0% found this document useful (0 votes)
15 views4 pages

7 Error Detectiol7 - 103320

Uploaded by

Ali kombo hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

7 Error Detectiol7 - 103320

Uploaded by

Ali kombo hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

ITT 05104 NETWORK TECHNOLOGY

ERROR DETECTION

LECTURE NO.7

INTRODUCTION

Networks must be able to transfer data from one device to another with
complete accuracy. Data can be corrupted during transmission. For reliable
communication, errors must be detected and corrected. Error detection
and correction are implemented either at the data link layer or the
transport layer of the OSI model.

Error detection refers to the techniques used to decide whether the data
transferred is correct or not while it is transmitted from source to destination.
Error detection ensures reliable delivery of data across a network. During
transmission can be corrupted and some applications require that error to be
detected and corrected. Error detection means to decide whether the
received data is correct or not without having a copy of the original message.

Types of error

i. Single bit error

Single bit error only one bit in the data unit has changed. Single bit errors
are the least likely type of errors in serial data transmission because the
noise must have a very short duration which is very rare. However this kind
of errors can happen in parallel transmission.

ii. Burst error

Burst error means two or more bits in data unit have changed. The term
burst error means that two or more bits in the data unit have changed from 1
to 0 or from 0 to Burst errors does not necessarily mean that the errors occur
in consecutive bits, the length of the burst is measured from the first
corrupted bit to the last corrupted bit. Some bits in between may not have
been corrupted. Burst error is most likely to happen in serial transmission
since the duration of noise is normally longer than the duration of a bit. The
number of bits affected depends on the data rate and duration of noise.

ERROR DETECTION TECHNIQUE

Parity Check

Parity check is the error detection technique in which the most significant
bits of 8 bits word is used as parity bit and remaining 7 bits used as data
message. The parity bit is added to every unit so the total number of the bits
is then tested, if the sum is even there is no error and packet is accepted
and if the sum is odd there is existing of an error in the message and the
packet is rejected.
Cyclic Redundancy Check

Given a k-bit frame or message, the transmitter generates an n-bit


sequence, known as a frame checks sequence, so that the resulting frame,
consisting of (k+n) bits, is exactly divisible by some predetermined number.

The receiver then divides the incoming frame by the same number and, if
there is no remainder, assumes that there was no error and data is accepted
and if the remainder is there, therefore there is existence of error and data is
rejected.

Checksum technique

A checksum is a simple type of error detection technique that is used to


detect errors in data. Errors frequently occur in data when it is written to a
disk, transmitted across a network or otherwise manipulated. The errors are
typically very small, for example, a single incorrect bit, but even such small
errors can greatly affect the quality of data, and even make it useless.

In its simplest form, a checksum is created by calculating the binary values


in a packet or other block of data using some algorithm and storing the
results with the data. When the data is retrieved from memory or received at
the other end of a network, a new checksum is calculated and compared
with the existing checksum. A non-match indicates an error.

Other techniques such as

 Hamming code, and


 Exact count encoding are may also be used.

You might also like