0% found this document useful (0 votes)
24 views12 pages

Presentation On Error Detection and Correction GROUP3..

The document discusses error detection and correction in computer networking, highlighting the processes used to identify and rectify errors in data transmission. It categorizes errors into types such as single-bit, burst, and permanent errors, and outlines various detection techniques like CRC and parity bits, as well as correction methods including Hamming and Reed-Solomon codes. Real-world applications of these techniques are also mentioned, including their use in TCP/IP, Ethernet, and digital media storage.

Uploaded by

macskelly78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views12 pages

Presentation On Error Detection and Correction GROUP3..

The document discusses error detection and correction in computer networking, highlighting the processes used to identify and rectify errors in data transmission. It categorizes errors into types such as single-bit, burst, and permanent errors, and outlines various detection techniques like CRC and parity bits, as well as correction methods including Hamming and Reed-Solomon codes. Real-world applications of these techniques are also mentioned, including their use in TCP/IP, Ethernet, and digital media storage.

Uploaded by

macskelly78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Error Detection and

Correction in Computer
Networking
Ensuring Reliable Data Transmission
Introduction
Error detection
refers to the process of identifying errors in transmitted or stored data. It involves
the use of algorithms and codes that can detect discrepancies between the
original data and the received or retrieved data.

Error correction
is the process of identifying and correcting errors in data. This goes a step further
than error detection by not only identifying that an error has occurred but also
providing a means to correct it.
Types of errors in networking

• Singe-bit Errors :
A single-bit error occurs when one bit of data is altered during transmission or
storage. For example, if a binary sequence "1010" is received as "1000" the
second bit has been flipped.

• Burst Errors :
Burst errors occur when two or more bits are altered in a contiguous block. For
instance, if a sequence "1101001" is received as "1101101," the third and fourth
bits have been changed.
• Permanent Errors :
Permanent errors are long-lasting and occur due to hardware failures or physical damage
to storage media. These errors require intervention to correct, such as replacing faulty
components.

• Random Errors :
They are unpredictable and can occur due to various factors such as noise in the
communication channel or hardware malfunctions. These errors do not follow a specific
pattern and can affect any bit in the data.

• Transient Errors :
Transient errors are temporary errors that occur due to short-lived disturbances in the
communication channel, such as electromagnetic interference. These errors may not be
permanent and can resolve themselves.
Error Detection Techniques
• Cyclic Redundancy Check (CRC) :
CRC uses polynomial division to generate a fixed-size checksum from the data. The
sender appends this checksum to the data and the receiver performs the same polynomial
division and checks if the remainder matches the received checksum.
• Parity Bits :
A simple method where an extra bit (parity bit) is added to a binary string to make the
number of 1s either even or odd. It can detect single-bit errors but cannot correct
them.
• Checksums:
A checksum is a value calculated from a data set, typically by summing the binary values
of the data. The checksum is sent along with the data and the receiver recalculates the
checksum and compares it to the received checksum to detect errors.
Error correction Techniques
• Hamming code :
Hamming code adds redundancy bits to the data in such a way that it can detect
and correct single-bit errors. It also uses a specific arrangement of bits to allow the
receiver to identify the position of the error.

• Reed-Solomon code :
A block error-correcting code that can correct multiple errors in data blocks. It is
widely used in CDs, DVDs, QR codes and data transmission technologies.

• Turbo Codes :
A class of high-performance error correction codes that use iterative decoding.
They are used in applications like mobile communications and satellite
transmissions.
Comparison of Techniques
Technique Error Detection Error Correction Complexity Efficiency Applications

Simple data
Parity Bits Single-bit None Low Low
transmission
Data integrity
Checksums Moderate None Low Moderate
checks
Cyclic Network
Redundancy High None Moderate High communications,
Check (CRC) file storage
Memory error
Hamming Code Single-bit Single-bit Moderate Moderate
correction

Reed-Solomon CDs, DVDs, QR


High Multiple High High
Codes codes

Mobile
Turbo Codes High Multiple High Very High communications,
satellite
• Key Points:

• Error Detection:
Techniques like parity bits and checksums provide basic error detection, while CRC,
Hamming codes, and others offer more robust detection capabilities.
• Error Correction:
Some techniques, such as Hamming codes, can correct single-bit errors, while others like
Reed-Solomon and Turbo codes can correct multiple errors.
• Complexity:
Simpler methods like parity bits and checksums are easy to implement but offer limited
functionality. More complex methods like Turbo and LDPC codes require sophisticated
algorithms and processing power.
• Efficiency:
Efficiency refers to the amount of redundancy added to the data. Techniques
like Turbo and LDPC codes are highly efficient, providing strong error
correction with relatively low overhead.

• Applications:
The choice of technique often depends on the specific application
requirements. For example, Reed-Solomon codes are widely used in storage
media, while Turbo codes are favored in mobile communications.
Real-World Application
• TCP/IP :
(Transmission Control Protocol/Internet Protocol) uses checksums for error
detection

• Ethernet :
Uses CRC (cyclic redundancy check) for error detection

• Wireless Communication :
Uses FEC (forward error correction) to improve reliability
Note:(FEC) is a method used to detect and correct errors in data transmission
without the need for retransmission.
• CDs and DVDs :
reed-Solomon error correction is used in CDs, DVDs and Blu-ray discs.

• Cloud Storge :
Cloud services implement error detection and correction to ensure
data integrity during uploads and downloads.

• Digital Television :
Reed-Solomon codes are widely used in digital television broadcasting and
streaming services.
• Group Members

GROUP 3

• Aklakutse Foster Sedem - 1704769184

• Fred Nkrumah - 1703603625

• Agbozo Dennis Dela - 1704560467

• Mubarak Ali - 1704221613

• Asiedu Gyimah Leslie - 1703777367

• Sekey Randy - 1703084074

• Akonnor Michael Paa Takyi Kwabena - 1704969458

• Jacob Otoo - 1693571242

• Joseph Opoku Gyem - 1697531810

You might also like