2
Most read
7
Most read
9
Most read
W E L C O M E T O O U R
P R E S E N TAT I O N
Our presentation topic is:
Error Detection and Correction.
Group members are:
Md. Badrul alam 152-15-6156
Jamal Khan Hridoy 152-15-6192
Md. Abdullah al Obayed 152-15-6166
Md. Tamim Rahman 152-15-6186
“Data can be corrupted during transmission.
For reliable communication, errors must be
detected and corrected.”
What is Error?
Ans: Error is a condition when the output information does not match with the
input information. During transmission, digital signals suffer from noise that ca
introduce errors in the binary bits travelling from one system to other.
That means a 0 bit may change to 1 or a 1 bit may change to 0.
Error Detection: Error detection is the detection of errors
caused by noise or other impairments during transmission
from the transmitter to the receiver.
Error correction: Error correction is the detection of errors
and reconstruction of the original, error-free data.
Type of Error:
 Single bit error.
 Multi bits error.
 Burst bits error.
Single bit error: In a frame, there is only one bit, anywhere though, which is corrupt.
Multi bits error: Frame is received with more than one bits in corrupted state.
0 1 0 1 0 0 1 1 1 0
1 1 0 1 1 1 0 0 0 1
Burst bits error: Frame contains more than1 consecutive bits corrupted..
0 1 0 1 0 0 0 1 0 0
Sent
Sent
Sent
Received
Received
Received
Hamming code: In telecommunication, Hamming codes are a family
of linear error-correcting. Hamming codes can detect up to two-bit
or correct one-bit errors without detection of uncorrected errors.
Parity bit: A parity bit, or check bit is a bit added to the end of a string
of binary code that indicates where the number of bits in the string with
the value one is even or odd. Parity bits are used as the simplest form
of error detecting code.
Error Detection and Correction process:
We are using hamming code for error detection and correction.
 Suppose ASCII code Y = 1011001. The data word is 7-bits.
 Through the four hamming parity bits h1,h2,h3,h4 as 1,2,4 and 8 position with this word
and arrange the 11 bits as follows:
Bit position:
1 0 1 h4 1 0 0 h3 1 h2 h1
11 10 9 8 7 6 5 4 3 2 1
1 0 1 h4 1 0 0 h3 1 h2 h1
11 10 9 8 7 6 5 4 3 2 1
Bit position:
 Select position of logic bit 1 for finding hamming code.
 Here logic bits 1 number of position as 3, 7, 9 and 11
 Now convert this data to binary code and addition this data using XOR operation.
 Avoid carry when applying addition.
3 = 0 0 1 1
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
Y = 1011001
0110
h4 h3 h2 h1
1 0 1 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Putting value of h1,h2,h3 and h4 for get hamming code.
 Again select position of logic bit 1 for finding hamming code.
 Here the logic bits are 1 number of position as 2, 3, 4, 7, 9 and 11.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
 Addition this data applying XOR operation.
 If additional result all bits are 0. Then there is no error.
000 0
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 1 to 0 no of bit position 9.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
11 = 1 0 1 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
101 0 = 9
1 0 1 0 1 0 0 1 0 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 0 to 1 no of bit position3.
2 = 0 0 1 0
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
11 = 1 0 1 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 0 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
100 1 = 3
0 0 1 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
 Suppose change 1 to 0 no of bit position11.
2 = 0 0 1 0
3 = 0 0 1 1
4 = 0 1 0 0
7 = 0 1 1 1
9 = 1 0 0 1
 Applying hamming code rules.
1 0 0 0 1 0 0 1 1 1 0
11 10 9 8 7 6 5 4 3 2 1
Y = 1011001
101 1 = 11
USAGE OF HAMMING CODE
 Hamming coding is only of use as a source code as a computer program to
compress the characters. As a result it is only carried out in the front-end
processor.
 In Bangladesh railway business(Signaling) we have to follow specific safety
standards. An important aspect is the data transferee is closed transmission system.
Extremely effective on networks where the
data streams are given to single-bit errors.
ADVANTAGE OF HAMMING CODE
 Single-bit detection and correction code, if multiple
bits are errored then the errors are detected but
the resultant could cause another bit that is correct
to be changed, causing the data to be further
errored.
DISADVANTAGE OF HAMMING CODE
 Hamming code only can solve up to single
bits.
THANK YOU.

More Related Content

PPT
Error Detection And Correction
PPTX
Event managementsystem
PPT
Error detection and correction
PDF
livro filosofia soluções.pdf
PPTX
Presentation on python
PPTX
Bayes Theorem
PPTX
Presentation on Transmission Media
Error Detection And Correction
Event managementsystem
Error detection and correction
livro filosofia soluções.pdf
Presentation on python
Bayes Theorem
Presentation on Transmission Media

What's hot (20)

PPT
Hamming codes
PPTX
Signed Addition And Subtraction
PDF
Multiplexing
PPT
Error detection correction (CRC)
PPTX
TCP and UDP
PPTX
Computer arithmetic
PPTX
Distance Vector Routing
PPT
Unit 3 Network Layer PPT
PPTX
Transport layer protocol
PPTX
Computer Networks - Error Detection & Error Correction
PPTX
Error Detection and Correction - Data link Layer
PPTX
Mobile Transport layer
PPTX
Computer network switching
PPTX
Floating point representation
PPT
Chapter 4 data link layer
PPTX
Chapter 10
PPT
data-link layer protocols
PPTX
Information Theory Coding 1
PDF
INTRODUCTION TO NETWORK LAYER
Hamming codes
Signed Addition And Subtraction
Multiplexing
Error detection correction (CRC)
TCP and UDP
Computer arithmetic
Distance Vector Routing
Unit 3 Network Layer PPT
Transport layer protocol
Computer Networks - Error Detection & Error Correction
Error Detection and Correction - Data link Layer
Mobile Transport layer
Computer network switching
Floating point representation
Chapter 4 data link layer
Chapter 10
data-link layer protocols
Information Theory Coding 1
INTRODUCTION TO NETWORK LAYER
Ad

Similar to Error Detection and Correction presentation (20)

PDF
crc_checksum.pdf
PPTX
Digital Logic BCA TU Chapter 2.2
PPTX
UNIT-V.pptx
PPTX
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
PPTX
Digital logic designing presentation
PPT
Error detection and correction unit-05
PDF
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
PPTX
Linear Block Codes
PDF
K034066071
PPT
15CS46 - Data communication or computer networks 1_Module-3.ppt
PPT
Error detection and correction codes
PDF
Error.pdf
PPT
chapter-3-data-link-layer.ppt
PDF
Number system
PPTX
Hamming code system
PPTX
Computer_Communication_Networking_L07Data_Link_Error_control.pptx
PPTX
Error detection.
DOCX
Error dectation and correction
PDF
07 Data Link LayerError Control.pdf
PPT
Error Detection and Error Correction by MHM.ppt
crc_checksum.pdf
Digital Logic BCA TU Chapter 2.2
UNIT-V.pptx
ERROR DETECTION IN DATA COMMUNICATION AND NETWORKING-1.pptx
Digital logic designing presentation
Error detection and correction unit-05
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Linear Block Codes
K034066071
15CS46 - Data communication or computer networks 1_Module-3.ppt
Error detection and correction codes
Error.pdf
chapter-3-data-link-layer.ppt
Number system
Hamming code system
Computer_Communication_Networking_L07Data_Link_Error_control.pptx
Error detection.
Error dectation and correction
07 Data Link LayerError Control.pdf
Error Detection and Error Correction by MHM.ppt
Ad

More from Badrul Alam (18)

PDF
E filling system (report)
PPT
E file(final-defense)
DOCX
E filling system (report)
PPTX
E file (title-defense)
PPT
E file(pre-defense)
PPTX
Albert einstein presentation
PPTX
Fedora os presentation
DOCX
Security features of fedora
PPTX
Factorial number in linux shell.
PPTX
Simulation of Queueing Systems(Single-Channel Queue).
PPTX
Longest Common Sub-sequence (LCS)
PPTX
Equivalence and minimization of DFA
PPTX
Loop(for, while, do while) condition Presentation
PPTX
Logical, Shift, and Rotate Instruction
DOCX
Networking assignment
PPTX
Schema relationship to E-R diagram
PPTX
Automatic light control Using LDR
PPTX
Pipeline processing and generation of computer.
E filling system (report)
E file(final-defense)
E filling system (report)
E file (title-defense)
E file(pre-defense)
Albert einstein presentation
Fedora os presentation
Security features of fedora
Factorial number in linux shell.
Simulation of Queueing Systems(Single-Channel Queue).
Longest Common Sub-sequence (LCS)
Equivalence and minimization of DFA
Loop(for, while, do while) condition Presentation
Logical, Shift, and Rotate Instruction
Networking assignment
Schema relationship to E-R diagram
Automatic light control Using LDR
Pipeline processing and generation of computer.

