Error Detection

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Summary Of Error Detection or Correction Methods

Error Detection Checksum


There is always the chance that data has been corrupted (changed in some way) during A block of data is sent alongside a calculated checksum value.
transmission.
The receiving computer also calculates what it believes should be the checksum.
This is true regardless of the distance of transmission.
The checksum values are then compared to see if an error has occurred during transmission.
To avoid having corrupted data it is really important that computers check for errors and correc t
Method
them wherever possible.
1. The sending computer uses the block of data to be sent, and a prede ned mathematical
There are several methods of error checking, with some being more effective than others. algorithm, to calculate a checksum value
2. The sending computer sends the data, plus the checksum value
3. The receiving computer uses the data it receives to also calculate what it believes should be
the checksum, using the same mathematical algorithm
Parity Check 4. The two checksum values are compared by the receiving computer
5. Due to the nature of the algorithm, it is highly unlikely that corruption has occurred if the
An extra bit (parity bit) added to a string of binary code to ensure the number of 1-bits are eithe r checksum values match
even or odd, depending upon the parity check system used. 6. If the checksum values don’t match, the receiving computer requests that the data is
transmitted again
Method

1. The sending and receiving computers agree the protocol to be used (even or odd) Check Digit
2. The sending computer adds the correct parity bit to the binary data (either an extra 1 or 0)
A check digit is the nal digit in a code of numbers.  It is calculated from all the other digits in the
3. The sending computer sends the binary data, including the parity bit
code.  It’s purpose is to spot human errors on data entry.
4. The receiving computer checks to make sure the overall parity of the data received is as
agreed (an even or odd number of 1 bits) Check digits are often found in barcodes, product codes or ISBN book numbers.
5. If the parity of the data is incorrect, the receiving computer will request that the data is
transmitted again There are many different mathematical algorithms that can be used to calculate a check digit. 
Different industries will have their own preferred method.
Drawbacks of parity checks
Method
If two bits are transposed (change places) then the computer could be fooled into thinki ng
the data is correct and not corrupted 1. The check digit is calculated and added to the barcode, packaging, product code etc at the
If two random bits change state then the system could also be fooled point of manufacture
2. A human types the long numerical code into a computer, e.g. the cashier will type the
Parity Block barcode number when a scanner fails or packaging is damaged
3. The computer calculates what it believes should be the check digit, based on the numbers
This method of error checking is similar to a traditional parity check except the data is arrang e d n i
entered by the human
a virtual table with parity bits added to each row and column.
4. The computer then compares it’s calculated check digit with the check digit typed in by the
A single corrupted bit can be spotted at the intersection of a corrupted row and column.
human (the last digit in the long code)
Multiple corrupted bits would also aw this system. 5. If the two don’t match, then the human has made an error when typing in the numerical code,
e.g. barcode number
6. The human will be asked by the computer to re-enter the numerical code

Bene ts
Echo Check
Good for spotting human errors such as:
With an echo check, the receiving computer sends a copy of the data immediately back to the
Incorrect digit entered
sending computer for comparison.
Transposition error (two numbers change order)
The sending computer compares the two sets of data to check if any errors occurred during the Omitted digit or extra digit
transmission process.

If an error has occurred, the data will be transmitted again.

Automatic Repeat ReQuests (ARQ)


Drawback of echo checks
This form of error detection uses a system of acknowledgements and timeouts. Automatic
If the two sets of data are different you will have no way of knowing whether the error Repeat ReQuests are often used to ensure reliable transmissions over an unreliable service.
occurred when originally sent, or when it was sent back
Echo checks require a lot of extra data to be transmitted Method

1. The sending computer transmits a block of data


2. The sending computer waits a period of time to see if the receiving computer acknowledges
receipt of the data
3. After a set period of time, a timeout occurs which triggers the data to be automatically
resent by the sending computer
4. This will continue until the receiving computer acknowledges the data has been received

You might also like