This document discusses error control techniques used at the data link layer. It describes different types of errors that can occur during transmission such as single bit errors and burst errors. It then explains various error detection techniques like parity checks, checksum, and cyclic redundancy check (CRC). Parity checks can detect single bit errors but not burst errors affecting an even number of bits. Checksum and CRC are more robust techniques that can detect most errors. The document also introduces error correcting codes using Hamming codes that can not only detect errors but also correct them by adding redundant bits to determine the position of the erroneous bit.
This presentation discusses error detection in computer networks. It describes three main types of errors: single-bit errors, frame errors with more than one bit corrupted, and burst errors where two or more consecutive bits are corrupted. It then explains three common error detection methods: parity check, cyclic redundancy check (CRC), and checksum. Parity check adds an extra bit to make the total number of 1s either even or odd. CRC uses a polynomial-based binary division method. Checksum counts the number of bits and includes the count for verification.
This document provides an overview of data link layer concepts including error control, flow control, error detection, error correction, and elementary data link protocols. It discusses the purposes and examples of error control using ARQ, flow control to prevent receiver overload, and various error detection techniques like parity checks, checksums, and cyclic redundancy checks (CRCs). Error correction codes are also introduced for detecting and correcting errors using additional redundant bits. Common data link protocols like stop-and-wait and sliding window protocols are listed for discussion in the course.
This document discusses error detection and correction techniques used in digital communication systems. It describes three types of errors that can occur during data transmission - single bit errors, multiple bit errors, and burst errors. It then explains various error detection codes like parity checking, cyclic redundancy check (CRC), longitudinal redundancy check (LRC), and checksum that are used to detect errors by adding redundancy to transmitted data. Finally, it discusses error correcting codes like Hamming codes that can detect and correct errors in the received data.
The document summarizes key aspects of the data link layer:
- It is responsible for frame transmission and error detection/correction between directly connected hosts.
- It has two sublayers: logical link control for flow/error control and media access control for media access.
- Functions include framing, addressing, synchronization, error detection/correction, and flow control. Common error detection techniques are parity checks and cyclic redundancy checks.
This document discusses error detection and correction techniques used in computer networks. It describes several methods:
- Vertical redundancy check (VRC or parity check) which detects single-bit errors by adding an extra parity bit to each data unit.
- Longitudinal redundancy check (LRC) which calculates parity bits for each column in a data block.
- Cyclic redundancy check (CRC) which uses binary division to generate a CRC remainder that is appended to the data.
- Checksum which calculates a sum of all data bits and appends the one's complement as a checksum. These methods allow detection of errors during data transmission.
This document discusses error detection and correction techniques used in digital communications. It describes how errors can occur during data transmission and why error detection and correction is needed. It then explains different types of errors and various error detection techniques like parity checks, checksums, and cyclic redundancy checks. Finally, it discusses error correction techniques like backward error correction using retransmissions and forward error correction using redundant bits and provides an example of Hamming codes.
The document discusses error detection and correction techniques. It explains that bit errors can occur during data transmission due to noise. Various error detection strategies are described, including parity schemes, checksum, and CRC. Parity schemes like even and odd parity can detect some errors but not all. Checksum adds up data words and transmits the sum. CRC generates a polynomial for data and divisor, allowing it to detect more error types than checksum. For error correction, Hamming codes are discussed which can detect and correct single bit errors by using redundant parity bits and calculating separate parities.
Satellite error detection and correction presentationAhmedMuhumed2
Ìý
This document summarizes key aspects of satellite communication including error detection and correction. It discusses the elements of a digital communication system including source and channel encoders/decoders. It defines different types of errors that can occur like single bit, multiple bits, and burst errors. It then explains various error detection techniques like parity check and cyclic redundancy check (CRC). It also discusses forward error correction (FEC) where redundant bits are added to allow errors to be corrected at the receiver without retransmission. Specific error correction coding schemes like linear block codes are also summarized.
Error coding uses mathematical formulas to encode data bits into longer code words for transmission. This allows errors caused by environmental interference to be detected and sometimes corrected at the destination. There are two main types of error coding: error-detecting codes and error-correcting codes. Error-detecting codes add enough redundancy to allow errors to be detected but not corrected, while error-correcting codes add more redundancy to allow errors to be corrected. Common error-detecting coding techniques include parity checks, checksums, and cyclic redundancy checks (CRCs). These techniques use additional redundant bits appended to the data to facilitate error detection. CRC is particularly powerful as it can detect all single-bit errors and many burst errors.
