module 7
DESCRIPTION
MODULE 7. ERROR DETECTION. TRANSMISSION ERRORS. Transmission errors are caused by: thermal noise {Shannon} impulse noise (e..g, arcing relays) signal distortion during transmission (attenuation) crosstalk voice amplitude signal compression (companding) quantization noise (PCM) - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/1.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 1
MODULE 7
ERROR DETECTION
![Page 2: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/2.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 2
TRANSMISSION ERRORSTransmission errors are caused by:– thermal noise {Shannon}– impulse noise (e..g, arcing relays)– signal distortion during transmission
(attenuation)– crosstalk– voice amplitude signal compression
(companding)– quantization noise (PCM)– jitter (variations in signal timings)– receiver and transmitter out of synch
![Page 3: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/3.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 3
OBJECTIVES:
1. Introduce Data Communications2. Define Data Communication
Codes3. Discuss the Types of Data
Transmission andTypes of Errors
4. Explain Error Detection Schemes
![Page 4: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/4.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 4
DATA COMMUNICATIONS
- It is the process of transferring digital information (usually binary form) between two or more points
![Page 5: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/5.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 5
FORMS OF DATA
a. Alphabetical informationb. Numeric informationc. Symbolic information
![Page 6: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/6.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 6
DATA CODE
- is a set of rules that translates alphanumeric characters into binary numbers
- also called character codes, character sets, character languages or symbol codes
![Page 7: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/7.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 7
DATA COMMUNICATION CODES
1. Baudot Code - 1st fixed-length character - developed for machine rather than
people - 5-bit character code primarily used for
low- speed teletype system equipment
![Page 8: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/8.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 8
DATA COMMUNICATION CODES
2. ASCII Code (American Standard for Information Interchange) - 7-bit fixed length character set - is the standard character set for source coding the alphanumeric character set that humans understand but computers do not.
![Page 9: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/9.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 9
DATA COMMUNICATION CODES
3. EBCDIC Code (Extended Binary-Coded Decimal Interchange Code)
- 8-bit fixed length character set
developed in 1962 by IBM- used almost exclusively with IBM
mainframe computers and peripheral equipment
![Page 10: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/10.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 10
DATA COMMUNICATION CODES
4. Bar Codes - is a series of vertical black bars separated
by vertical white bars (called spaces)
![Page 11: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/11.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 11
SERIAL and PARALLEL DATA TRANSMISSION
1. Parallel by bit or Serial by character
2. Serial by bit
![Page 12: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/12.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 12
SERIAL DATA TRANSMISSION
![Page 13: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/13.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 13
PARALLEL DATA TRANSMISSION
![Page 14: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/14.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 14
TYPES OR ERRORS
1. Single bit error- 1 bit of error has occurred
2. Burst error - 2 or more bits in the data unit have
changed from 1 to 0 or from 0 to 1
![Page 15: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/15.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 15
SINGLE BIT ERROR
![Page 16: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/16.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 16
BURST ERROR
![Page 17: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/17.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 17
“Error detection uses the concept of redundancy,
which means adding extra bits for detecting errors at
the destination.”
![Page 18: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/18.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 18
ERROR DETECTION
- Is the process of monitoring data transmission and determining when errors have occurred.
Purpose:“ Not to prevent error from occurring but to prevent UNDETECTED ERROR.”
![Page 19: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/19.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 19
GENERAL ERROR DETECTION SYSTEM
![Page 20: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/20.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 20
ERROR DETECTION METHODS
1. REDUNDANCY
- Transmitting each character twice
2. EXACT COUNT ENCODING
- The number of 1’s in each character is the same
![Page 21: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/21.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 21
REDUNDANCY
![Page 22: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/22.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 22
PARITY BIT
- Bit added to each character to make all bits add up to an even number (even parity) or odd number (odd parity)
![Page 23: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/23.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 23
EVEN PARITY CONCEPT
![Page 24: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/24.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 24
“Simple parity check can detect all single-bit errors. It can detect burst errors only if the total number of errors
in each data unit is odd.”