Recently uploaded (20)

PDF
IP : I ; Unit I : Preformulation Studies
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
PowerPoint for Climate Change by T.T.pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Climate Change and Its Global Impact.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
Farming Based Livelihood Systems English Notes
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
IP : I ; Unit I : Preformulation Studies
Core Concepts of Personalized Learning and Virtual Learning Environments
Journal of Dental Science - UDMY (2022).pdf
PowerPoint for Climate Change by T.T.pdf
Climate and Adaptation MCQs class 7 from chatgpt
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Climate Change and Its Global Impact.pptx
semiconductor packaging in vlsi design fab
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
M.Tech in Aerospace Engineering | BIT Mesra
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Environmental Education MCQ BD2EE - Share Source.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Civil Department's presentation Your score increases as you pick a category
Everyday Spelling and Grammar by Kathi Wyldeck
Farming Based Livelihood Systems English Notes
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Literature_Review_methods_ BRACU_MKT426 course material

Error Detection and Correction presentation

  • 1. W E L C O M E T O O U R P R E S E N TAT I O N
  • 2. Our presentation topic is: Error Detection and Correction. Group members are: Md. Badrul alam 152-15-6156 Jamal Khan Hridoy 152-15-6192 Md. Abdullah al Obayed 152-15-6166 Md. Tamim Rahman 152-15-6186
  • 3. “Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected.”
  • 4. What is Error? Ans: Error is a condition when the output information does not match with the input information. During transmission, digital signals suffer from noise that ca introduce errors in the binary bits travelling from one system to other. That means a 0 bit may change to 1 or a 1 bit may change to 0.
  • 5. Error Detection: Error detection is the detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver. Error correction: Error correction is the detection of errors and reconstruction of the original, error-free data.
  • 6. Type of Error:  Single bit error.  Multi bits error.  Burst bits error. Single bit error: In a frame, there is only one bit, anywhere though, which is corrupt. Multi bits error: Frame is received with more than one bits in corrupted state. 0 1 0 1 0 0 1 1 1 0 1 1 0 1 1 1 0 0 0 1 Burst bits error: Frame contains more than1 consecutive bits corrupted.. 0 1 0 1 0 0 0 1 0 0 Sent Sent Sent Received Received Received
  • 7. Hamming code: In telecommunication, Hamming codes are a family of linear error-correcting. Hamming codes can detect up to two-bit or correct one-bit errors without detection of uncorrected errors. Parity bit: A parity bit, or check bit is a bit added to the end of a string of binary code that indicates where the number of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code.
  • 8. Error Detection and Correction process: We are using hamming code for error detection and correction.  Suppose ASCII code Y = 1011001. The data word is 7-bits.  Through the four hamming parity bits h1,h2,h3,h4 as 1,2,4 and 8 position with this word and arrange the 11 bits as follows: Bit position: 1 0 1 h4 1 0 0 h3 1 h2 h1 11 10 9 8 7 6 5 4 3 2 1
  • 9. 1 0 1 h4 1 0 0 h3 1 h2 h1 11 10 9 8 7 6 5 4 3 2 1 Bit position:  Select position of logic bit 1 for finding hamming code.  Here logic bits 1 number of position as 3, 7, 9 and 11  Now convert this data to binary code and addition this data using XOR operation.  Avoid carry when applying addition. 3 = 0 0 1 1 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1 Y = 1011001 0110 h4 h3 h2 h1
  • 10. 1 0 1 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Putting value of h1,h2,h3 and h4 for get hamming code.  Again select position of logic bit 1 for finding hamming code.  Here the logic bits are 1 number of position as 2, 3, 4, 7, 9 and 11. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1  Addition this data applying XOR operation.  If additional result all bits are 0. Then there is no error. 000 0
  • 11. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 1 to 0 no of bit position 9. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 11 = 1 0 1 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 101 0 = 9
  • 12. 1 0 1 0 1 0 0 1 0 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 0 to 1 no of bit position3. 2 = 0 0 1 0 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1 11 = 1 0 1 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 0 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 100 1 = 3
  • 13. 0 0 1 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1  Suppose change 1 to 0 no of bit position11. 2 = 0 0 1 0 3 = 0 0 1 1 4 = 0 1 0 0 7 = 0 1 1 1 9 = 1 0 0 1  Applying hamming code rules. 1 0 0 0 1 0 0 1 1 1 0 11 10 9 8 7 6 5 4 3 2 1 Y = 1011001 101 1 = 11
  • 14. USAGE OF HAMMING CODE  Hamming coding is only of use as a source code as a computer program to compress the characters. As a result it is only carried out in the front-end processor.  In Bangladesh railway business(Signaling) we have to follow specific safety standards. An important aspect is the data transferee is closed transmission system.
  • 15. Extremely effective on networks where the data streams are given to single-bit errors. ADVANTAGE OF HAMMING CODE
  • 16.  Single-bit detection and correction code, if multiple bits are errored then the errors are detected but the resultant could cause another bit that is correct to be changed, causing the data to be further errored. DISADVANTAGE OF HAMMING CODE  Hamming code only can solve up to single bits.