This document discusses error detection and correction in data transmission. It explains that networks must transfer data accurately and that errors can occur during transmission. It then describes different types of errors like single-bit errors and burst errors. It also discusses various techniques for error detection using redundancy like vertical redundancy check, longitudinal redundancy check, cyclic redundancy check, and checksums. Finally, it covers error correction methods like having the sender retransmit data or using error-correcting codes like Hamming codes to automatically correct certain errors.
Error correction error detection in digital communicationswatihalunde
Ìý
This document discusses error detection and correction techniques. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC), and checksum that work by adding redundant bits. CRC is more powerful than VRC and LRC as it can detect all single and some multiple bit errors. The document also covers error correction techniques like single-bit error correction using Hamming code that allows detecting and correcting single bit errors.
The document discusses error detection and correction techniques at the data link layer. It describes how errors can occur during data transmission and the need for reliable communication. Error detection allows a receiver to detect errors while error correction enables identifying and correcting bit errors without retransmission. Common techniques discussed include parity checks, checksums, and cyclic redundancy checks which add redundant bits to detect errors. CRC is based on binary division of data and checksum on addition. Forward error correction and retransmission are compared. Coding schemes use redundancy to detect or correct errors.
Human: Thank you for the summary. Can you provide a 2 sentence summary that captures the key aspects?
This document discusses error detection and correction techniques used in data communication. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC), and checksum that work by adding redundant bits. The document also covers error correction techniques like single-bit error correction using Hamming code which allows detecting and correcting single-bit errors.
This document discusses error detection and correction techniques used in data transmission. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC) and checksum that detect errors by adding redundant bits. CRC uses polynomial division to detect errors while checksum adds all data bits. Finally, it discusses single-bit error correction using Hamming code, which embeds location information of parity bits to identify and correct single-bit errors.
This document discusses error detection and correction techniques used in data transmission. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC) and checksum that detect errors by adding redundant bits. CRC uses polynomial division to detect errors while checksum adds all data bits. Finally, it discusses Hamming code, which allows detection and correction of single-bit errors by adding even more redundant bits in a specific way.
About types of errors, Error detection and its types -vertical redundancy check, Longitudinal redundancy check, cyclic redundancy check, checksum, example ,Error correction using Hamming code
The document discusses various types of errors that can occur during data transmission and different error detection and correction techniques. It defines transmission errors as errors caused when data is corrupted during network transmission. The main types of transmission errors are bit errors, multiple bit errors, and burst errors. Error detection techniques discussed include vertical redundancy check (VRC/parity check), longitudinal redundancy check (LRC), checksum, and cyclic redundancy check (CRC). Forward error correction techniques like Hamming codes are also summarized that allow detecting and correcting errors without retransmission.
computer Networks Error Detection and Correction.pptJayaprasanna4
Ìý
This document discusses error detection and correction in data transmission. It covers the following key points:
- There are two main types of errors: single-bit errors and burst errors. Burst errors are more common in serial transmission.
- Error detection verifies data accuracy without having the original message. It uses redundancy like vertical and longitudinal redundancy checks. Cyclic redundancy checks use polynomial division to detect errors.
- Error correction automatically fixes certain errors. Single-bit error correction reverses the value of the altered bit. Hamming codes use additional redundant bits to detect and correct single-bit errors.
This document discusses error detection techniques. It defines an error as a condition when output information does not match input information, which can occur during data transmission due to noise. It describes parity check, checksum, and cyclic redundancy check (CRC) as common error detection methods. Parity check involves adding a parity bit to ensure an even or odd number of 1s. Checksum uses addition of data segments and complementing the sum. CRC appends a remainder from binary division of data by a divisor to detect errors.
The document provides information about various data link layer concepts including:
1. The data link layer provides framing, flow control, and error control between network layers on different machines. It uses devices like switches and bridges.
2. Error detection methods include parity checks, checksums, and CRC to detect errors in transmitted frames.
3. Data link protocols for flow control include stop-and-wait, sliding window protocols, and ARQ methods like go-back-N and selective repeat.
