Error detection and correction of computer network
1. Error Detection in Computer Networks
Error is a condition when the receiver’s information does not
match the sender’s information. During transmission, digital
signals suffer from noise that can introduce errors in the binary
bits traveling from sender to receiver. That means a 0 bit may
change to 1 or a 1 bit may change to 0.
Data (Implemented either at the Data link layer or Transport Layer
of the OSI Model) may get scrambled by noise or get corrupted
whenever a message is transmitted. To prevent such errors, error-
detection codes are added as extra data to digital messages. This
helps in detecting any errors that may have occurred during
message transmission.
2. Types of Errors
• Single-Bit Error
A single-bit error refers to a type of data transmission error that occurs when one bit (i.e., a single
binary digit) of a transmitted data unit is altered during transmission, resulting in an incorrect or
corrupted data unit.
3. Multiple-Bit Error
A multiple-bit error is an error type that arises when more than one bit in a data
transmission is affected. Although multiple-bit errors are relatively rare when
compared to single-bit errors, they can still occur, particularly in high-noise or high-
interference digital environments.
4. Burst Error
When several consecutive bits are flipped
mistakenly in digital transmission, it creates a
burst error. This error causes a sequence of
consecutive incorrect values..
5. To detect errors, a common technique is to
introduce redundancy bits that provide
additional information. Various techniques for
error detection include::
• Simple Parity Check
• Two-dimensional Parity Check
• Checksum
• Cyclic Redundancy Check (CRC)
6. Error Detection Methods
Simple Parity Check
Simple-bit parity is a simple error detection
method that involves adding an extra bit to a
data transmission. It works as:
1 is added to the block if it contains an odd
number of 1’s, and
0 is added if it contains an even number of 1’s
7. This scheme makes the total number of 1’s even, that is why it is called even parity
checking
8. • Disadvantages
• Single Parity check is not able to detect even no. of bit
error.
• For example, the Data to be transmitted is 101010.
Codeword transmitted to the receiver is 1010101 (we have
used even parity).
Let’s assume that during transmission, two of the bits of
code word flipped to 1111101.
On receiving the code word, the receiver finds the no. of
ones to be even and hence no error, which is a wrong
assumption.
9. Two-dimensional Parity Check
• Two-dimensional Parity check bits are
calculated for each row, which is equivalent to
a simple parity check bit. Parity check bits are
also calculated for all columns, then both are
sent along with the data. At the receiving end,
these are compared with the parity bits
calculated on the received data
11. Checksum
• Checksum error detection is a method used to
identify errors in transmitted data. The process
involves dividing the data into equally sized
segments and using a 1’s complement to
calculate the sum of these segments. The
calculated sum is then sent along with the data
to the receiver. At the receiver’s end, the same
process is repeated and if all zeroes are obtained
in the sum, it means that the data is correct.
12. • Checksum – Operation at Sender’s Side
• Firstly, the data is divided into k segments each
of m bits.
• On the sender’s end, the segments are added
using 1’s complement arithmetic to get the sum.
The sum is complemented to get the checksum.
• The checksum segment is sent along with the
data segments
13. • Checksum – Operation at Receiver’s Side
• At the receiver’s end, all received segments
are added using 1’s complement arithmetic to
get the sum. The sum is complemented.
• If the result is zero, the received data is
accepted; otherwise discarded.
15. • Disadvantages
• If one or more bits of a segment are damaged
and the corresponding bit or bits of opposite
value in a second segment are also damaged
16. Cyclic Redundancy Check (CRC)
Unlike the checksum scheme, which is based on addition,
CRC is based on binary division.
In CRC, a sequence of redundant bits, called cyclic
redundancy check bits, are appended to the end of the data
unit so that the resulting data unit becomes exactly divisible
by a second, predetermined binary number.
At the destination, the incoming data unit is divided by the
same number. If at this step there is no remainder, the data
unit is assumed to be correct and is therefore accepted.
A remainder indicates that the data unit has been damaged
in transit and therefore must be rejected.
19. • Advantages:
• Increased Data Reliability: Error detection ensures that the data transmitted over
the network is reliable, accurate, and free from errors. This ensures that the
recipient receives the same data that was transmitted by the sender.
• Improved Network Performance: Error detection mechanisms can help to
identify and isolate network issues that are causing errors. This can help to
improve the overall performance of the network and reduce downtime.
• Enhanced Data Security: Error detection can also help to ensure that the data
transmitted over the network is secure and has not been tampered with.
• Disadvantages:
• Overhead: Error detection requires additional resources and processing power,
which can lead to increased overhead on the network. This can result in slower
network performance and increased latency.
• False Positives: Error detection mechanisms can sometimes generate false
positives, which can result in unnecessary retransmission of data. This can further
increase the overhead on the network.
• Limited Error Correction: Error detection can only identify errors but cannot
correct them. This means that the recipient must rely on the sender to retransmit
the data, which can lead to further delays and increased network overhead.
20. Hamming Code
• Hamming code is a set of error-correction
codes that can be used to detect and correct
the errors that can occur when the data is
moved or stored from the sender to the
receiver. It is a technique developed by R.W.
Hamming for error correction.
21. • Redundant bits are extra binary bits that are
generated and added to the information-carrying
bits of data transfer to ensure that no bits were lost
during the data transfer. The number of redundant
bits can be calculated using the following formula:
• 2^r ≥ m + r + 1
• Suppose the number of data bits is 7, then the
number of redundant bits can be calculated using: =
2^4 ≥ 7 + 4 + 1 .Thus, the number of redundant bits=
4
22. Algorithm of Hamming Code
• Hamming Code is simply the use of extra parity bits to allow the identification of an error.
• Write the bit positions starting from 1 in binary form (1, 10, 11, 100, etc).
• All the bit positions that are a power of 2 are marked as parity bits (1, 2, 4, 8, etc).
• All the other bit positions are marked as data bits.
• Each data bit is included in a unique set of parity bits, as determined its bit position in binary
form. a. Parity bit 1 covers all the bits positions whose binary representation includes a 1 in
the least significant position (1, 3, 5, 7, 9, 11, etc). b. Parity bit 2 covers all the bits positions
whose binary representation includes a 1 in the second position from the least significant bit
(2, 3, 6, 7, 10, 11, etc). c. Parity bit 4 covers all the bits positions whose binary representation
includes a 1 in the third position from the least significant bit (4–7, 12–15, 20–23,
etc). d. Parity bit 8 covers all the bits positions whose binary representation includes a 1 in the
fourth position from the least significant bit bits (8–15, 24–31, 40–47, etc). e. In general, each
parity bit covers all bits where the bitwise AND of the parity position and the bit position is
non-zero.
• Since we check for even parity set a parity bit to 1 if the total number of ones in the positions
it checks is odd.
• Set a parity bit to 0 if the total number of ones in the positions it checks is even.
24. Determining the Position of Redundant Bits
• A redundancy bits are placed at positions that
correspond to the power of 2. As in the above
example:
• The number of data bits = 7
• The number of redundant bits = 4
• The total number of bits = 7+4=>11
• The redundant bits are placed at positions
corresponding to power of 2- 1, 2, 4, and 8
25. Suppose the data to be transmitted is 1011001 from sender to receiver, the bits will
be placed as follows:
26. Determining the Parity bits According to Even Parity
R1 bit is calculated using parity check at all the bits positions whose binary representation includes a 1 in
the least significant position. R1: bits 1, 3, 5, 7, 9, 11
27. • To find the redundant bit R1, we check for even parity. Since the total number
of 1’s in all the bit positions corresponding to R1 is an even number the value
of R1 (parity bit’s value) = 0
• R2 bit is calculated using parity check at all the bits positions whose binary
representation includes a 1 in the second position from the least significant
bit. R2: bits 2,3,6,7,10,11
28. • To find the redundant bit R2, we check for even parity. Since the total number of 1’s in all the bit
positions corresponding to R2 is odd the value of R2(parity bit’s value)=1
R4 bit is calculated using parity check at all the bits positions whose binary representation includes a
1 in the third position from the least significant bit. R4: bits 4, 5, 6, 7
29. • To find the redundant bit R4, we check for even parity. Since the total number of 1’s in all the bit positions
corresponding to R4 is odd the value of R4(parity bit’s value) = 1
R8 bit is calculated using parity check at all the bits positions whose binary representation includes a 1 in the
fourth position from the least significant bit. R8: bit 8,9,10,
30. • To find the redundant bit R8, we check for
even parity. Since the total number of 1’s in all
the bit positions corresponding to R8 is an
even number the value of R8(parity bit’s
value)=0. Thus, the data transferred is:
31. Error Detection and Correction
• Suppose in the above example the 6th bit is
changed from 0 to 1 during data transmission, then
it gives new parity values in the binary number:
32. • For all the parity bits we will check the number of 1’s in their respective
bit positions.
• For R1: bits 1, 3, 5, 7, 9, 11. We can see that the number of 1’s in these
bit positions are 4 and that’s even so we get a 0 for this.
• For R2: bits 2,3,6,7,10,11 . We can see that the number of 1’s in these
bit positions are 5 and that’s odd so we get a 1 for this.
• For R4: bits 4, 5, 6, 7 . We can see that the number of 1’s in these bit
positions are 3 and that’s odd so we get a 1 for this.
• For R8: bit 8,9,10,11 . We can see that the number of 1’s in these bit
positions are 2 and that’s even so we get a 0 for this.
• The bits give the binary number 0110 whose decimal representation is
6. Thus, bit 6 contains an error. To correct the error the 6th bit is
changed from 1 to 0.
33. Features of Hamming Code
• Error Detection and Correction: Hamming code is designed to detect and correct single-bit errors
that may occur during the transmission of data. This ensures that the recipient receives the same
data that was transmitted by the sender.
• Redundancy: Hamming code uses redundant bits to add additional information to the data being
transmitted. This redundancy allows the recipient to detect and correct errors that may have
occurred during transmission.
• Efficiency: Hamming code is a relatively simple and efficient error-correction technique that does
not require a lot of computational resources. This makes it ideal for use in low-power and low-
bandwidth communication networks.
• Widely Used: Hamming code is a widely used error-correction technique and is used in a variety
of applications, including telecommunications, computer networks, and data storage systems.
• Single Error Correction: Hamming code is capable of correcting a single-bit error, which makes it
ideal for use in applications where errors are likely to occur due to external factors such as
electromagnetic interference.
• Limited Multiple Error Correction: Hamming code can only correct a limited number of multiple
errors. In applications where multiple errors are likely to occur, more advanced error-correction
techniques may be required.
34. Assume that 12 bit hamming code word consist of 8 bit data and 4 check bits is
d8d7d6d5c4d4d3d2c3d1c2c1 ,where the data bits and the check bits are given in the following tables:
Answer: (A)
We will first insert our code word according to hamming code d8
d7
d6
d5
c4
d4
d3
d2
c3
d1
c2
c1,
Now, calculating hamming code according to first parity bit C1: d7
d5
d4
d2
d1
c1.
1×0010, To make number
of 1 even , for this x must be 0.
Similarly, lets calculate for y , we will start from c8
and make its even=>110xy here x is already 0 , so y should be 0.
So the value of x is 0 and y is 0.