SlideShare une entreprise Scribd logo
1  sur  25
Networks

And Communication Systems
Protocols
• Defined as a set of rules for communication
Handshaking
• 2 devices will “shake” hands to establish
  what kind of protocol to use. This involves
  things like:
• Are you ready for communication? (session
  level)
• What speed can you talk at ( Application
  level. flow control)
Handshaking example with printer


• Session level in which contact is established

               Are you ready for a print job?




                        Sorry I’m offline
Handshaking: Application level
       (Flow Control)
       Starting to send 50 page print
                     job




        Please send ½ page at a time.
         I am a cheap printer with a
         small cache and slow print
                   speed.
Error checking methods
• When data is sent, it can get damaged or
  lost or corrupted. Therefore data must be
  somehow checked for correctness.
What happens when things go
         wrong?
First we have to find if something
         has gone wrong
• Error detection is the most important step in
  the process of getting correct data. How do
  we detect an error?
Summary!
For the exam, you must therefore think of it in 2 parts
1) Error Detection
2) Error Correction
Error Detection
• Parity check
• Checksum
• Cyclic Redundancy Check
Parity Check
                parity “to be equivalent to or the same”
A byte of information is made of 8 bits
The first 7 bits are used to transmit data, the 8 th bit is added to mark
the total number of 1s as either odd or even. It is then used to check
if the data is correct. (It is the number of 1s that is checked)
Odd & Even Parity in use


Example of even parity                Parity Bit of 0 is added to keep the
                                      total number of 1s as even
10101010

        10000111                      Parity Bit of 1 is added to
                                      keep the totals # of 1s as
                                      even.



Example of odd parity

                                      Parity bit of 0 is added to
      11100000                        keep the total # of 1s as odd



                                       In this case a 1 is added to keep
      11000001                         the total number of 1s as odd
Even and Odd Parity
• Parity can be set at even or odd
Parity in use…
         Suppose we send the letter A in ASCII. It might
              consist of the following 7 0s and 1s

        1001101                              0

If we count the 1s, there are 4       The last 8th bit is used to indicate
which is an even number               that there was an even number
                                      of 1s

   If the A is corrupted and arrives with an odd number of 1s


      1001100                              0
If we count the 1s, there are      This indicates that the number of 1s should be even.
now 3 which is an odd number       Therefore an error has taken place.
Problems with Parity
If more than one error occurs then it
 might cancel the check out. This is
      known as “bit swapping”
  The parity bit may be corrupted,
       changing the end result.
  More than one error could occur
within the first seven bits, cancelling
     out the detectable error (bit
              swapping)
Parity problems

  Original
                       1001101              0
 Received with 1
 detected error        1001100               0

Cannot detect 2
errors as parity is    1001000               0
even




      The second group of bits has an even number of 1s and
      therefore it is accepted as correct.
Introduction to Checksum

    Checksum checks blocks of data made up of bytes
    rather than individual bytes.
      Entire block of data is checked using a
      checksum made up of the the last byte
                   in the block




    10101010 100101010 11101010 11101010




Added up value /256 =
Pros and Cons of Checksum

Pros: More accurate than parity. Faster as blocks of data can
  be checked.
Cons: The precise byte or bytes in error can’t be identified so
  entire block must be retransmitted.
Checking long message blocks is not reliable,
Example of Checksum




                      I run above and
   I run above        get checksum of
     and get            36 too. Data
 checksum of 36       block is correct
Cyclic Redundancy Check
• CRC is the most accurate error checking
  method.
• It uses much larger numbers than Checksum
• Like checksum it checks a block of data
• High level of accuracy with 16 bit check or
  a 32 bit check
Cyclic Redundancy Check
    The values of each of the block are read as 1 big
    number


    12                     9       18           24

00011100              00001001   00010010    00011000
           58,790,424/16 or 32 bit CRC value
             I run above                           I run above and
            and get CRC                            get CRC of 36
               of 3692                                92too. Data
                                                   block is correct
Error Correction
• When an error is detected using Parity,
  Checksum or CRC, then the error must be
  corrected.
Methods of Error Correction
• Retransmission – The receiving computer
  having detected the error requests that the
  data block be transmitted again.
           I got an error, please send
              that last block again!




                                Retransmit
Symbol Substitution
• The receiving computer will replace faulty
  symbols with a substitute symbol such as 

It will then run a spell check to try and correct
   the data –example love you would be
   corrected to I love you. This does not
   always work.
Error Correction Code (ECC)
• ECC is a technique that sends “extra” data so that
  if there is an error, it can be corrected with the
  extra data. At least one extra byte must be sent for
  every eight bytes of data.
• Problems with this is that it is slow and much
  more data is sent overall. It is better to just resend
  each block of data that is in error,

Contenu connexe

En vedette

Mobile Research: Notetaking and Bookmarking
Mobile Research: Notetaking and BookmarkingMobile Research: Notetaking and Bookmarking
Mobile Research: Notetaking and BookmarkingShelly Sanchez Terrell
 

En vedette (18)

Vb dot net_hatekhori
Vb dot net_hatekhoriVb dot net_hatekhori
Vb dot net_hatekhori
 
50 examples of there with rules
50 examples of there with rules50 examples of there with rules
50 examples of there with rules
 
Gopal bhar er 170 hasir galpo
Gopal bhar er 170 hasir galpoGopal bhar er 170 hasir galpo
Gopal bhar er 170 hasir galpo
 
150 aesop's fables or golpo in bengali
150 aesop's fables or golpo in bengali150 aesop's fables or golpo in bengali
150 aesop's fables or golpo in bengali
 
Computer chamak
Computer chamakComputer chamak
Computer chamak
 
Computer paricharja
Computer paricharjaComputer paricharja
Computer paricharja
 
Computer networking step by step
Computer networking step by stepComputer networking step by step
Computer networking step by step
 
Photoshop cs hatekhori
Photoshop cs hatekhoriPhotoshop cs hatekhori
Photoshop cs hatekhori
 
Handbook of bangla fruits tanbircox
Handbook of bangla fruits   tanbircoxHandbook of bangla fruits   tanbircox
Handbook of bangla fruits tanbircox
 
Banking interview for experienced banker
Banking interview for experienced bankerBanking interview for experienced banker
Banking interview for experienced banker
 
Easy way to learn english spelling and pronunciation
Easy way to learn english spelling and pronunciationEasy way to learn english spelling and pronunciation
Easy way to learn english spelling and pronunciation
 
Duschintahin notun jibon dale carnegie final
Duschintahin notun jibon dale carnegie finalDuschintahin notun jibon dale carnegie final
Duschintahin notun jibon dale carnegie final
 
Information and communication technology for hsc
Information and communication technology for hscInformation and communication technology for hsc
Information and communication technology for hsc
 
Bere uthi ashtar sathe (girls)
Bere uthi ashtar sathe (girls)Bere uthi ashtar sathe (girls)
Bere uthi ashtar sathe (girls)
 
Mobile Research: Notetaking and Bookmarking
Mobile Research: Notetaking and BookmarkingMobile Research: Notetaking and Bookmarking
Mobile Research: Notetaking and Bookmarking
 
Health benefits and medicinal properties of bd fruits
Health benefits and medicinal properties of bd fruitsHealth benefits and medicinal properties of bd fruits
Health benefits and medicinal properties of bd fruits
 
Saltamami 2016 by tanbircox
Saltamami 2016 by tanbircoxSaltamami 2016 by tanbircox
Saltamami 2016 by tanbircox
 
Sahih bukhari shareef bangla unicode text
Sahih bukhari shareef bangla unicode textSahih bukhari shareef bangla unicode text
Sahih bukhari shareef bangla unicode text
 

Similaire à Information Processes and Technology HSC Communications Unit

ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptxBeniamTekeste
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxgadisaAdamu
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Project Student
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codesGargiKhanna1
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
Computer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdfComputer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdfSushantRaj25
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and CorrectionTarjMehta1
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrcHuawei Technologies
 
Error detection.
Error detection.Error detection.
Error detection.Wasim Akbar
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionAbdul Razaq
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correctionfg657
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and CorrectionMahesh Kumar Attri
 

Similaire à Information Processes and Technology HSC Communications Unit (20)

ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Error.pdf
Error.pdfError.pdf
Error.pdf
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Sak
SakSak
Sak
 
Computer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdfComputer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdf
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Error detection.
Error detection.Error detection.
Error detection.
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error control
Error controlError control
Error control
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 

Dernier

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Information Processes and Technology HSC Communications Unit

  • 2. Protocols • Defined as a set of rules for communication
  • 3. Handshaking • 2 devices will “shake” hands to establish what kind of protocol to use. This involves things like: • Are you ready for communication? (session level) • What speed can you talk at ( Application level. flow control)
  • 4. Handshaking example with printer • Session level in which contact is established Are you ready for a print job? Sorry I’m offline
  • 5. Handshaking: Application level (Flow Control) Starting to send 50 page print job Please send ½ page at a time. I am a cheap printer with a small cache and slow print speed.
  • 6. Error checking methods • When data is sent, it can get damaged or lost or corrupted. Therefore data must be somehow checked for correctness.
  • 7. What happens when things go wrong?
  • 8. First we have to find if something has gone wrong • Error detection is the most important step in the process of getting correct data. How do we detect an error?
  • 9. Summary! For the exam, you must therefore think of it in 2 parts 1) Error Detection 2) Error Correction
  • 10. Error Detection • Parity check • Checksum • Cyclic Redundancy Check
  • 11. Parity Check parity “to be equivalent to or the same” A byte of information is made of 8 bits The first 7 bits are used to transmit data, the 8 th bit is added to mark the total number of 1s as either odd or even. It is then used to check if the data is correct. (It is the number of 1s that is checked)
  • 12. Odd & Even Parity in use Example of even parity Parity Bit of 0 is added to keep the total number of 1s as even 10101010 10000111 Parity Bit of 1 is added to keep the totals # of 1s as even. Example of odd parity Parity bit of 0 is added to 11100000 keep the total # of 1s as odd In this case a 1 is added to keep 11000001 the total number of 1s as odd
  • 13. Even and Odd Parity • Parity can be set at even or odd
  • 14. Parity in use… Suppose we send the letter A in ASCII. It might consist of the following 7 0s and 1s 1001101 0 If we count the 1s, there are 4 The last 8th bit is used to indicate which is an even number that there was an even number of 1s If the A is corrupted and arrives with an odd number of 1s 1001100 0 If we count the 1s, there are This indicates that the number of 1s should be even. now 3 which is an odd number Therefore an error has taken place.
  • 15. Problems with Parity If more than one error occurs then it might cancel the check out. This is known as “bit swapping” The parity bit may be corrupted, changing the end result. More than one error could occur within the first seven bits, cancelling out the detectable error (bit swapping)
  • 16. Parity problems Original 1001101 0 Received with 1 detected error 1001100 0 Cannot detect 2 errors as parity is 1001000 0 even The second group of bits has an even number of 1s and therefore it is accepted as correct.
  • 17. Introduction to Checksum Checksum checks blocks of data made up of bytes rather than individual bytes. Entire block of data is checked using a checksum made up of the the last byte in the block 10101010 100101010 11101010 11101010 Added up value /256 =
  • 18. Pros and Cons of Checksum Pros: More accurate than parity. Faster as blocks of data can be checked. Cons: The precise byte or bytes in error can’t be identified so entire block must be retransmitted. Checking long message blocks is not reliable,
  • 19. Example of Checksum I run above and I run above get checksum of and get 36 too. Data checksum of 36 block is correct
  • 20. Cyclic Redundancy Check • CRC is the most accurate error checking method. • It uses much larger numbers than Checksum • Like checksum it checks a block of data • High level of accuracy with 16 bit check or a 32 bit check
  • 21. Cyclic Redundancy Check The values of each of the block are read as 1 big number 12 9 18 24 00011100 00001001 00010010 00011000 58,790,424/16 or 32 bit CRC value I run above I run above and and get CRC get CRC of 36 of 3692 92too. Data block is correct
  • 22. Error Correction • When an error is detected using Parity, Checksum or CRC, then the error must be corrected.
  • 23. Methods of Error Correction • Retransmission – The receiving computer having detected the error requests that the data block be transmitted again. I got an error, please send that last block again! Retransmit
  • 24. Symbol Substitution • The receiving computer will replace faulty symbols with a substitute symbol such as  It will then run a spell check to try and correct the data –example love you would be corrected to I love you. This does not always work.
  • 25. Error Correction Code (ECC) • ECC is a technique that sends “extra” data so that if there is an error, it can be corrected with the extra data. At least one extra byte must be sent for every eight bytes of data. • Problems with this is that it is slow and much more data is sent overall. It is better to just resend each block of data that is in error,