4. Framing encapsulates data with headers and trailers using fixed or variable size frames. Methods like byte stuffing and bit stuffing handle special characters in the data.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load
Current Delay which delays the creation and storage of created Electromagnetic Field Energy around
the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field
Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the
generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of
an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In
Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be
generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing
zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity
Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any
magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared
to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy
performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to
the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and
the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads,
additional Input Power must be supplied to the Prime Mover and additional Mechanical Input
Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator,
an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive
Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1
MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the
Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric
Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the
Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field
Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the
system.
More Related Content
Similar to Error Detection in Data link layer or Transport layer (20)
This document discusses error detection and correction techniques used in digital communications. It describes how errors can occur during data transmission and why error detection and correction is needed. It then explains different types of errors and various error detection techniques like parity checks, checksums, and cyclic redundancy checks. Finally, it discusses error correction techniques like backward error correction using retransmissions and forward error correction using redundant bits and provides an example of Hamming codes.
The document discusses error detection and correction techniques. It explains that bit errors can occur during data transmission due to noise. Various error detection strategies are described, including parity schemes, checksum, and CRC. Parity schemes like even and odd parity can detect some errors but not all. Checksum adds up data words and transmits the sum. CRC generates a polynomial for data and divisor, allowing it to detect more error types than checksum. For error correction, Hamming codes are discussed which can detect and correct single bit errors by using redundant parity bits and calculating separate parities.
Satellite error detection and correction presentationAhmedMuhumed2
Ìý
This document summarizes key aspects of satellite communication including error detection and correction. It discusses the elements of a digital communication system including source and channel encoders/decoders. It defines different types of errors that can occur like single bit, multiple bits, and burst errors. It then explains various error detection techniques like parity check and cyclic redundancy check (CRC). It also discusses forward error correction (FEC) where redundant bits are added to allow errors to be corrected at the receiver without retransmission. Specific error correction coding schemes like linear block codes are also summarized.
Error coding uses mathematical formulas to encode data bits into longer code words for transmission. This allows errors caused by environmental interference to be detected and sometimes corrected at the destination. There are two main types of error coding: error-detecting codes and error-correcting codes. Error-detecting codes add enough redundancy to allow errors to be detected but not corrected, while error-correcting codes add more redundancy to allow errors to be corrected. Common error-detecting coding techniques include parity checks, checksums, and cyclic redundancy checks (CRCs). These techniques use additional redundant bits appended to the data to facilitate error detection. CRC is particularly powerful as it can detect all single-bit errors and many burst errors.
This document discusses error detection and correction in data transmission. It explains that networks must transfer data accurately and that errors can occur during transmission. It then describes different types of errors like single-bit errors and burst errors. It also discusses various techniques for error detection using redundancy like vertical redundancy check, longitudinal redundancy check, cyclic redundancy check, and checksums. Finally, it covers error correction methods like having the sender retransmit data or using error-correcting codes like Hamming codes to automatically correct certain errors.
Error correction error detection in digital communicationswatihalunde
Ìý
This document discusses error detection and correction techniques. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC), and checksum that work by adding redundant bits. CRC is more powerful than VRC and LRC as it can detect all single and some multiple bit errors. The document also covers error correction techniques like single-bit error correction using Hamming code that allows detecting and correcting single bit errors.
The document discusses error detection and correction techniques at the data link layer. It describes how errors can occur during data transmission and the need for reliable communication. Error detection allows a receiver to detect errors while error correction enables identifying and correcting bit errors without retransmission. Common techniques discussed include parity checks, checksums, and cyclic redundancy checks which add redundant bits to detect errors. CRC is based on binary division of data and checksum on addition. Forward error correction and retransmission are compared. Coding schemes use redundancy to detect or correct errors.
Human: Thank you for the summary. Can you provide a 2 sentence summary that captures the key aspects?
This document discusses error detection and correction techniques used in data communication. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC), and checksum that work by adding redundant bits. The document also covers error correction techniques like single-bit error correction using Hamming code which allows detecting and correcting single-bit errors.
This document discusses error detection and correction techniques used in data transmission. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC) and checksum that detect errors by adding redundant bits. CRC uses polynomial division to detect errors while checksum adds all data bits. Finally, it discusses single-bit error correction using Hamming code, which embeds location information of parity bits to identify and correct single-bit errors.
This document discusses error detection and correction techniques used in data transmission. It describes different types of errors like single-bit errors and burst errors. It then explains various error detection methods like vertical redundancy check (VRC), longitudinal redundancy check (LRC), cyclic redundancy check (CRC) and checksum that detect errors by adding redundant bits. CRC uses polynomial division to detect errors while checksum adds all data bits. Finally, it discusses Hamming code, which allows detection and correction of single-bit errors by adding even more redundant bits in a specific way.
About types of errors, Error detection and its types -vertical redundancy check, Longitudinal redundancy check, cyclic redundancy check, checksum, example ,Error correction using Hamming code
The document discusses various types of errors that can occur during data transmission and different error detection and correction techniques. It defines transmission errors as errors caused when data is corrupted during network transmission. The main types of transmission errors are bit errors, multiple bit errors, and burst errors. Error detection techniques discussed include vertical redundancy check (VRC/parity check), longitudinal redundancy check (LRC), checksum, and cyclic redundancy check (CRC). Forward error correction techniques like Hamming codes are also summarized that allow detecting and correcting errors without retransmission.
computer Networks Error Detection and Correction.pptJayaprasanna4
Ìý
This document discusses error detection and correction in data transmission. It covers the following key points:
- There are two main types of errors: single-bit errors and burst errors. Burst errors are more common in serial transmission.
- Error detection verifies data accuracy without having the original message. It uses redundancy like vertical and longitudinal redundancy checks. Cyclic redundancy checks use polynomial division to detect errors.
- Error correction automatically fixes certain errors. Single-bit error correction reverses the value of the altered bit. Hamming codes use additional redundant bits to detect and correct single-bit errors.
This document discusses error detection techniques. It defines an error as a condition when output information does not match input information, which can occur during data transmission due to noise. It describes parity check, checksum, and cyclic redundancy check (CRC) as common error detection methods. Parity check involves adding a parity bit to ensure an even or odd number of 1s. Checksum uses addition of data segments and complementing the sum. CRC appends a remainder from binary division of data by a divisor to detect errors.
The document provides information about various data link layer concepts including:
1. The data link layer provides framing, flow control, and error control between network layers on different machines. It uses devices like switches and bridges.
2. Error detection methods include parity checks, checksums, and CRC to detect errors in transmitted frames.
3. Data link protocols for flow control include stop-and-wait, sliding window protocols, and ARQ methods like go-back-N and selective repeat.
4. Framing encapsulates data with headers and trailers using fixed or variable size frames. Methods like byte stuffing and bit stuffing handle special characters in the data.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load
Current Delay which delays the creation and storage of created Electromagnetic Field Energy around
the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field
Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the
generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of
an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In
Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be
generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing
zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity
Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any
magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared
to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy
performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to
the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and
the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads,
additional Input Power must be supplied to the Prime Mover and additional Mechanical Input
Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator,
an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive
Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1
MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the
Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric
Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the
Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field
Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the
system.
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...ASHISHDESAI85
Ìý
Combining 3D printing with Internet of Things (IoT) enables the creation of smart, connected, and customizable objects that can monitor, control, and optimize their performance, potentially revolutionizing various industries. oT-enabled 3D printers can use sensors to monitor the quality of prints during the printing process. If any defects or deviations from the desired specifications are detected, the printer can adjust its parameters in real time to ensure that the final product meets the required standards.
Indian Soil Classification System in Geotechnical EngineeringRajani Vyawahare
Ìý
This PowerPoint presentation provides a comprehensive overview of the Indian Soil Classification System, widely used in geotechnical engineering for identifying and categorizing soils based on their properties. It covers essential aspects such as particle size distribution, sieve analysis, and Atterberg consistency limits, which play a crucial role in determining soil behavior for construction and foundation design. The presentation explains the classification of soil based on particle size, including gravel, sand, silt, and clay, and details the sieve analysis experiment used to determine grain size distribution. Additionally, it explores the Atterberg consistency limits, such as the liquid limit, plastic limit, and shrinkage limit, along with a plasticity chart to assess soil plasticity and its impact on engineering applications. Furthermore, it discusses the Indian Standard Soil Classification (IS 1498:1970) and its significance in construction, along with a comparison to the Unified Soil Classification System (USCS). With detailed explanations, graphs, charts, and practical applications, this presentation serves as a valuable resource for students, civil engineers, and researchers in the field of geotechnical engineering.
Air pollution is contamination of the indoor or outdoor environment by any ch...dhanashree78
Ìý
Air pollution is contamination of the indoor or outdoor environment by any chemical, physical or biological agent that modifies the natural characteristics of the atmosphere.
Household combustion devices, motor vehicles, industrial facilities and forest fires are common sources of air pollution. Pollutants of major public health concern include particulate matter, carbon monoxide, ozone, nitrogen dioxide and sulfur dioxide. Outdoor and indoor air pollution cause respiratory and other diseases and are important sources of morbidity and mortality.
WHO data show that almost all of the global population (99%) breathe air that exceeds WHO guideline limits and contains high levels of pollutants, with low- and middle-income countries suffering from the highest exposures.
Air quality is closely linked to the earth’s climate and ecosystems globally. Many of the drivers of air pollution (i.e. combustion of fossil fuels) are also sources of greenhouse gas emissions. Policies to reduce air pollution, therefore, offer a win-win strategy for both climate and health, lowering the burden of disease attributable to air pollution, as well as contributing to the near- and long-term mitigation of climate change.
Welcome to the March 2025 issue of WIPAC Monthly the magazine brought to you by the LinkedIn Group WIPAC Monthly.
In this month's edition, on top of the month's news from the water industry we cover subjects from the intelligent use of wastewater networks, the use of machine learning in water quality as well as how, we as an industry, need to develop the skills base in developing areas such as Machine Learning and Artificial Intelligence.
Enjoy the latest edition
2. WHAT IS ERROR IN NETWORKING
The data link layer is responsible for the reliable transmission of data frames between two
directly connected nodes over a physical medium, such as ethernet or wi-fi.
Errors in the data link layer refer to the corruption or loss of data during this transmission
process. There are several types of errors that can occur at the data link layer.
Bit Errors Frame Loss
Frame
Duplication
Frame Mis
ordering
Frame
Corruption
Collision
3. TYPES OF ERROR
Single bit error:
• In a frame, there is only one bit, anywhere though, which is corrupt.
Multiple bits error:
• Frame is received with more than one bits in corrupted state.
Burst error:
• Frame contains more than 1 consecutive bits corrupted
4. SINGLE BIT ERROR
Single-bit error does not appear more likely in serial data transmission. For example,
sender sends the data at 10 mbps, this means that the bit lasts only for 1 ‘s and for a
single-bit error to occurred, a noise must be more than 1 ‘s.
Single-bit error mainly occurs in parallel data transmission. For example, if eight wires
are used to send the eight bits of a byte, if one of the wire is noisy, then single-bit is
corrupted per byte.
5. WAYS TO CHECK
Parity bit: in a parity bit scheme, an additional bit is added to each byte
or character to make the total number of ones either even (even parity) or
odd (odd parity). The receiver can then check if the number of ones in the
received data matches the expected parity, thus detecting single-bit errors.
Checksum: checksums involve performing a mathematical calculation on the
data and sending the result along with the data. The receiver recalculates
the checksum and compares it to the received value. If they don't match, an
error is detected.
6. MULTIPLE-BIT ERRORS
A multiple-bit error occurs when more than one bit in a data frame is changed during
transmission.
These errors are more likely to go undetected by simple error detection techniques like
parity bit and checksum.
However, more advanced techniques like cyclic redundancy check (CRC) can still be
effective in detecting multiple-bit errors.
7. WAYS TO CHECK
Cyclic Redundancy Check (CRC): CRC is a powerful error
detection technique that uses polynomial codes to
generate a checksum. The receiver performs the same
calculation and checks whether the received CRC matches
the calculated CRC. CRC is capable of detecting a wide
range of errors, including multiple-bit errors.
8. BURST ERRORS
Burst errors are consecutive errors that occur within a short span of time. These
errors are typically caused by factors like signal fading, interference, or noise
that affect a group of adjacent bits. Burst errors can be particularly problematic,
as they can cause significant data corruption.
9. WAYS TO CHECK
Hamming code: hamming codes are error-correcting codes that add
redundant bits to the data. These codes are designed to correct single-bit
errors and detect multiple-bit errors. They are particularly effective at
correcting burst errors of a certain length.
Interleaving: interleaving involves rearranging the data bits before
transmission so that consecutive bits are separated by a fixed distance. This
helps to spread out burst errors and reduces the likelihood of multiple
errors affecting adjacent bits.
11. SINGLE BIT PARITY ERROR DETECTION
Parity bit is a simple error detection
technique commonly used to detect single-bit
errors in data transmission. It involves adding
an extra bit, known as the parity bit, to the
original data before transmission. The parity
bit is set to either 0 or 1, depending on
whether the total number of 1s in the data
(including the parity bit) is meant to be even
(even parity) or odd (odd parity).
Even
Parity
Odd
Parity
12. EVEN PARITY CHECKING
If the total number of 1s in the data (including the parity bit) is an even
number, the parity bit is set to 0. This ensures that the total number of 1s
remains even.
If a single bit is flipped during transmission, it will result in an odd number
of 1s in the received data. The parity check at the receiving end will then
detect this error, as the total number of 1s will no longer be even.
13. ODD PARITY CHECKING
If the total number of 1s in the data (including the parity bit) is an odd
number, the parity bit is set to 1. This ensures that the total number of 1s
remains odd.
If a single bit is flipped during transmission, it will result in an even
number of 1s in the received data. The parity check at the receiving end
will then detect this error, as the total number of 1s will no longer be
odd.
15. TWO-DIMENSIONAL PARITY CHECK
Performance can be improved by using Two-Dimensional Parity Check which organizes
the data in the form of a table.
Parity check bits are computed for each row, which is equivalent to the single-parity check.
In Two-Dimensional Parity check, a block of bits is divided into rows, and the redundant
row of bits is added to the whole block.
At the receiving end, the parity bits are compared with the parity bits computed from the
received data.
17. CHECKSUM
Checksum Generator
• A Checksum is generated at the sending side. Checksum generator subdivides the data into
equal segments of n bits each, and all these segments are added together by using one's
complement arithmetic. The sum is complemented and appended to the original data, known as
checksum field. The extended data is transmitted across the network.
Checksum Checker
• A Checksum is verified at the receiving side. The receiver subdivides the incoming data into
equal segments of n bits each, and all these segments are added together, and then this sum is
complemented. If the complement of the sum is zero, then the data is accepted otherwise data
is rejected.
19. EXAMPLE
Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are 11001100, 10101010, 11110000
and 11000011.The sender adds the bits using 1s complement arithmetic. While adding two numbers using 1s complement
arithmetic, if there is a carry over, it is added to the sum.
The sender adds the bits using 1s complement arithmetic. While adding two numbers using 1s complement arithmetic, if there
is a carry over, it is added to the sum.
After adding all the 4 frames, the sender complements the sum to get the checksum, 11010011, and sends it along with the
data frames.
The receiver performs 1s complement arithmetic sum of all the frames including the checksum. The result is complemented and
found to be 0. Hence, the receiver assumes that no error has occurred.
21. CYCLIC REDUNDANCY CHECK (CRC)
In CRC technique, a string of n 0s is appended to the data unit, and this n number is less than the
number of bits in a predetermined number, known as division which is n+1 bits.
Secondly, the newly extended data is divided by a divisor using a process is known as binary
division. The remainder generated from this division is known as CRC remainder.
Thirdly, the CRC remainder replaces the appended 0s at the end of the original data. This newly
generated unit is sent to the receiver.
The receiver receives the data followed by the CRC remainder. The receiver will treat this whole unit
as a single unit, and it is divided by the same divisor that was used to find the CRC remainder.
23. CRC GENERATOR
A CRC generator uses a modulo-2 division. Firstly, three zeroes are appended at the end of the data as the length of
the divisor is 4 and we know that the length of the string 0s to be appended is always one less than the length of the
divisor.
Now, the string becomes 11100000, and the resultant string is divided by the divisor 1001.
The remainder generated from the binary division is known as CRC remainder. The generated value of the CRC
remainder is 111.
CRC remainder replaces the appended string of 0s at the end of the data unit, and the final string would be
11100111 which is sent across the network.
24. CRC CHECKER
The functionality of the CRC checker is similar to the CRC generator.
When the string 11100111 is received at the receiving end, then CRC checker performs
the modulo-2 division.
A string is divided by the same divisor, i.e., 1001.
In this case, CRC checker generates the remainder of zero. Therefore, the data is
accepted.