Unit 3 Error Detection New
Unit 3 Error Detection New
Unit-3 :
Error Detection, Correction & Wireless Communication
2. Burst error:
The term burst error means that two or more bits in
the data unit have changed from 1 to 0 or from 0 to 1
Single-bit Error
The term single-bit error means that only one bit of
given data unit (such as a byte, character, or data unit)
is changed from 1 to 0 or from 0 to 1
Single bit errors are least likely type of errors in serial
data transmission.
The term burst error means that two or more bits in the
data unit have changed from 0 to 1 or vice-versa.
Note that burst error doesn’t necessary means that
error occurs in consecutive bits. The length of the burst
error is measured from the first corrupted bit to the last
corrupted bit. Some bits in between may not be
corrupted.
Burst errors are mostly likely to happen in serial
transmission.
Data 1100011111101010111001110
Generating Function
1100011111101010111001110 11000110
Checking Function
Accept Reject
Receiver
Errors occur to the data during data transmission as well as data processing
stages. The errors can occur due to various reasons such as electrostatic
interference from nearby circuits, attenuation due to cable or path resistance,
distortion due to inductance/capacitance, transmission loss due to leakages etc.
LAN and optical cables introduce less errors than wireless networks. The
errors can be of two types viz. single bit error and burst error.
It can also detect burst errors but only in those cases where number of
bits changed is odd, i.e. 1, 3, 5, 7, …….etc.
Disadvantages :
The major disadvantage of using this method for error detection is that it
is not able to detect burst error if the number of bits changed is even, i.e.
2, 4, 6, 8, …….etc.
Example –
If the original data is 1100111. After adding VRC, data unit that will be transmitted is 11001111.
Suppose on the way 2 bits are changed, 01011111. When this data will reach the destination,
parity checker will count number of 1s in data and that comes out to be even i.e. 8. So, in this
case, parity is not changed, it is still even. Destination will assume that there is no error in data
even though data is erroneous.
Longitudinal Redundancy Check (LRC)
In this method, data which the user want to send is organized into
tables of rows and columns.
After checking the data for errors, receiver accepts the data and
discards the redundant row of bits.
Example
If a block of 32 bits is to be transmitted, it is divided into matrix of four rows
and eight columns which as shown in the following figure :
The main problem with LRC is that, it is not able to detect error if two
bits in a data unit are damaged and two bits in exactly the same position
in other data unit are also damaged.
Unit-3 :
Error Detection, Correction & Wireless Communication
Frame : 1 0 0 1 0 0
⊕1 1 0 1
01000 When the leftmost bit of the
⊕1 1 0 1 remainder is zero, we must
use 0 0 0 0 instead of the
01010 original
⊕1 1 0 1
01110
⊕1 1 0 1
00110
⊕0 0 0 0
01100 Remainder (CRC)
⊕1 1 0 1
0001
CRC : 0 0 1
Transmitted frame : 1 0 0 1 0 0 0 0 1
Ex.2: Write the steps to compute the checksum in CRC code.
Calculate CRC for a frame 1 1 0 1 0 1 1 0 1 1 and generator
polynomial (divisor) x4+x+1 and write the transmitted frame.
Frame: 1 1 0 1 0 1 1 0 1 1
Generator: 1 0 0 1 1
Unit-3 :
Error Detection, Correction & Wireless Communication
3.2 Error Detection:- Forward Error Correction (Hamming code)
Its main limitation is that if there are too many errors, the
frames need to be retransmitted.
Hamming code is a set of error-correction codes that can be
used to detect and correct the errors that can occur when the
data is moved or stored from the sender to the receiver.
Redundancy bits are placed at the positions which correspond to the power of 2.
General Algorithm of Hamming code
The Hamming Code is simply the use of extra parity bits to allow the
identification of an error.
1. Write the bit positions starting from 1 in binary form.
2. All the bit positions that are a power of 2 are marked as parity bits
(1, 2, 4, 8, etc).
