Preview

Error Detection and Correction

Good Essays
Open Document
Open Document
1736 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Error Detection and Correction
Error Detection and Correction
Transmission of data through a noisy medium inevitably introduces errors through interference by changing one or more bits. There are two types of errors, in single bit errors, a 0 may be turned into a 1 or vice versa. In real world conditions, most interference introduce burst errors where two or more bits are switched from a 0 to a 1 and vice versa.
Types of Errors 1. Single-Bit Error – a single bit is switched from a 0 to a 1 or a 1 to a 0 2. Burst Error – one or more bits are flipped.
Single Bit Error 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |

0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |

Burst Error | | | Length of burstError (8 bits) | | | | | | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 1 |

0 | 1 | 0 | 1 | 1 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 1 |

The number of bits affected by noise or interference depends on the data rate and the duration of the noise.
Hamming Distance – The number of positions at which two strings are different, from the binary string depicted above shows a distance of four (4).
To detect or correct errors, extra (redundant) bits need to be sent.
Error detection – we only need to know if an error in the data has occured, usually by employing a checksum or hash algorithm.
Error correction – we need not just the number of bits corrupted but also the location of the corrupted bits and reconstructing the original, error-free data.
Redundancy is achieved through various coding schemes. The sender adds redundant bits through a process that creates a relationship between the redundant bits and the actual bits. The two sets of bits are then checked against each other to detect or correct any errors.
Error detection can be realized by using various methods, some of which are listed below: 1. Repetition Codes 2. Parity Bits 3. Checksums 4. Cyclic Redundancy Checks
Error correction algorithms can also be used to detect errors.
Two methods of Error

You May Also Find These Documents Helpful

  • Good Essays

    Function Test to exercise the processing logic of the system to expose errors in data base updates, calculations and edits and to ensure that the system delivers all functionality described in the Preliminary…

    • 960 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT1330 Week 3 exercise

    • 251 Words
    • 2 Pages

    Noise – Anything that interferes with or slows down the clarity or accuracy of communications.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Midterm Exam

    • 2086 Words
    • 9 Pages

    B. The channel of the message is faulty, or else the correct term would be sent and received.…

    • 2086 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    The second step a company can take is utilizing data entry controls, which is performing several checks to ensure that the information is correct, one example would be a field check where the individual will determine whether the characters in a field are of the proper type (e.g. if you are expecting a zip code and you do not have numeric characters, there would obviously be an issue) (Romney, & Steinbart, 2012).…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technology Perks

    • 1344 Words
    • 6 Pages

    Accuracy of data input is vital to businesses. A misunderstanding or inaccurate results can cause business interruptions and become costly. The method of data input is different for every situation.…

    • 1344 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    Error detection – It is useful to have some error detection capability built into the physical signaling encoding scheme. This allows to be detected more quickly.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Coding Theory Case Study

    • 1093 Words
    • 3 Pages

    The first two aspects, error detecting and error correcting can be studied together. When a digital message is transmitted, it is done so by a sequence of 0’s and 1’s which encodes a given message. These messages have the potential of being corrupted by noise. Once a message is written an error-detecting code can be written into the message so that any errors can be detected and corrected before the message reaches its final destination. One of the most common types of error- detecting code is called a parity check. A parity check is “the process that ensure accurate data transmission between nodes during communication. A parity bit is appende to the original data bits to create an even or odd bit number; the number of bits with one value. The source then transmits this data via a link, and bits are checked and verified at the destination. Data is considered accurate if the number of bits (even or odd) matches the number transmitted from the source.” (Janseen, 2014) An example could be the message 1101. We add a 0 or 1 to the end of…

    • 1093 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    (BSOP334 Week 1 Lab Solutions For Faculty) Answers to Lab 1 Chapter 11: Problems 7 and 9 (Pages 504-505) 7. a. No backlogs are allowed | Period | Mar. | Apr. | May | Jun. | July | Aug. | Sep. | Total | | Forecast | 50 | 44 | 55 | 60 | 50 | 40 | 51 | 350 | | Output | | | | | | | | | | Regular | 40 | 40 | 40 | 40 | 40 | 40 | 40 | 280 | | Overtime | 8 | 8 | 8 | 8 | 8 | 3 | 8 | 51 | | Subcontract | 2 | 0 | 3 | 12 | 2 | 0 | 0…

    • 972 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hassan Private Label

    • 1077 Words
    • 5 Pages

    Question 1: How would you describe HPL and its position within the private label personal care industry?…

    • 1077 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Bba 340 Wa

    • 283 Words
    • 2 Pages

    Data quality assurance refers to a few different things. It can simply be the profiling of certain data to discover any inconsistencies, and anomalies in the data. It can also refer to certain cleansing activities, such as the removal of outliers in hopes of improving the data quality . Data quality assurance can help accuracy, completeness, consistency, and timeliness. In addition data quality assurance can help :…

    • 283 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Clinic Management System

    • 507 Words
    • 3 Pages

    Once data have been screened for typographical errors, the data can be validated to check for…

    • 507 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Blah Blah

    • 1031 Words
    • 5 Pages

    - Information should be verifiable. This means that you can check it to make sure it is correct, perhaps…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Linear Block Codes

    • 864 Words
    • 4 Pages

    A systematic (n,k) linear block code is a mapping from a k-dimensional message vector to an ndimensional codeword in such a way that part of the sequence generated coincides with the k message digits. The difference (n − k) represents the parity bits. A systematic linear block will have a [k × n] generator matrix [G] of the form…

    • 864 Words
    • 4 Pages
    Powerful Essays