chapter 10 error detection and correctionfaculty.wiu.edu/y-kim2/net321f11ch10.pdf10.2 data can be...

21
10.1 Chapter 10 Error Detection and Correction

Upload: others

Post on 25-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.1

Chapter 10

Error Detection and

Correction

Page 2: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.2

Data can be corrupted during transmission.

Some applications require that errors be detected and corrected.

Note

Page 3: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.3

In a single-bit error, only 1 bit in the data unit has changed.

Note

Page 4: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.4

Figure 10.1 Single-bit error

Page 5: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.5

A burst error means that 2 or more bits in the data unit have changed.

Note

Page 6: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.6

Figure 10.2 Burst error of length 8

Page 7: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.7

To detect or correct errors, we need to send extra (redundant) bits with data.

Note

Page 8: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.8

Figure 10.3 The structure of encoder and decoder

Page 9: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.9

In modulo-N arithmetic, we use only the integers in the range 0 to N −1, inclusive.

Note

Page 10: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.10

Figure 10.4 XORing of two single bits or two words

Page 11: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.11

A simple parity-check code

Note

Page 12: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.12

Figure 10.11 Two-dimensional parity-check code

Page 13: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.13

Figure 10.11 Two-dimensional parity-check code

Page 14: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.14

Figure 10.11 Two-dimensional parity-check code

Page 15: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.15

Figure 10.15 Division in CRC encoder

Page 16: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.16

Figure 10.16 Division in the CRC decoder for two cases

Page 17: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.17

Figure 10.21 A polynomial to represent a binary word

Page 18: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.18

Figure 10.22 CRC division using polynomials

Page 19: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.19

The divisor in a cyclic code is normally called the generator polynomial

or simply the generator.

Note

Page 20: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.20

Table 10.7 Standard polynomials

Page 21: Chapter 10 Error Detection and Correctionfaculty.wiu.edu/Y-Kim2/NET321F11ch10.pdf10.2 Data can be corrupted during transmission. Some applications require that errors be detected and

10.21

10-5 CHECKSUM

The last error detection method we discuss here iscalled the checksum. The checksum is used in theInternet by several protocols although not at the datalink layer. However, we briefly discuss it here tocomplete our discussion on error checking

IdeaOne’s ComplementInternet Checksum

Topics discussed in this section: