SlideShare uma empresa Scribd logo
1 de 20
DATA COMMUNICATIONS &
NETWORKING
                LECTURE-
20

          Course Instructor : Sehrish Rafiq
          Department Of Computer Science
          University Of Peshawar
LECTURE OVERVIEW
 Error detection
 Parity Check

 Simple Parity Check

 Two Dimensional Parity Check

 Performance of each
ERROR DETECTION
ERROR DETECTION METHODS
REDUNDANCY
   The concept of including extra information in the
    transmission for error detection is called
    redundancy.

   Instead of repeating the entire data stream,a
    shorter group of bits may be appended to the end
    of each unit.

   The technique is called redundancy because the
    extra bits are redundant to the information.
REDUNDANCY
   These extra bits are discarded as soon as the
    accuracy of the transmission has been
    determined.

   All Error Detection mechanisms use the concept
    of redundancy which means adding extra bits for
    detecting errors.
REDUNDANCY
ERROR DETECTION METHODS
PARITY CHECK
   The most common and least expensive
    mechanism for error detection is the parity
    check.

   Parity checking can be
   simple
     OR
   two-dimensional.
SIMPLE PARITY CHECK
                   OR
     VERTICAL REDUNDANCY CHECK(VRC)
 In this technique, the redundant bit called a
  parity bit.
 A parity bit is added to every data unit so that
  the total number of 1s in the unit(including the
  parity bit) becomes even(or odd).
EVEN PARITY CONCEPT
Example
 1
Suppose the sender wants to send the word world. In
ASCII the five characters are coded as
1110111 1101111 1110010 1101100
1100100
   w           o         r            l         d
The following shows the actual bits sent
11101110 11011110 11100100 11011000 11001001
EXAMPLE 1 CONTINUED…
   Now suppose the word world in Example 1 is received
    by the receiver without being corrupted in transmission.


   11101110 11011110 11100100 11011000 11001001
      w            o           r           l          d
   The receiver counts the 1s in each character and comes
    up with even numbers (6, 6, 4, 4, 4). The data are
    accepted.
EXAMPLE 1 CONTINUED…
   Now suppose the word world in Example 1 is corrupted
    during transmission.
   11111110 11011110 11101100 11011000 11001001
   The receiver counts the 1s in each character and comes
    up with even and odd numbers (7, 6, 5, 4, 4). The
    receiver knows that the data are corrupted, discards
    them, and asks for retransmission.
PERFORMANCE OF VRC OR SIMPLE
       PARITY CHECK
   Simple parity check can detect all single-bit
    errors.

   It can also detect burst errors as long as the total
    number of bits changed is odd.

   It cannot detect burst errors where the number of
    bits changed is even.
TWO DIMENSIONAL PARITY CHECK
                  OR
    LONGITUDINAL REDUNDANCY CHECK
 In this method a block of bits is organized in a
  table(rows and columns).
 First we calculate the parity bit for each data
  unit.
 Then the data is organized in to a table.

 Then a parity bit for each column is calculated.

 This creates a new row.

 This new row contains the parity bits for the
  whole block.
 Then this new row is attached to the original
  data and sent to the receiver.
TWO-DIMENSIONAL PARITY OR
          LRC
Example 2
Suppose the following block is sent:
10101001 00111001 11011101 11100111
10101010


However, it is hit by a burst noise of length 8, and some
bits are corrupted.
10100011 10001001 11011101 11100111
10101010


When the receiver checks the parity bits, some of the bits
do not follow the even-parity rule and the whole block is
PERFORMANCE OF LRC
 A redundancy of n bits can detect a burst error of
  n bits.
 A burst error of more than n bits is also detected
  with a very high probability .(99.97%)
 However if 2 bits in one data unit are damaged
  and two bits in exactly the same positions in
  another data unit are also damaged ,the checker
  will not detect the error.
ENOUGH FOR TODAY!!!

Mais conteúdo relacionado

Mais procurados

Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
Ankan Adhikari
 
Flow control and error control
Flow control and error controlFlow control and error control
Flow control and error control
BHUVIJAYAVELU
 

Mais procurados (20)

Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
Error correction and Detection technique while sending the message
Error correction and Detection technique while sending the messageError correction and Detection technique while sending the message
Error correction and Detection technique while sending the message
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Check sum
Check sumCheck sum
Check sum
 
Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Flow control and error control
Flow control and error controlFlow control and error control
Flow control and error control
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Channel Coding (Digital communication)
Channel Coding (Digital communication)Channel Coding (Digital communication)
Channel Coding (Digital communication)
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 

Destaque

Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
Huawei Technologies
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 

Destaque (20)

Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Even odd parity
Even odd parityEven odd parity
Even odd parity
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Ch10
Ch10Ch10
Ch10
 
Parity bits
Parity bitsParity bits
Parity bits
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Checksum 101
Checksum 101Checksum 101
Checksum 101
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Ch 10
Ch 10Ch 10
Ch 10
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 

Semelhante a Lecture 20

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
Mahesh Kumar Attri
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
BeniamTekeste
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
Error detection.
Error detection.Error detection.
Error detection.
Wasim Akbar
 

Semelhante a Lecture 20 (20)

Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
network
networknetwork
network
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection.
Error detection.Error detection.
Error detection.
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt901325_chapter 10 (1).ppt
901325_chapter 10 (1).ppt
 
Error Detection and Correction.ppt
Error Detection and Correction.pptError Detection and Correction.ppt
Error Detection and Correction.ppt
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Error detection and correction.ppt
Error detection and correction.pptError detection and correction.ppt
Error detection and correction.ppt
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
 

Mais de Sehrish Rafiq

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 

Mais de Sehrish Rafiq (19)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Lecture 20

  • 1. DATA COMMUNICATIONS & NETWORKING LECTURE- 20 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. LECTURE OVERVIEW  Error detection  Parity Check  Simple Parity Check  Two Dimensional Parity Check  Performance of each
  • 5. REDUNDANCY  The concept of including extra information in the transmission for error detection is called redundancy.  Instead of repeating the entire data stream,a shorter group of bits may be appended to the end of each unit.  The technique is called redundancy because the extra bits are redundant to the information.
  • 6. REDUNDANCY  These extra bits are discarded as soon as the accuracy of the transmission has been determined.  All Error Detection mechanisms use the concept of redundancy which means adding extra bits for detecting errors.
  • 9. PARITY CHECK  The most common and least expensive mechanism for error detection is the parity check.  Parity checking can be  simple OR  two-dimensional.
  • 10. SIMPLE PARITY CHECK OR VERTICAL REDUNDANCY CHECK(VRC)  In this technique, the redundant bit called a parity bit.  A parity bit is added to every data unit so that the total number of 1s in the unit(including the parity bit) becomes even(or odd).
  • 12. Example 1 Suppose the sender wants to send the word world. In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 w o r l d The following shows the actual bits sent 11101110 11011110 11100100 11011000 11001001
  • 13. EXAMPLE 1 CONTINUED…  Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.  11101110 11011110 11100100 11011000 11001001  w o r l d  The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
  • 14. EXAMPLE 1 CONTINUED…  Now suppose the word world in Example 1 is corrupted during transmission.  11111110 11011110 11101100 11011000 11001001  The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
  • 15. PERFORMANCE OF VRC OR SIMPLE PARITY CHECK  Simple parity check can detect all single-bit errors.  It can also detect burst errors as long as the total number of bits changed is odd.  It cannot detect burst errors where the number of bits changed is even.
  • 16. TWO DIMENSIONAL PARITY CHECK OR LONGITUDINAL REDUNDANCY CHECK  In this method a block of bits is organized in a table(rows and columns).  First we calculate the parity bit for each data unit.  Then the data is organized in to a table.  Then a parity bit for each column is calculated.  This creates a new row.  This new row contains the parity bits for the whole block.  Then this new row is attached to the original data and sent to the receiver.
  • 18. Example 2 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 10100011 10001001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is
  • 19. PERFORMANCE OF LRC  A redundancy of n bits can detect a burst error of n bits.  A burst error of more than n bits is also detected with a very high probability .(99.97%)  However if 2 bits in one data unit are damaged and two bits in exactly the same positions in another data unit are also damaged ,the checker will not detect the error.