransmit the entire data unit.
2) The receiver can use an error-correcting code, which automatically corrects certain errors.
 There are two types of Error Correcting techniques :
1) Single bit error correction.
2) Burst error correction.
 Error Correction can be done with the help of HAMMING CODE.
19
1] Single bit error correction
 To correct an error, the receiver reverses the value of the altered bit. To do so, it must know which
bit is in error.
 Number of redundancy bits needed
• Let data bits = m;
• Redundancy bits = r;
Total message sent = m+r;
 The value of r must satisfy the following relation:
2r ≥ m+r+1
20
2] Hamming Code
 Hamming code can be applied to data units of any length and uses the relationship between data
and redundancy bits.For eg.,
21
22
23
24
25
Error Detection
26
27

More Related Content

What's hot (20)

PPTX
Error control
Bhupendra sahu
 
PPT
data-link layer protocols
BE Smârt
 
PPTX
IPV6 ADDRESS
Jothi Lakshmi
 
PDF
IP Datagram Structure
Hitesh Mohapatra
 
PPTX
TCP/IP 3-way Handshake
Alok Tripathi
 
PPT
signal encoding techniques
Srinivasa Rao
 
PPT
Group Communication (Distributed computing)
Sri Prasanna
 
PPTX
Chapter 10
bheemsain
 
PPTX
Kerberos
Sutanu Paul
 
PPTX
Multiple access protocol
Merlin Florrence
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PPT
Error Detection And Correction
Renu Kewalramani
 
PPT
Basics of signals data communication
Syed Bilal Zaidi
 
PPTX
Computer Network - Network Layer
Manoj Kumar
 
PPTX
TCP- Transmission Control Protocol
Akhil .B
 
PPTX
Multiplexing in mobile computing
ZituSahu
 
PPTX
Multiple Access Protocal
tes31
 
PDF
Stop and-wait protocol
Venkata Sreeram
 
PPTX
Type checking in compiler design
Sudip Singh
 
Error control
Bhupendra sahu
 
data-link layer protocols
BE Smârt
 
IPV6 ADDRESS
Jothi Lakshmi
 
IP Datagram Structure
Hitesh Mohapatra
 
TCP/IP 3-way Handshake
Alok Tripathi
 
signal encoding techniques
Srinivasa Rao
 
Group Communication (Distributed computing)
Sri Prasanna
 
Chapter 10
bheemsain
 
Kerberos
Sutanu Paul
 
Multiple access protocol
Merlin Florrence
 
Pgp pretty good privacy
Pawan Arya
 
Error Detection And Correction
Renu Kewalramani
 
Basics of signals data communication
Syed Bilal Zaidi
 
Computer Network - Network Layer
Manoj Kumar
 
TCP- Transmission Control Protocol
Akhil .B
 
Multiplexing in mobile computing
ZituSahu
 
Multiple Access Protocal
tes31
 
Stop and-wait protocol
Venkata Sreeram
 
Type checking in compiler design
Sudip Singh
 

Similar to Error Detection & Error Correction Codes (20)

PPT
Error correction error detection in digital communication
swatihalunde
 
PPT
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
PDF
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
PPT
error detection.ppt
Jayaprasanna4
 
PDF
Data Link Layer Error Correction and Detection
PervaizKhan20
 
PPT
Error Detection and Correction.ppt
KumarVaibhav100
 
PPT
901325_chapter 10 (1).ppt
BezaAlem2
 
PPTX
Lecture 13
Anwal Mirza
 
PPT
Error correction and detection th
ShardaSalunkhe1
 
PPT
Error detection.ppt
PawanRaj48
 
PPT
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
SofienBoutaib
 
PPT
Error detection and correction.ppt
MsSJeyalakshmiVelsUn
 
PDF
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
PDF
computer networks Error Detection Methods.pdf
Balasubramanian699229
 
DOCX
Error dectation and correction
fg657
 
PPTX
Error Detection and Correctiouionvn.pptx
darshannaik55555
 
PDF
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
PDF
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
PPTX
Error detection and correction
Abdul Razaq
 
PPTX
Error detection.
Wasim Akbar
 
Error correction error detection in digital communication
swatihalunde
 
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
1.4.pdf 1.4.pdf 1.4.pdf1.4.pdf1.4.pdf1.4.pdf
gagansaigudi
 
error detection.ppt
Jayaprasanna4
 
Data Link Layer Error Correction and Detection
PervaizKhan20
 
Error Detection and Correction.ppt
KumarVaibhav100
 
901325_chapter 10 (1).ppt
BezaAlem2
 
Lecture 13
Anwal Mirza
 
Error correction and detection th
ShardaSalunkhe1
 
Error detection.ppt
PawanRaj48
 
901325_chapter vvvvvvvvvvvjjjjjjjvvv.ppt
SofienBoutaib
 
Error detection and correction.ppt
MsSJeyalakshmiVelsUn
 
اسس شبكات الفصل الثاني اسسس الشبكات الفصل الثاني.
fma561793
 
computer networks Error Detection Methods.pdf
Balasubramanian699229
 
Error dectation and correction
fg657
 
Error Detection and Correctiouionvn.pptx
darshannaik55555
 
4 implementation of various error detection and correction techniques in c...
ZerihunDemere
 
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection and correction
Abdul Razaq
 
Error detection.
Wasim Akbar
 
Ad

More from ShahDhruv21 (12)

