SlideShare une entreprise Scribd logo
1  sur  48
Data Link Layer PART III
Position of the  data-link  layer
Data link layer  duties
LLC and MAC sublayers
IEEE standards for LANs
Chapters Chapter 10   Error Detection and Correction Chapter 11   Data Link Control and Protocols Chapter 12   Point-To-Point Access Chapter 13 Multiple Access Chapter 14 Local Area Networks Chapter 15   Wireless LANs Chapter 16   Connecting LANs Chapter 17   Cellular Telephone and Satellite Networks Chapter 18   Virtual Circuit Switching
Chapter 10 Error Detection and Correction
Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note :
10.1  Types of Error Single-Bit Error Burst Error
In a single-bit error, only one bit in the data unit has changed. Note :
10.1   Single-bit error
A burst error means that 2 or more bits in the data unit have changed. Note :
10.2   Burst error of length 5
10.2  Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note :
10.3   Redundancy
10.4   Detection methods
10.5   Even-parity concept
In parity check, a parity bit is added to every data unit so that the total number of 1s is even  (or odd for odd-parity). Note :
Example 1 Suppose the sender wants to send the word  world . In ASCII the five characters are coded as  1110111  1101111  1110010  1101100  1100100 The following shows the actual bits sent 1110111 0   1101111 0   1110010 0   1101100 0   1100100 1
Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission.  11101110  11011110  11100100  11011000  11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
Example 3 Now suppose the word world in Example 1 is corrupted during transmission.  11111110  11011110  11101100  11011000  11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note :
10.6   Two-dimensional parity
Example 4 Suppose the following block is sent: 10101001  00111001  11011101  11100111  10101010  However, it is hit by a burst noise of length 8, and some bits are corrupted.  1010 0011   1000 1001  11011101  11100111  10101010  When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011  10001001  11011101  11100111  1 0 101 0 1 0
In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note :
10.7   CRC generator and checker
10.8   Binary division in a CRC generator
10.9   Binary division in CRC checker
10.10   A polynomial
10.11   A polynomial representing a divisor
Table 10.1  Standard polynomials x 32   +   x 26  +   x 23   +   x 22   +   x 16   +   x 12   +   x 11   +   x 10   +  x 8  +   x 7   +   x 5   +   x 4   +   x 2   +   x  +  1 x 16   +   x 12   +   x 5  +  1 x 10   +   x 9  +   x 5  +   x 4  +   x  2   +  1 x 8  +   x 2  +   x   +  1 Polynomial LANs ITU-32 HDLC ITU-16 ATM AAL CRC-10 ATM header CRC-8 Application Name
Example 5 It is obvious that we cannot choose  x  (binary 10) or  x 2  + x  (binary 110) as the polynomial because both are divisible by x. However, we can choose  x + 1  (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose  x 2  + 1  (binary 101) because it is divisible by x + 1 (binary division).
Example 6 The CRC-12  x 12  + x 11  + x 3  + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
10.12   Checksum
10.13   Data unit and checksum
[object Object],[object Object],[object Object],[object Object],[object Object],Note :
[object Object],[object Object],[object Object],[object Object],[object Object],Note :
Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits.  10101001  00111001  The numbers are added using one’s complement 10101001  00111001   ------------ Sum   11100010 Checksum  00011101 The pattern sent is  10101001  00111001  00011101
Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error.  10101001  00111001  00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error.  10101001 00111001  00011101  Sum 11111111  Complement  00000000   means that the pattern is OK.
Example 9 Now suppose there is a burst error of length 5 that affects 4 bits.  10101 111   11 111001  00011101 When the receiver adds the three sections, it gets  10101111 11111001  00011101  Partial Sum  1  11000101 Carry   1 Sum 11000110  Complement  00111001   the pattern is corrupted.
10.3  Correction Retransmission Forward Error Correction Burst Error Correction
Table 10.2  Data and redundancy bits 11 4 7 7 3 4 9 4 5 10 4 6 3 3 2 Number of  redundancy bits r 6 3 5 2 3 1 Total  bits m + r Number of data bits m
10.14   Positions of redundancy bits in Hamming code
10.15   Redundancy bits calculation
10.16   Example of redundancy bit calculation
10.17   Error detection using Hamming code
10.18   Burst error correction example

Contenu connexe

Tendances

Tendances (20)

Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Transport layer
Transport layer Transport layer
Transport layer
 
Ch 26
Ch 26Ch 26
Ch 26
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Token bus
Token busToken bus
Token bus
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
3.Fixed-Floating Point.ppt
3.Fixed-Floating Point.ppt3.Fixed-Floating Point.ppt
3.Fixed-Floating Point.ppt
 
Ipref
IprefIpref
Ipref
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Check sum
Check sumCheck sum
Check sum
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 

En vedette (20)

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
 
Even odd parity
Even odd parityEven odd parity
Even odd parity
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 16
Ch 16Ch 16
Ch 16
 
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 24
Ch 24Ch 24
Ch 24
 
Parity bits
Parity bitsParity bits
Parity bits
 
Ch 18
Ch 18Ch 18
Ch 18
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 14
Ch 14Ch 14
Ch 14
 

Similaire à Ch 10

Similaire à Ch 10 (20)

network
networknetwork
network
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Data link layar
Data link layarData link layar
Data link layar
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Computer Networks Module II
Computer Networks Module IIComputer Networks Module II
Computer Networks Module II
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
ch10.ppt
ch10.pptch10.ppt
ch10.ppt
 
Error Detect and Correct.ppt
Error Detect and Correct.pptError Detect and Correct.ppt
Error Detect and Correct.ppt
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Ch10
Ch10Ch10
Ch10
 
Ch10
Ch10Ch10
Ch10
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Ch10
Ch10Ch10
Ch10
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Ch10
Ch10Ch10
Ch10
 

Plus de soumya ranjan mohanty (18)

Ch 30
Ch 30Ch 30
Ch 30
 
Ch 25
Ch 25Ch 25
Ch 25
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 1
Ch 1Ch 1
Ch 1
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Ch 10