![Page 25: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/25.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 25
ERROR DETECTION METHODS
3. PARITY CHECKING
- adds 1 additional bit to each byte in the message
A) Odd ParityB) Even Parity
![Page 26: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/26.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 26
PARITY GENERATORS
I. Serial Transmission Parity Generator
II. Parallel Transmission Parity Generator
![Page 27: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/27.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 27
SERIAL TRANSMISSION PARITY GENERATOR
![Page 28: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/28.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 28
PARALLEL TRANSMISSION PARITY GENERATOR
![Page 29: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/29.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 29
PARITY CHECKING
Advantage:1. Simple
Disadvantages:1. If even number of errors has occurred it
can not be detected2. 50% efficiency
![Page 30: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/30.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 30
ERROR DETECTION METHODS
4. VRC/LRC
A) LRC - message parity
B) VRC - character parity
![Page 31: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/31.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 31
VERTICAL REDUNDANCY CHECKING
VRC entails the appending of a parity bit at the end of each transmitted character of value to create an odd or even total mathematical bit value.
![Page 32: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/32.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 32
LONGITUDINAL REDUNDANCY CHECKING OR BLOCK CHECKING CHARACTER
LRC adds another level of reliability, as data is viewed in a block or data set, as though the receiving device were viewing data set in a matrix format.
LRC adds a significant measure of reliability. Also known as checksum, the LRC is sent as an extra character at the end of each data block.
![Page 33: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/33.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 33
VRC/LRC
Advantage:1. Simple2. 98% reliability
![Page 34: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/34.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 34
EXAMPLE
Determine the VRC and LRC for the message “SANTINO”. Use ASCII Character, and also use odd parity for VRC and even parity for LRC. Determine What ASCII character is to be transmitted for checking the message.
![Page 35: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/35.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 35
“In two-dimensional parity check, a block of bits is divided into rows and a redundant row of bits is
added to the whole block.”
![Page 36: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/36.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 36
ERROR DETECTION METHODS
5. CRC
- Is generally used with 8-bit codes such as EBCDIC.
- CRC 16: most common used CRC code in US and is identical to CCITT V.41
![Page 37: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/37.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 37
CRC GENERATING CIRCUIT
![Page 38: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/38.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 38
CRC GENERATOR
![Page 39: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/39.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 39
ERROR DETECTION METHODS
5. CRC
- CRC Character is the remainder of a division process.
G(x) - data messageP(x) - generator polynomial function
![Page 40: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/40.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 40
ERROR DETECTION METHODS
CRC 16
P(x) = x16 + x12 + x5 + x0
Advantage:1. 99.95% efficiency
![Page 41: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/41.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 41
CRC ALGORITHM
1. Multiply G(x) by xn-k (puts zeros in (n-k) low order positions)
2. Divide xn-k G(x) by P(x)
3. Add remainder B(x) to xn-k G(x) (puts check bits in the n-k low order positions):
![Page 42: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/42.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 42
CRC CHECKING
1. Add the CRC to the end of G(x)
2. Divide the product obtained in Step 1 by P(x)
“The remainder of the process should be equal to 0, otherwise error has occurred.”
![Page 43: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/43.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 43
EXAMPLE
Determine the BCS for the ff data and CRC generating polynomials.
G(x) = x7 + x5 + x4 + x2 + x1 + x0
P(x) = x5 + x4 + x1 + x0
![Page 44: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/44.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 44
CRC-12 : x12 + X11 + X3 + X2 + X + 1
CRC-16: x16 + x 15 + x2 + 1
CRC-CCITT: x16 + x12 + x5 + 1
MOST COMMONLY USED CYCLICCODES GENERATOR POLYNOMIAL
![Page 45: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/45.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 45
DATA UNIT AND CHECKSUM
![Page 46: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/46.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 46
6. CHECKSUM
![Page 47: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/47.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 47
CHECKSUM ALGORITHM AT THE SENDER
The sender follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using one’s complement to get the sum.
The sum is complemented and becomes the checksum.
The checksum is sent with the data.
![Page 48: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/48.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 48
CHECKSUM ALGORITHM AT THE RECEIVER
The receiver follows these steps:
The unit is divided into k sections, each of n bits.
All sections are added using one’s complement to get the sum.
The sum is complemented.
If the result is zero, the data are accepted: otherwise, rejected.
![Page 49: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/49.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 49
EXAMPLE
Suppose the following block of 16 bits is to be sent using a checksum of 8 bits.
10101001 00111001
Determine the checksum.
Prove that the receiver can detect the error.
![Page 50: MODULE 7](https://reader036.vdocuments.us/reader036/viewer/2022062517/56813ae1550346895da332a9/html5/thumbnails/50.jpg)
4/18PREPARED BY: ENGR. JO-ANN
C. VIÑAS 50
EXAMPLE
Now suppose there is a burst error of length 5 that affects 4 bits.
10101111 11111001 00011101
Prove that the receiver can detect the error.