尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Error Detection and Correction
Presented By:

Maria Akther
Dept.: Computer Science
Daffodil International University
Data can be corrupted during transmission.
some applications require that errors be detected
and corrected.
1.Single-Bit Error
2.Burst Error
In a single-bit error only 1 bit in the data unit has
 changed.
Example:




The effect of a single-bit error on a data unit in shown fig.The
  impact of the change, imagine that each group of 8bit is an
  ASCII character with a 0 bit added to the left. In fig.00000010
  was sent ,meaning start of text,but 00001010 was received,
  meaning line feed.
A burst error means that 2 or more bits in the data unit have
changed.
Example:




The effect of a burst error on a data unit.In this
case,0100010001000011 was sent,but 0101110101100011 was
received.the length of the burst is measured from the first
corrupted bit to the last corrupted bits
The central concept in detecting or correcting errors
is redundancy. To be able to detect or correct errors,
we need to send some extra bits with our data.
These redundant bits are added by the sender and
removed by the receiver. Their presence allows the
receiver to detect or correct corrupted bits.
Detection
In error detection, we are looking only if any error has
 occurred. A single bit error is the same for us as a
 burst error.

Correction
In correction, we need to know the exact number of
 bits that are corrupted and their location in the
 message. The number of the errors and size of
 message are important.
   Forward error correction
   Retransmission
   Block coding
   Convolution coding
In block coding, we divide our message into blocks,
each of k bits, called datawords. We add r redundant
bits to each block to make the length n = k + r. The
resulting n-bit blocks are called codewords.
Two conditions are met to detect an error by the
receiver-
2.The receiver has a list of valid codewords.

3.The original codeword has changed to an invalid
one.
The sender encodes the dataword 01 as 011 and
    sends it to the receiver.
   The receiver receives 011.
   The receiver receives 111.
Assume the sender creates dataword 01 as
01011.The codeword is corrupted during
transmission and 01001 is received.
•     The Hamming distance between two words
    is the number of differences between
    corresponding bits.

•   Hamming distance between two words x and
    y can be shown as d(x, y)
1. The Hamming distance d(000, 011) is 2




2. The Hamming distance d(10101, 11110) is 3
Error detection and correction

More Related Content

What's hot

Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
ibrar562
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
Badrul Alam
 
Check sum
Check sumCheck sum
Check sum
Pooja Jaiswal
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
4. block coding
4. block coding 4. block coding
4. block coding
MdFazleRabbi18
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Faisal Mehmood
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
Venkata Sreeram
 
Lecture 5
Lecture 5Lecture 5
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 

What's hot (20)

Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Check sum
Check sumCheck sum
Check sum
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
4. block coding
4. block coding 4. block coding
4. block coding
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Error control
Error controlError control
Error control
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 

Viewers also liked

Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
Ankan Adhikari
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
Shafaan Khaliq Bhatti
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
Syed Ahmed Zaki
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
Naman Rastogi
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
Jehra Mae Sevillano Ü
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
PavithraRShettigar
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 

Viewers also liked (7)

Error Detection N Correction
Error Detection N CorrectionError Detection N Correction
Error Detection N Correction
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Error detection and correction

Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
Shamim Hossain
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
KashfUlHuda1
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
ArunVerma37053
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
MahabubAlam97
 
Ch10
Ch10Ch10
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
anandhakrishnankv
 
DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
Bilal Munir Mughal
 
Ch10
Ch10Ch10
Ch10
Lia Nakid
 
Ch10
Ch10Ch10
Ch10
Ch10Ch10
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
JeoffnaRuth
 
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and CorrectionSYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
Arti Parab Academics
 
Ch3 datalink
Ch3 datalinkCh3 datalink
Ch3 datalink
Ramesh Kumar
 
Data linklayer
Data linklayerData linklayer
Data linklayer
sheikhshakir
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
abdnazar2003
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
MarckyCaones
 
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
QUT (Queensland University of Technology)
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
Jayaprasanna4
 

Similar to Error detection and correction (20)

Error detection & correction presentation
Error detection & correction presentationError detection & correction presentation
Error detection & correction presentation
 
Error_Detection_and_correction.ppt
Error_Detection_and_correction.pptError_Detection_and_correction.ppt
Error_Detection_and_correction.ppt
 
Data Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptxData Link Layer- Error Detection and Control_2.pptx
Data Link Layer- Error Detection and Control_2.pptx
 
Lecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptxLecture8_Error Detection and Correction 232.pptx
Lecture8_Error Detection and Correction 232.pptx
 
Ch10
Ch10Ch10
Ch10
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
mod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notesmod-3-cn-ppt (1).pdf bca bsc btech notes
mod-3-cn-ppt (1).pdf bca bsc btech notes
 
DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
 
Ch10
Ch10Ch10
Ch10
 
Ch10
Ch10Ch10
Ch10
 
Ch10
Ch10Ch10
Ch10
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
Chapter 10: Error Correction and Detection
Chapter 10: Error Correction and DetectionChapter 10: Error Correction and Detection
Chapter 10: Error Correction and Detection
 
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and CorrectionSYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
SYBSC IT COMPUTER NETWORKS UNIT II Error Detection and Correction
 
Ch3 datalink
Ch3 datalinkCh3 datalink
Ch3 datalink
 
Data linklayer
Data linklayerData linklayer
Data linklayer
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
ch10.pdf
ch10.pdfch10.pdf
ch10.pdf
 
LECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bdLECTURE-10 (Data Communication) ~www.fida.com.bd
LECTURE-10 (Data Communication) ~www.fida.com.bd
 
error detection.ppt
error detection.ppterror detection.ppt
error detection.ppt
 

More from Maria Akther

Prolocalizer
ProlocalizerProlocalizer
Prolocalizer
Maria Akther
 
Matlab
MatlabMatlab
Matlab
Maria Akther
 
Iso12207:2008 standard
Iso12207:2008 standardIso12207:2008 standard
Iso12207:2008 standard
Maria Akther
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary Extraction
Maria Akther
 
Impact of supply chain management
Impact of supply chain managementImpact of supply chain management
Impact of supply chain management
Maria Akther
 
Open64 compiler
Open64 compilerOpen64 compiler
Open64 compiler
Maria Akther
 

More from Maria Akther (6)

Prolocalizer
ProlocalizerProlocalizer
Prolocalizer
 
Matlab
MatlabMatlab
Matlab
 
Iso12207:2008 standard
Iso12207:2008 standardIso12207:2008 standard
Iso12207:2008 standard
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary Extraction
 
Impact of supply chain management
Impact of supply chain managementImpact of supply chain management
Impact of supply chain management
 
Open64 compiler
Open64 compilerOpen64 compiler
Open64 compiler
 

Recently uploaded

From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 

Recently uploaded (20)

From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 

Error detection and correction

  • 1. Error Detection and Correction
  • 2. Presented By: Maria Akther Dept.: Computer Science Daffodil International University
  • 3. Data can be corrupted during transmission. some applications require that errors be detected and corrected.
  • 5. In a single-bit error only 1 bit in the data unit has changed. Example: The effect of a single-bit error on a data unit in shown fig.The impact of the change, imagine that each group of 8bit is an ASCII character with a 0 bit added to the left. In fig.00000010 was sent ,meaning start of text,but 00001010 was received, meaning line feed.
  • 6. A burst error means that 2 or more bits in the data unit have changed. Example: The effect of a burst error on a data unit.In this case,0100010001000011 was sent,but 0101110101100011 was received.the length of the burst is measured from the first corrupted bit to the last corrupted bits
  • 7. The central concept in detecting or correcting errors is redundancy. To be able to detect or correct errors, we need to send some extra bits with our data. These redundant bits are added by the sender and removed by the receiver. Their presence allows the receiver to detect or correct corrupted bits.
  • 8. Detection In error detection, we are looking only if any error has occurred. A single bit error is the same for us as a burst error. Correction In correction, we need to know the exact number of bits that are corrupted and their location in the message. The number of the errors and size of message are important.
  • 9. Forward error correction  Retransmission
  • 10. Block coding  Convolution coding
  • 11. In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
  • 12. Two conditions are met to detect an error by the receiver- 2.The receiver has a list of valid codewords. 3.The original codeword has changed to an invalid one.
  • 13. The sender encodes the dataword 01 as 011 and sends it to the receiver.  The receiver receives 011.  The receiver receives 111.
  • 14. Assume the sender creates dataword 01 as 01011.The codeword is corrupted during transmission and 01001 is received.
  • 15. The Hamming distance between two words is the number of differences between corresponding bits. • Hamming distance between two words x and y can be shown as d(x, y)
  • 16. 1. The Hamming distance d(000, 011) is 2 2. The Hamming distance d(10101, 11110) is 3
  翻译: