Preview

Error Detection and Correction

Good Essays
Open Document
Open Document
1736 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Error Detection and Correction
Error Detection and Correction
Transmission of data through a noisy medium inevitably introduces errors through interference by changing one or more bits. There are two types of errors, in single bit errors, a 0 may be turned into a 1 or vice versa. In real world conditions, most interference introduce burst errors where two or more bits are switched from a 0 to a 1 and vice versa.
Types of Errors 1. Single-Bit Error – a single bit is switched from a 0 to a 1 or a 1 to a 0 2. Burst Error – one or more bits are flipped.
Single Bit Error 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |

0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |

Burst Error | | | Length of burstError (8 bits) | | | | | | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 1 |

0 | 1 | 0 | 1 | 1 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 1 |

The number of bits affected by noise or interference depends on the data rate and the duration of the noise.
Hamming Distance – The number of positions at which two strings are different, from the binary string depicted above shows a distance of four (4).
To detect or correct errors, extra (redundant) bits need to be sent.
Error detection – we only need to know if an error in the data has occured, usually by employing a checksum or hash algorithm.
Error correction – we need not just the number of bits corrupted but also the location of the corrupted bits and reconstructing the original, error-free data.
Redundancy is achieved through various coding schemes. The sender adds redundant bits through a process that creates a relationship between the redundant bits and the actual bits. The two sets of bits are then checked against each other to detect or correct any errors.
Error detection can be realized by using various methods, some of which are listed below: 1. Repetition Codes 2. Parity Bits 3. Checksums 4. Cyclic Redundancy Checks
Error correction algorithms can also be used to detect errors.
Two methods of Error

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Error detection – It is useful to have some error detection capability built into the physical signaling encoding scheme. This allows to be detected more quickly.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    pt1420 unit 3

    • 395 Words
    • 2 Pages

    Noise- is any extraneous signal that interferes with the desired signal normally present or in passing through the system.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    The first category of faults flips random bits in random instructions of the program text to emulate hardware faults. These faults are easy to inject, and they cause a variety of different crashes. It is difficult to relate a bit flip with a specific error in programming, and most hardware bit flips would be caught by parity on the data or address bus.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (BSOP334 Week 1 Lab Solutions For Faculty) Answers to Lab 1 Chapter 11: Problems 7 and 9 (Pages 504-505) 7. a. No backlogs are allowed | Period | Mar. | Apr. | May | Jun. | July | Aug. | Sep. | Total | | Forecast | 50 | 44 | 55 | 60 | 50 | 40 | 51 | 350 | | Output | | | | | | | | | | Regular | 40 | 40 | 40 | 40 | 40 | 40 | 40 | 280 | | Overtime | 8 | 8 | 8 | 8 | 8 | 3 | 8 | 51 | | Subcontract | 2 | 0 | 3 | 12 | 2 | 0 | 0…

    • 972 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Function Test to exercise the processing logic of the system to expose errors in data base updates, calculations and edits and to ensure that the system delivers all functionality described in the Preliminary…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bba 340 Wa

    • 283 Words
    • 2 Pages

    Data quality assurance refers to a few different things. It can simply be the profiling of certain data to discover any inconsistencies, and anomalies in the data. It can also refer to certain cleansing activities, such as the removal of outliers in hopes of improving the data quality . Data quality assurance can help accuracy, completeness, consistency, and timeliness. In addition data quality assurance can help :…

    • 283 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    The second step a company can take is utilizing data entry controls, which is performing several checks to ensure that the information is correct, one example would be a field check where the individual will determine whether the characters in a field are of the proper type (e.g. if you are expecting a zip code and you do not have numeric characters, there would obviously be an issue) (Romney, & Steinbart, 2012).…

    • 358 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Muscular Strength

    • 1323 Words
    • 6 Pages

    There are different sources of potential errors depending on subjects (fatigue, motivation, hydration, injuries), technician (level of training, experience), the equipment (calibration) and environment (room temperature, humidity). With a small number of observations and participants cost of each error is reasonably high and more difficult to detect.…

    • 1323 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Technology Perks

    • 1344 Words
    • 6 Pages

    Accuracy of data input is vital to businesses. A misunderstanding or inaccurate results can cause business interruptions and become costly. The method of data input is different for every situation.…

    • 1344 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Hassan Private Label

    • 1077 Words
    • 5 Pages

    Question 1: How would you describe HPL and its position within the private label personal care industry?…

    • 1077 Words
    • 5 Pages
    Good Essays
  • Good Essays

    can cause by many factors. Most of the errors are occur during transmission of data.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Blah Blah

    • 1031 Words
    • 5 Pages

    - Information should be verifiable. This means that you can check it to make sure it is correct, perhaps…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Linear Block Codes

    • 864 Words
    • 4 Pages

    A systematic (n,k) linear block code is a mapping from a k-dimensional message vector to an ndimensional codeword in such a way that part of the sequence generated coincides with the k message digits. The difference (n − k) represents the parity bits. A systematic linear block will have a [k × n] generator matrix [G] of the form…

    • 864 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Clinic Management System

    • 507 Words
    • 3 Pages

    Once data have been screened for typographical errors, the data can be validated to check for…

    • 507 Words
    • 3 Pages
    Good Essays