0% found this document useful (0 votes)
7 views17 pages

Error Detection

The document discusses error detection in data transmission, explaining that errors can occur when data is sent and may result in incorrect or incomplete information. It outlines various methods of error detection, including Vertical Redundancy Check (VRC), Longitudinal Redundancy Check (LRC), Checksum, and Cyclic Redundancy Check (CRC), detailing the CRC process and the use of lookup tables for efficiency. Additionally, it highlights real-world applications of CRC in networking protocols, file systems, data compression, and embedded systems.

Uploaded by

Vinay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views17 pages

Error Detection

The document discusses error detection in data transmission, explaining that errors can occur when data is sent and may result in incorrect or incomplete information. It outlines various methods of error detection, including Vertical Redundancy Check (VRC), Longitudinal Redundancy Check (LRC), Checksum, and Cyclic Redundancy Check (CRC), detailing the CRC process and the use of lookup tables for efficiency. Additionally, it highlights real-world applications of CRC in networking protocols, file systems, data compression, and embedded systems.

Uploaded by

Vinay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Error Detection

02/15/2025 1
What is error in data transmission?
• Errors happen when data gets messed up while being sent from one place to another

• These mistakes can make the data incorrect or incomplete.

02/15/2025 2
02/15/2025 3
Error Detection:
• Error detection means to decide whether the received data is correct or not without
having a copy of the original message
• To detect or correct errors we need to send some extra bits with data.
• The extra bits are called redundant bits.

Example:
Message : 6 23 4
Message with checksum : 6 23 4 33
Message after transmission : 6 27 4 33

02/15/2025 4
Types of Error Detection

• VRC: Vertical Redundancy check


• LRC: longitudinal Redundancy Check
• Checksum
• CRC: Cyclic Redundancy Check

02/15/2025 5
02/15/2025 6
Checksum:

02/15/2025 7
CRC (Cyclic Redundancy Check)

CRC (Cyclic Redundancy Check) algorithms are used to detect errors in digital data. The basic idea is to treat the
message as an enormous binary number, divide it by a fixed binary number (the divisor), and use the remainder as the
checksum.
The steps are as follows:
1.Message Representation: Convert the message into a binary number.
2.Division: Divide the binary number by a fixed binary divisor using binary long division.
3.Checksum: The remainder from this division is the CRC checksum.

02/15/2025 8
Example of Polynomial Representation
Let's take the decimal number 23:
 In binary: 10111
 As a polynomial: x^4 + x^2 + x^1 + x^0

Polynomial Multiplication Example Polynomial Arithmetic Mod 2


Suppose we want to multiply two binary numbers: 1101 and 1011. In CRC, we use polynomial arithmetic mod 2, which means:

1. Represent these binary numbers as polynomials:  All coefficients are calculated modulo 2 (either 0 or 1).
 There are no carries in the calculation.
• 1101 as x^3 + x^2 + x^0
Applying this to our previous example:
• 1011 as x^3 + x^1 + x^0
 When we see 3x^3, we interpret this as 3mod 2=1:
2. Multiply these polynomials:
 x^6 + x^5 + x^4 + x^3 + x^2 + x^1 + x^0
(x^3 + x^2 + x^0) * (x^3 + x^1 + x^0)
Perform the multiplication by distributing each term:
=(x^3 * x^3) + (x^3 * x^1) + (x^3 * x^0) + (x^2 * x^3) + (x^2 * x^1) + (x^2 * x^0) + (x^0 * x^3) + (x^0 * x^1) + (x^0 * x^0)
Combine the like terms:
= x^6 + x^4 + x^3 + x^5 + x^3 + x^2 + x^3 + x^1 + x^0
Simplify:
= x^6 + x^5 + x^4 + 3x^3 + x^2 + x^1 + x^0

02/15/2025 9
CRC at Receiver side:

02/15/2025 10
CRC Shift Register:

02/15/2025 11
02/15/2025 12
02/15/2025 13
Why we need Look-up Table

Speed Optimization in CRC Calculation:


•Lookup tables precompute the results of polynomial division, significantly speeding up the CRC
calculation process.
•Instead of recalculating the CRC for each byte of data, the CRC values for all possible byte inputs are
precomputed and stored in the lookup table.

Reducing Computational Complexity:


•By using lookup tables, the computational complexity of CRC calculation is reduced.
•The time-consuming division operation is performed only once during table initialization, and thereafter,
simple table lookups are used for CRC computation.

Precomputed Values for Efficiency:


•Lookup tables store precomputed CRC values for all possible byte values (0-255).
•This allows the CRC algorithm to quickly retrieve the correct CRC value corresponding to each byte of
data, enhancing computational efficiency.

02/15/2025 14
Generating CRC Lookup Table
Steps to Create a Lookup Table:

1.Initialize Table: Create an array to hold


the CRC values for each byte.
2.Calculate CRC for Each Byte: Perform
the CRC calculation for each byte (0-255)
using the chosen polynomial.
3.Store in Table: Store the calculated
CRC value in the array for quick access
during CRC computation

02/15/2025 15
Application Of CRC Look-up Table

Real-World Use Cases:


• Networking Protocols: Ensuring data integrity in protocols like Ethernet, TCP/IP.
• File Systems: Error detection in file systems like NTFS, FAT32.
• Data Compression: Used in formats like ZIP, GZIP for data integrity.
• Embedded Systems: Ensuring firmware and data integrity in microcontrollers.

Example Industries:
• Telecommunications: CRCs are used extensively to ensure error-free communication.
• Automotive: Ensuring data integrity in vehicle networks (CAN).
• Aerospace: Critical data integrity checks in avionics systems.

02/15/2025 16
Reference:

Shift Register: https://youtu.be/iwj8ZgyzqZk?si=RMYobbF4yGblfq2l

CRC : 1) https://youtu.be/A9g6rTMblz4?si=B98DHHSvEvm826Yu
2) https://youtu.be/A9g6rTMblz4?si=2lR1XT-14l-tOoEB

Error Detection: https://youtu.be/EMrY-8m8D1E?si=A7WmJBF761CAWOY3

VRC: https://youtu.be/UwERCzJv-y8?si=H0DetzSIFKF1RHaT

LRC: https://youtu.be/nNONvBsOtrE?si=emYi0x0Uo9k9K-rz

02/15/2025 17

You might also like