SlideShare a Scribd company logo
4
Most read
9
Most read
DATA COMMUNICATION
NOTES
TABLE OF CONTENTS
 COVER PAGE………………………….slide 01
 NAMES OF PARTICIPANTS…………. slide 03
 TYPES OF ERRORS………………….. Slide 04
 REDUNDANCY………………………. Slide 05
 ERROR DETECTION AND CORRECTION slide 06
TYPES OF ERRORS
1) SINGLE BIT ERROR
The term single-bit error means that only 1 bit of a
given data unit (such as a byte, character, or packet) is
changed from 1 to 0 or from 0 to 1.
TYPES OF ERRORS cont…
BURST ERROR
The term burst error means that 2 or more bits in the
data unit have changed from 1 to 0 or from 0 to 1.
REDUNDANCY
The central concept in detecting or correcting errors.
 To be able to detect or correct errors, we need to
send some extra bits with our data.
 These redundant bits are added by the sender and
removed by the receiver.
 Their presence allows the receiver to detect or
correct corrupted bits.
ERROR DETECTION AND ERROR
CORRECTION
ERROR DETECTION
is the process of monitoring data transmission and
determining when errors have occurred. Error-
detection techniques neither correct errors nor identify
which bits are in error they indicate only when an
error has occurred.
ERROR CORRECTION
Is the process of recovering or removing errors in
transmitted signal of information. This is mainly done
at the receiver.
BLOCK CODING
 The message is divided into blocks
 Each block is k-bits size, called dataword add r
redundant bits to each block
 The resulting n-bit blocks are called codewords.
 n = k + r
 2^n – 2^k (illegal or invaild codewords)
BLOCK CODING cont……
 An error-detecting code can detect only the types of
errors for which it is designed; other types of errors
may remain undetected.
PARITY CHECK
Parity Check
The simplest error-detecting scheme is to append a
parity bit to the end of a block of data. A typical
example is character transmission, in which a parity
bit is attached to each 7-bit IRA character. The value of
this bit is selected so that the character has an even
number of 1s (even parity) or an odd number of 1s
(odd parity).
HAMMING DISTANCE
 Is the number of difference between the
corresponding bits. d(x,y)
 The minimum Hamming distance is the smallest
Hamming distance between all possible pairs in a set
of words.
 Any coding scheme needs at least three parameters
HAMMING DISTANCE cont…..
(i)Code word size n
(ii)Data word size k
(iii)d min
 The hamming distance between the sent and
received code words is the number of bits affected
 To guarantee the detection of up to s errors in all
cases, the minimum
 Hamming distance in a block code must be dmin= s
+ 1.
CYCLIC REDUNDANCY CHECKING
One of the most common, and one of the most
powerful, error-detecting codes is the cyclic
redundancy check (CRC), which can be described as
follows. Given a k-bit block of bits, or message the
transmitter generates an (n-k) bit sequence, known as
a frame check sequence (FCS), such that the resulting
frame, consisting of n bits, is exactly divisible by some
predetermined number. The receiver then divides the
incoming frame by that number and, if there is no
remainder, assumes there was no
Error.
CHECKSUM
 CHECKSUM is another relatively simple form of
redundancy error checking where each character has
a numerical value assigned to it. The characters
within a message are combined together to produce
an error-checking character (checksum), which can
be as simple as the arithmetic sum of the numerical
values of all the characters in the message.
FORWARD ERROR CORRECTION
Forward error correction (FEC) is the only error-
correction scheme that actually detects and corrects
transmission errors when they are received without
requiring a retransmission.
With FEC, redundant bits are added to the message
before transmission. When an error is
detected, the redundant bits are used to determine
which bit is in error

More Related Content

What's hot (20)