20=1 r1,
21=2 r2,
22=4 r3,
23=8 r4,
24=16 r4 and so on
3. All the other bit positions are marked as data bits.
4. Each data bit is included in a unique set of parity bits, as determined its
bit position in binary form
11 10 9 8 7 6 5 4 3 2 1
d d d r4 d d d r3 d r2 r1
20=1 r1,
21=2 r2,
22=4 r3,
23=8 r4 Redundancy Bits
a. Parity bit 1 covers all the bits positions whose binary representation
includes a 1 in the least significant position (1, 3, 5, 7, 9, 11, etc)
b. Parity bit 2 covers all the bits positions whose binary representation
includes a 1 in the second position from the least significant bit
(2, 3, 6, 7, 10, 11, etc)
4. Each data bit is included in a unique set of parity bits, as determined its bit
position in binary form
11 10 9 8 7 6 5 4 3 2 1
d d d r4 d d d r3 d r2 r1
Redundancy Bits
c. Parity bit 4 covers all the bits positions whose binary representation
includes a 1 in the third position from the least significant bit
(4–7, 12–15, 20–23, etc)
4. Each data bit is included in a unique set of parity bits, as determined its bit
position in binary form
11 10 9 8 7 6 5 4 3 2 1
d d d r4 d d d r3 d r2 r1
Redundancy Bits
d. Parity bit 8 covers all the bits positions whose binary representation
includes a 1 in the fourth position from the least significant bit bits
(8–15, 24–31, 40–47, etc)
4. Each data bit is included in a unique set of parity bits, as determined its bit
position in binary form
11 10 9 8 7 6 5 4 3 2 1
d d d r4 d d d r3 d r2 r1
Redundancy Bits
e. In general, each parity bit covers all bits where the bitwise AND of the
parity position and the bit position is non-zero
5. Since we check for even parity set a parity bit to 1 if the total
number of ones in the positions it checks is odd.
11 10 9 8 7 6 5 4 3 2 1
1 0 1 R8 1 0 0 R4 1 R2 R1
11 10 9 8 7 6 5 4 3 2 1
1 0 1 R8 1 0 0 R4 1 R2 R1
To find the redundant bit R4, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R4 is odd the value of R4(parity
bit’s value) = 1
R8 bit is calculated using parity check at all the bits positions whose binary
representation includes a 1 in the fourth position from the least significant
bit.R8: bit 8,9,10,11
To find the redundant bit R8, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R8 is an even number the value
of R8(parity bit’s value)=0.
Thus, the data transferred is
1
Error detection and correction –
Suppose in the above example the 6th bit is changed from 0 to 1 during data
transmission, then it gives new parity values in the binary number:
Unit-3 :
3.3 The IEEE Standards (802.1, 802.2, 802.3, 802.4, 802.5)
• The IEEE 802.4 standard specifies the characteristics for Token Bus
networks.
IEEE 802.5
• The IEEE 802.5 standard specifies the characteristics for Token Ring
networks.
• Token ring LAN technology is a local area network protocol which resides at
the data link layer (DLL) of the OSI model.
• Stations on a token ring LAN are logically organized in a ring topology with
data being transmitted sequentially from one ring station to the next with a
token travelling around the ring.
• This standard describes a token passing protocol which means that a machine
can only use the network when it has control of the “token”
• This ensures that there are no collisions because only one machine can use the
network at any given time.
Characteristics specified in the 802.5 standard
• Speed: The 802.5 Token Ring specifies network speeds of 4 and 16Mbps.
• Topology: Token Ring networks use a logical ring topology and most often a physical
star.
• Media: Token Ring networks use unshielded twisted pair cabling or shielded twisted
pair.
• Access method: 802.5 specify an access method known as token passing. The token
travels around the network looking for computers with data to send. The computer's
data is passed along with the token until it gets to the destination computer at which
point, the data is removed from the token and the empty token placed back on the
ring.
IEEE 802 Categories
Specification Description
802.1 Sets Internetworking standards related to network management.
Defines the general standard for the data-link layer. The IEEE divides this layer
802.2 into two su-blayers: the LLC and MAC layers. The MAC layer varies with
different network types and is defined by standard IEEE 802.3
Defines the MAC layer for bus networks that use Carrier-Sense Multiple Access
802.3
with Collision Detection (CSMA/CD). This is the Ethernet Standard.
Defines the MAC layer for bus networks that use a token-passing mechanism
802.4
(Token Bus LAN).
802.5 Defines the MAC layer for token ring networks (Token Ring LAN).
Dr.Panjabrao Deshmukh Polytechnic,
Shivaji Nagar, Amravati
(Maharashtra Govt-Aided Institute)
Unit-3 :
Error Detection, Correction & Wireless Communication
3.3 The IEEE Standards 802.11 Addressing
By
Date : Rajendra H. Rathod
Time : Lecturer, Comp. Engg. Dept.
IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE
802.11, which covers the physical and data link layers.
Architecture
The standard defines two kinds of services:
• The basic service set (BSS) and
• The extended service set (ESS).
Basic Service Set
• IEEE 802.11 defines the basic service set (BSS) as the building
block of a wireless LAN.
• A basic service set is made of stationary or mobile wireless stations
and an optional central base station, known as the access point
(AP).
• Figure shows two sets in this standard.
• The BSS without an AP is a stand-alone
network and cannot send data to other
BSSs. It is called an ad hoc architecture.
• In this architecture, stations can form a
network without the need of an AP; they
can locate one another and agree to be part
of a BSS.