search the web

Monday, July 18, 2016

Error Detection Methods In Data Transfer

Error Detection Methods In Data Transfer

Detection Methods

VRC(Vertical Redundancy Check)
LRC(Longitudinal Redundancy)
CRC(Cyclical redundancy Check)
Checksum

Detection Methods
Detection Methods

VRC(Vertical Redundancy Check)

A parity bit is added to every data unit so that the
total number of 1s(including the parity bit) becomes
“even for even-parity check” or “odd for odd-parity
check”
VRC can detect all single-bit errors.

Parity VRC concept
Parity VRC concept

LRC(Longitudinal Redundancy Check)

Create parity bit of each column into a new data unit,
which is added to the end of the data block
LRC(Longitudinal Redundancy Check)
LRC(Longitudinal Redundancy Check)

- Cyclic Redundancy Check (CRC) is and error detection
technique very used in computer network.
- CRC Code are also known as polynomial codes.
F(x) = x6+x4+x3+x+1 = (1 0 1 1 0 1 1) 2
1x6 + 0x5 + 1x4 + 1x3 + 0x2 + 1x + 1
- The message (Data) must be sent with calculated CRC code
so that it should be verified by receiver

- In CRC we have:
Data: which is to be sent
Divisor: Which is known and in both side of CRC sender and
Checker (Its MSB should not be 0)
Remainder: In sender side, it makes the CRC


Detection(cont’d)

Number of 0 (Zero) to add in from of Data is one less than Divisor
Length.
Detection(cont’d)
Detection(cont’d)

Detection methods 

Detection methods
Detection methods 


CRC generator



Binary Division
in a CRC Generator







Now Data to send is:
100100001





Binary Divisionin a CRC Checker
Binary Divisionin a CRC Checker



Binary Division
in a CRC Checker
















Checksum

Suppose we want to send (7, 11, 12, 0, 6). We can send (7, 11, 12, 0,
6, 36) and receiver checks the sum of the numbers and finds if it is
correct data. We can make it easier for receiver if send the negative
(complement) of the sum, called the checksum.
In this case, we send (7, 11, 12, 0, 6, −36). The receiver can add all
the numbers received (including the checksum). If the result is 0, it
assumes no error; otherwise, there is an error.
Checksum
Checksum


Monday, July 11, 2016

Error Detection and Correction In Data Transfer

Error Detection and Correction In Data Transfer

Networks must be able to transfer data from one device to another
with complete accuracy.
But data can be corrupted (altered) during the transit due to noise.
Therefore error must be detected and corrected for good
communication and transmission of data between devices.

Types of error:

1. Single-bit error
2. 2.Burst error

Single-bit error:

In a single bit error, only one bit in the data has changed.
1 is changed to 0 and 0 is changed to 1.
single-bit error
single-bit error
There is more chance of single bit errors in parallel transmission, as
one or more of the wires could become noisy. This will affect the
data bits.

Burst error:

Two or more bits in the data unit have changed from 1 to 0 or 0 from 1.
Burst error
Burst error
The length of the burst error is measured from the first bit
Corrupted (altered) bit to the last corrupted bit.
Some bits in between may not have been corrupted.

Error Detection

The simplest method is to send the data twice to cross check the sent
and received data.
But there is a chance of the data sent second time getting corrupted.
Moreover, it is slow.
Another method is to add a small group of bits to the end of each
data unit.
… ==>
The extra bits are redundant (unnecessary for the information sent)
to the information.
These extra bits are used to detect error in the received data unit.
These extra bits are removed as soon as the correctness of the data is
determined.
This method is called redundancy method.

Types of redundancy:

1. Vertical Redundancy Check (VRC)
( It is also called as Parity Check. )
2. Longitudinal Redundancy Check (LRC)
3. Cyclic Redundancy Check (CRC)
4. Checksum


Monday, July 4, 2016

IP config in Windows and Linux

IP config in Windows and Linux


IP config in Windows and Linux
IP config in Windows and Linux

What we need to do

1 - Connecting Laptops with our cables
2 - Configuring TCP/IP Protocol in our Laptops
3 - Test the connection between the Laptops
Nework paln for ipconfig
Nework paln for ipconfig

Configuring TCP/IP Protocol in Windows

Click Start
Click Control Panel
Click Network and Internet
Connections
Click Network Connections

What do we need to complete this practice?

We have successfully built our network cable
Now, we connect one side of cable to our laptop network card and other side
To the switch
Then, we must configure our computer to know how to communicate
with other computer in the network.

Configuring TCP/IP Protocol

Windows has installed a LAN connection
for your small network here
Configuring TCP/IP Protocol
Configuring TCP/IP Protocol
To verify your LAN connection, right-click your
connection, and then click Properties
lan or high-speed internet
lan or high-speed internet

Select “Internet Protocol (TCP/IP)”
Home network properties
Home network properties







An then Click Properties















Give IP address of your computer
Internet Protocol Version 4
Internet Protocol Version 4




Example: 192.168.1.1




Note: Others should not give same
as this IP.











Now test network connection:
Click Start menu → Run
Type “cmd” in Run.
Then check network connection to other computer
With commad “ping”
Example: ping 192.168.1.2


Configuring TCP/IP Protocol In Ubuntu (Linux)

Configuring TCP/IP Protocol In Ubuntu (Linux)
Configuring TCP/IP Protocol In Ubuntu (Linux)

Editing Auto Ethernet

Editing Auto Ethernet
Editing Auto Ethernet