PPSX
Lect 2 ARM processor architecture
Dr.YNM
 
PDF
Error detection & correction codes
Revathi Subramaniam
 
PPTX
Error Detection & Error Correction Codes
ShahDhruv21
 
PPSX
Error control
selvakumar_b1985
 
PPTX
Capcitive parasitics in mos
Niaz Shaikh
 
PPT
Adc dac converter
parmarurvashi
 
PPTX
Delta modulation
mpsrekha83
 
PPTX
Serial Communication
UshaRani289
 
PPTX
Interrupts on 8086 microprocessor by vijay kumar.k
Vijay Kumar
 
PPTX
BIT Error Rate
Pawan Kumar Tiwari
 
PPTX
Serial Communication in 8051
Sudhanshu Janwadkar
 
PPT
PULSE CODE MODULATION (PCM)
vishnudharan11
 
DOCX
Half adder layout design
Thevenin Norton TOng
 
PPTX
Convolution Codes
Pratishtha Ram
 
PPTX
Data encoding and modulation
Shankar Gangaju
 
PPTX
COMPACT DISC AND CD PLAYER OPERATION.pptx
rk4024
 
PDF
Memory interfacing of microcontroller 8051
Nilesh Bhaskarrao Bahadure
 
PPTX
PLDs
VisualBee.com
 
Lect 2 ARM processor architecture
Dr.YNM
 
Error detection & correction codes
Revathi Subramaniam
 
Error Detection & Error Correction Codes
ShahDhruv21
 
Error control
selvakumar_b1985
 
Capcitive parasitics in mos
Niaz Shaikh
 
Adc dac converter
parmarurvashi
 
Delta modulation
mpsrekha83
 
Serial Communication
UshaRani289
 
Interrupts on 8086 microprocessor by vijay kumar.k
Vijay Kumar
 
BIT Error Rate
Pawan Kumar Tiwari
 
Serial Communication in 8051
Sudhanshu Janwadkar
 
PULSE CODE MODULATION (PCM)
vishnudharan11
 
Half adder layout design
Thevenin Norton TOng
 
Convolution Codes
Pratishtha Ram
 
Data encoding and modulation
Shankar Gangaju
 
COMPACT DISC AND CD PLAYER OPERATION.pptx
rk4024
 
Memory interfacing of microcontroller 8051
Nilesh Bhaskarrao Bahadure
 

Similar to Parity check, redundancy, and errors (20)

PPT
13-DataLink_02.ppt
WinterSnow16
 
PDF
Data links
EshaAfzal5
 
PPTX
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
PPTX
DCN Error Detection & Correction
Rohan Bhatkar
 
PPTX
V semester, computer networks BCS502 Module-2_DataLinkLayer
ambikavenkatesh2
 
PPTX
Error control coding
Mohammad Bappy
 
PDF
cn computer netwok module 1 computer nep
samarthsoni10
 
PDF
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
PDF
Error Control Coding -Introduction
Burdwan University
 
PPT
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
PDF
Error detection and correction
Sisir Ghosh
 
PPT
111111111111111111111111111111111111lect5.ppt
AlexN42
 
PPT
lect5.ppt
DrDeepakBhatia
 
PPT
error control coding
Suhad Malayshi
 
PPTX
chp2 - data link layer.pptx
Chakra Pani
 
PPTX
Unit-4.pptx
4NM19EC140ROHITHUACH
 
PPT
chap10..................................ppt
hasan2305101837
 
PDF
Survey on Error Control Coding Techniques
IJTET Journal
 
PPTX
Data Communications- Unit-4.pptx
HrushikeshDandu
 
13-DataLink_02.ppt
WinterSnow16
 
Data links
EshaAfzal5
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
DCN Error Detection & Correction
Rohan Bhatkar
 
V semester, computer networks BCS502 Module-2_DataLinkLayer
ambikavenkatesh2
 
Error control coding
Mohammad Bappy
 
cn computer netwok module 1 computer nep
samarthsoni10
 
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Asoa Anaaba Joseph
 
Error Control Coding -Introduction
Burdwan University
 
Channel Coding (Error Control Coding)
Ola Mashaqi @ an-najah national university
 
Error detection and correction
Sisir Ghosh
 
111111111111111111111111111111111111lect5.ppt
AlexN42
 
lect5.ppt
DrDeepakBhatia
 
error control coding
Suhad Malayshi
 
chp2 - data link layer.pptx
Chakra Pani
 
chap10..................................ppt
hasan2305101837
 
Survey on Error Control Coding Techniques
IJTET Journal
 
Data Communications- Unit-4.pptx
HrushikeshDandu
 
Ad

Recently uploaded (20)

PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PDF
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
The AI Trust Gap: Consumer Attitudes to AI-Generated Content
Exploding Topics
 
PPTX
MSadfadsfafdadfccadradfT_Presentation.pptx
pahalaedward2
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
PDF
GEO Strategy 2025: Complete Presentation Deck for AI-Powered Customer Acquisi...
Zam Man
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
PDF
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
Different Generation Of Computers .pptx
divcoder9507
 
How tech helps people in the modern era.
upadhyayaryan154
 
The AI Trust Gap: Consumer Attitudes to AI-Generated Content
Exploding Topics
 
MSadfadsfafdadfccadradfT_Presentation.pptx
pahalaedward2
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
GEO Strategy 2025: Complete Presentation Deck for AI-Powered Customer Acquisi...
Zam Man
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Ad

Parity check, redundancy, and errors

  • 2. TABLE OF CONTENTS  COVER PAGE………………………….slide 01  NAMES OF PARTICIPANTS…………. slide 03  TYPES OF ERRORS………………….. Slide 04  REDUNDANCY………………………. Slide 05  ERROR DETECTION AND CORRECTION slide 06
  • 3. TYPES OF ERRORS 1) SINGLE BIT ERROR The term single-bit error means that only 1 bit of a given data unit (such as a byte, character, or packet) is changed from 1 to 0 or from 0 to 1.
  • 4. TYPES OF ERRORS cont… BURST ERROR The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1.
  • 5. REDUNDANCY The central concept in detecting or correcting errors.  To be able to detect or correct errors, we need to send some extra bits with our data.  These redundant bits are added by the sender and removed by the receiver.  Their presence allows the receiver to detect or correct corrupted bits.
  • 6. ERROR DETECTION AND ERROR CORRECTION ERROR DETECTION is the process of monitoring data transmission and determining when errors have occurred. Error- detection techniques neither correct errors nor identify which bits are in error they indicate only when an error has occurred. ERROR CORRECTION Is the process of recovering or removing errors in transmitted signal of information. This is mainly done at the receiver.
  • 7. BLOCK CODING  The message is divided into blocks  Each block is k-bits size, called dataword add r redundant bits to each block  The resulting n-bit blocks are called codewords.  n = k + r  2^n – 2^k (illegal or invaild codewords)
  • 8. BLOCK CODING cont……  An error-detecting code can detect only the types of errors for which it is designed; other types of errors may remain undetected.
  • 9. PARITY CHECK Parity Check The simplest error-detecting scheme is to append a parity bit to the end of a block of data. A typical example is character transmission, in which a parity bit is attached to each 7-bit IRA character. The value of this bit is selected so that the character has an even number of 1s (even parity) or an odd number of 1s (odd parity).
  • 10. HAMMING DISTANCE  Is the number of difference between the corresponding bits. d(x,y)  The minimum Hamming distance is the smallest Hamming distance between all possible pairs in a set of words.  Any coding scheme needs at least three parameters
  • 11. HAMMING DISTANCE cont….. (i)Code word size n (ii)Data word size k (iii)d min  The hamming distance between the sent and received code words is the number of bits affected  To guarantee the detection of up to s errors in all cases, the minimum  Hamming distance in a block code must be dmin= s + 1.
  • 12. CYCLIC REDUNDANCY CHECKING One of the most common, and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC), which can be described as follows. Given a k-bit block of bits, or message the transmitter generates an (n-k) bit sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no Error.
  • 13. CHECKSUM  CHECKSUM is another relatively simple form of redundancy error checking where each character has a numerical value assigned to it. The characters within a message are combined together to produce an error-checking character (checksum), which can be as simple as the arithmetic sum of the numerical values of all the characters in the message.
  • 14. FORWARD ERROR CORRECTION Forward error correction (FEC) is the only error- correction scheme that actually detects and corrects transmission errors when they are received without requiring a retransmission. With FEC, redundant bits are added to the message before transmission. When an error is detected, the redundant bits are used to determine which bit is in error