  • 1. Data Link Layer PART III
  • 2. Position of the data-link layer
  • 4. LLC and MAC sublayers
  • 6. Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control and Protocols Chapter 12 Point-To-Point Access Chapter 13 Multiple Access Chapter 14 Local Area Networks Chapter 15 Wireless LANs Chapter 16 Connecting LANs Chapter 17 Cellular Telephone and Satellite Networks Chapter 18 Virtual Circuit Switching
  • 7. Chapter 10 Error Detection and Correction
  • 8. Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Note :
  • 9. 10.1 Types of Error Single-Bit Error Burst Error
  • 10. In a single-bit error, only one bit in the data unit has changed. Note :
  • 11. 10.1 Single-bit error
  • 12. A burst error means that 2 or more bits in the data unit have changed. Note :
  • 13. 10.2 Burst error of length 5
  • 14. 10.2 Detection Redundancy Parity Check Cyclic Redundancy Check (CRC) Checksum
  • 15. Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination. Note :
  • 16. 10.3 Redundancy
  • 17. 10.4 Detection methods
  • 18. 10.5 Even-parity concept
  • 19. In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or odd for odd-parity). Note :
  • 20. Example 1 Suppose the sender wants to send the word world . In ASCII the five characters are coded as 1110111 1101111 1110010 1101100 1100100 The following shows the actual bits sent 1110111 0 1101111 0 1110010 0 1101100 0 1100100 1
  • 21. Example 2 Now suppose the word world in Example 1 is received by the receiver without being corrupted in transmission. 11101110 11011110 11100100 11011000 11001001 The receiver counts the 1s in each character and comes up with even numbers (6, 6, 4, 4, 4). The data are accepted.
  • 22. Example 3 Now suppose the word world in Example 1 is corrupted during transmission. 11111110 11011110 11101100 11011000 11001001 The receiver counts the 1s in each character and comes up with even and odd numbers (7, 6, 5, 4, 4). The receiver knows that the data are corrupted, discards them, and asks for retransmission.
  • 23. Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors in each data unit is odd. Note :
  • 24. 10.6 Two-dimensional parity
  • 25. Example 4 Suppose the following block is sent: 10101001 00111001 11011101 11100111 10101010 However, it is hit by a burst noise of length 8, and some bits are corrupted. 1010 0011 1000 1001 11011101 11100111 10101010 When the receiver checks the parity bits, some of the bits do not follow the even-parity rule and the whole block is discarded. 10100011 10001001 11011101 11100111 1 0 101 0 1 0
  • 26. In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is added to the whole block. Note :
  • 27. 10.7 CRC generator and checker
  • 28. 10.8 Binary division in a CRC generator
  • 29. 10.9 Binary division in CRC checker
  • 30. 10.10 A polynomial
  • 31. 10.11 A polynomial representing a divisor
  • 32. Table 10.1 Standard polynomials x 32 + x 26 + x 23 + x 22 + x 16 + x 12 + x 11 + x 10 + x 8 + x 7 + x 5 + x 4 + x 2 + x + 1 x 16 + x 12 + x 5 + 1 x 10 + x 9 + x 5 + x 4 + x 2 + 1 x 8 + x 2 + x + 1 Polynomial LANs ITU-32 HDLC ITU-16 ATM AAL CRC-10 ATM header CRC-8 Application Name
  • 33. Example 5 It is obvious that we cannot choose x (binary 10) or x 2 + x (binary 110) as the polynomial because both are divisible by x. However, we can choose x + 1 (binary 11) because it is not divisible by x, but is divisible by x + 1. We can also choose x 2 + 1 (binary 101) because it is divisible by x + 1 (binary division).
  • 34. Example 6 The CRC-12 x 12 + x 11 + x 3 + x + 1 which has a degree of 12, will detect all burst errors affecting an odd number of bits, will detect all burst errors with a length less than or equal to 12, and will detect, 99.97 percent of the time, burst errors with a length of 12 or more.
  • 35. 10.12 Checksum
  • 36. 10.13 Data unit and checksum
  • 37.
  • 38.
  • 39. Example 7 Suppose the following block of 16 bits is to be sent using a checksum of 8 bits. 10101001 00111001 The numbers are added using one’s complement 10101001 00111001 ------------ Sum 11100010 Checksum 00011101 The pattern sent is 10101001 00111001 00011101
  • 40. Example 8 Now suppose the receiver receives the pattern sent in Example 7 and there is no error. 10101001 00111001 00011101 When the receiver adds the three sections, it will get all 1s, which, after complementing, is all 0s and shows that there is no error. 10101001 00111001 00011101 Sum 11111111 Complement 00000000 means that the pattern is OK.
  • 41. Example 9 Now suppose there is a burst error of length 5 that affects 4 bits. 10101 111 11 111001 00011101 When the receiver adds the three sections, it gets 10101111 11111001 00011101 Partial Sum 1 11000101 Carry 1 Sum 11000110 Complement 00111001 the pattern is corrupted.
  • 42. 10.3 Correction Retransmission Forward Error Correction Burst Error Correction
  • 43. Table 10.2 Data and redundancy bits 11 4 7 7 3 4 9 4 5 10 4 6 3 3 2 Number of redundancy bits r 6 3 5 2 3 1 Total bits m + r Number of data bits m
  • 44. 10.14 Positions of redundancy bits in Hamming code
  • 45. 10.15 Redundancy bits calculation
  • 46. 10.16 Example of redundancy bit calculation
  • 47. 10.17 Error detection using Hamming code
  • 48. 10.18 Burst error correction example