PPTX
Semantic net in AI
ShahDhruv21
 
PPTX
Secure Hash Algorithm (SHA)
ShahDhruv21
 
PPTX
Data Mining in Health Care
ShahDhruv21
 
PPTX
Data Compression in Data mining and Business Intelligencs
ShahDhruv21
 
PPTX
MongoDB installation,CRUD operation & JavaScript shell
ShahDhruv21
 
PPTX
2D Transformation
ShahDhruv21
 
PPTX
Interpreter
ShahDhruv21
 
PPTX
Topological Sorting
ShahDhruv21
 
PPTX
Pyramid Vector Quantization
ShahDhruv21
 
PPTX
Event In JavaScript
ShahDhruv21
 
PPTX
JSP Directives
ShahDhruv21
 
PPTX
WaterFall Model & Spiral Mode
ShahDhruv21
 
Semantic net in AI
ShahDhruv21
 
Secure Hash Algorithm (SHA)
ShahDhruv21
 
Data Mining in Health Care
ShahDhruv21
 
Data Compression in Data mining and Business Intelligencs
ShahDhruv21
 
MongoDB installation,CRUD operation & JavaScript shell
ShahDhruv21
 
2D Transformation
ShahDhruv21
 
Interpreter
ShahDhruv21
 
Topological Sorting
ShahDhruv21
 
Pyramid Vector Quantization
ShahDhruv21
 
Event In JavaScript
ShahDhruv21
 
JSP Directives
ShahDhruv21
 
WaterFall Model & Spiral Mode
ShahDhruv21
 
Ad

Recently uploaded (20)

PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Thermal runway and thermal stability.pptx
godow93766
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 

Error Detection & Error Correction Codes

  • 1. A. D. Patel Institute Of Technology Mobile Computing and Wireless Communication (2170710): A. Y. 2019-20 Error Detection & Error Correction Codes Prepared By : Dhruv V. Shah (160010116053) B.E. (IT) Sem - VII Guided By : Prof. Jayandrath Mangrolia (Dept Of IT , ADIT) Department Of Information Technology A.D. Patel Institute Of Technology (ADIT) New Vallabh Vidyanagar , Anand , Gujarat 1
  • 2. Outline  Introduction  Types Of Error  Error Detection  Methods of Error Detection  Error Correction  Hamming Code  Example Of Hamming Code 2
  • 3. Introduction  Networks must be able to transfer data from one device to another with complete accuracy.  Data can be corrupted during transmission.  For reliable communication, errors must be detected and corrected.  Error detection and correction are implemented either at the Data link layer or the Transport layer of the OSI model. 3
  • 4. Types Of Error Fig (a). Types Of Error 4
  • 5. 1] Single Bit Error  Single bit errors are the least likely type of errors in serial data transmission because the noise must have a very short duration which is very rare. However this kind of errors can happen in parallel transmission. Fig (b). Single Bit Error 5
  • 6. Example :  If data is sent at 1Mbps then each bit lasts only 1/1,000,000 sec. or 1 μs.  For a single-bit error to occur, the noise must have a duration of only 1 μs, which is very rare. 6
  • 7. 2] Burst Error Fig (c).1 Burst Error Fig (c).2 Burst Error 7
  • 8.  The term burst error means that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1.  Burst errors does not necessarily mean that the errors occur in consecutive bits, the length of the burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may not have been corrupted.  Burst error is most likely to happen in serial transmission since the duration of noise is normally longer than the duration of a bit.  The number of bits affected depends on the data rate and duration of noise.  Example :  If data is sent at rate = 1Kbps then a noise of 1/100 sec can affect 10 bits.(1/100*1000)  If same data is sent at rate = 1Mbps then a noise of 1/100 sec can affect 10,000 bits.(1/100*106) 8
  • 9. Error Detection  Error detection means to decide whether the received data is correct or not without having a copy of the original message.  Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Fig (d). Redundancy 9
  • 10. Methods Of Error Detection Fig (e). Error Detection Methods 10
  • 11. 1] Vertical Redundancy Check (VRC) Fig (e).1 VRC 11
  • 12.  It is also known as parity check.  It is least expensive mechanism for error detection.  In this technique , the redundant bit called parity bit is appended to every data unit so that the total number of 1s in the unit becomes even (including parity bit).  VRC can detect all single – bit errors.  It can detect burst errors if the total number of errors in each data unit is odd.  VRC can not detect errors where the total number of bits changed is even. 12
  • 13. 2] Longitudinal Redundancy Check (LRC) Fig (e).2 LRC  LCR increases the likelihood of detecting burst errors.  If two bits in one data units are damaged and two bits in exactly the same positions in another data unit are also damaged, the LRC checker will not detect an error. 13
  • 14. VRC and LRC : Fig (e).3 VRC & LRC 14
  • 15. Cyclic Redundancy Check (CRC) Fig (e).4 CRC 15
  • 16. Binary Division: Fig (e).5 Binary Division 16
  • 17.  Polynomial :  Polynomial & Divisor:  Standard Polynomial : 17
  • 18.  The checksum detects all errors involving an odd number of bits.  It detects most errors involving an even number of bits.  If one or more bits of a segment are damaged and the corresponding bit or bits of opposite value in a second segment are also damaged, the sums of those columns will not change and the receiver will not detect a problem. 18
  • 19. Error Correction  It can be handled in two ways: 1) Receiver can have the sender retransmit the entire data unit. 2) The receiver can use an error-correcting code, which automatically corrects certain errors.  There are two types of Error Correcting techniques : 1) Single bit error correction. 2) Burst error correction.  Error Correction can be done with the help of HAMMING CODE. 19
  • 20. 1] Single bit error correction  To correct an error, the receiver reverses the value of the altered bit. To do so, it must know which bit is in error.  Number of redundancy bits needed • Let data bits = m; • Redundancy bits = r; Total message sent = m+r;  The value of r must satisfy the following relation: 2r ≥ m+r+1 20
  • 21. 2] Hamming Code  Hamming code can be applied to data units of any length and uses the relationship between data and redundancy bits.For eg., 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 27. 27