71
© N. Ganesan, Ph.D. , All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Chapter

Error Causes and Detection

Page 2: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Chapter Objectives

• List the different types of errors affecting transmission

• Provide an understanding of electromagnetic interference in terms of propagation, data corruption etc.

• Describe the measures that are taken to minimize electronic interface– Twisting of wires, FCC regulations etc.

Continued

Page 3: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Continuation of Chapter Objectives

• Discuss the effect of electromagnetic field on security– Eavesdropping etc.

• Explain the following error checking techniques– VRC, LRC and CRC

• Describe all the different points of error detection in a typical communication link

Page 4: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Chapter Modules

• Types of error• Understanding electromagnetic

interference• Minimizing electromagnetic interference• Effect of electromagnetic field on security• Error checking technique: VRC• Error checking technique: LRC• Error checking technique: CRC• Points of error detection in communication

Page 5: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Causes and Types of Error

Page 6: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Causes Of Error• Interference

– Largely due to external electromagnetic field – Corrupts the information carried by the

electromagnetic signals

• Temperature– Affects the transmission quality and

capability of the medium– For instance, temperature variations

influence the conductivity of the communication medium

Page 7: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Error Types

• The three major types of errors are as follows:– Attenuation– Distortion– Noise

• The term Noise is frequently encountered in communication

• It reflects the cumulative effect of interference on the signal

Page 8: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Attenuation

• Refers to the weakening of the signal with distance

• Signals must be of sufficient strength at the receiving point to overcome noise

• Attenuation is greater at higher frequencies

• Line drivers and boosters are often used to minimize the effect of attenuation

Page 9: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Distortion

• Distortion is a general term used to describe the distortion of a signal

• A special type of distortion is know as delayed distortion

• It affects signals of different frequencies and results in them arriving at the destination at different times

• The above causes timing related problems in data transmission

Page 10: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Distortion Due to Noise

Origins Destination

Noise represents the cumulative effect of a wide variety of factors that have an influence on the signal transmitted.

Signal affected by noise.

Page 11: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Noise Factors• