Module 9 Error Detection and Error Correction
Module 9 Error Detection and Error Correction
MODULATION AND
CODING TECHNIQUES
A Modular Approach
MODULE 9
These are used to represent characters and symbols such as letters, digits, and
punctuation marks.
Baudot Code
ASCII Code
It completely stands for United States of America Standard Code for Information
Exchange.
It is also known as ASCII-63.
It is the standard character set for source coding the alphanumeric character set that
humans understand but computer does not.
It is a 7-bit fixed length character set.
EBCDIC Code
BAR CODES
These are those omnipresent black and white striped stickers that seem to appear
in every consumer item in the world.
It is a series of vertical black bars separated by vertical white bars called spaces.
The widths of the bars and spaces along with their reflective abilities represent
binary 1’s and 0’s, and the combination of bits represents certain items.
1. Discrete Code
A discrete bar code has spaces or gaps between characters.
Each character within the bar code is independent of every other character.
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
1
2. Continuous Code
It does not include spaces between characters
3. 2D Code
It stores data in 2 dimensions in contrast with a conventional linear bar code
which stores data along only on one axis.
It has larger storage capacity than one-dimensional bar codes.
CODE-39
It was developed by the grocery industry specifically the National Association of Food
Chains in 1974.
It was a continuous code since there are no intercharacter spaces.
The width of the bars and spaces do not correspond to logic 1’s or logic 0’s. Instead,
the digits 0 to 9 are encoded into a combination of two-variable width bars and two
variable width spaces that occupy the equivalent of 7-bit positions.
ERROR DETECTION
It is the process of monitoring data transmission and determining when errors have
occurred.
Error detection techniques neither correct errors nor identify which bits are in error-
they indicate only when an error has occurred.
The purpose of error detection is not to prevent errors from occurring but to prevent
undetected errors from occurring.
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
2
REDUNDANCY
It involves the transmitting of each character twice. If the same character is not
received twice in succession, a transmission error has occurred.
It is an effective method of error detection but rather a costly method especially for
long messages.
Types of Redundancy
Advantage: simplicity
Disadvantage:
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
3
If 2 LRC characters are the same, most likely no transmission error
has occurred.
The group of characters that comprise a message is called a block or
frame of data.
The bit sequence for the LRC is called as block check sequence or
frame check sequence.
Sample Problem
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
4
ECHOPLEX
It involves the receiving device echoing the received data back to the transmitting
device
The number of 1’s in each character is the same and therefore a simple count of the
number of 1’s received in each character can determine if a transmission error has
occurred.
ERROR CORRECTION
It is the process that include sufficient extraneous information along with each
message to enable the receiver to determine when an error has occurred and which
bit is in error.
SYMBOL SUBSTITUTION
RETRANSMISSION
It involves the resending of message when it is received in error and the receive
terminal automatically calls for retransmission of the entire message.
In this method, receive station requests the transmit station to resend a message
when the received message has errors.
It is often called as ARQ (Automatic Repeat Request).
Acknowledgments are used when the recepient of data sends a short message back
to the sender acknowledging receipt of the last transmission.
It involves the addition of redundant information embedded in the data set in order
that the receiving device can detect errors and correct for them without requiring a
retransmission.
It is the only error correction scheme that actually detects and corrects
transmission errors when they are received without requiring for retransmission.
With FEC redundant bits are added to the message before transmission.
When an error is detected, the redundant bits are used to determine which bit is in
error.
Key Terms:
Hamming Code
It is an error correcting code used for correcting transmission errors in
synchronous data streams
It can only correct single bit error and cannot correct burst error.
This is named after Richard Hamming.
Hamming Bits
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
5
The combination of data bits and hamming bits is called as hamming
code
Other Parameters
Sample Problem
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
6
EXERCISE NO. 9
Required Readings
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
7
Disclaimer: The professor does not own some contents and all pictures of this module. Full credits are given to all sources especially
to the book “Advanced Electronic Communication Systems” by Wayne Tomasi
8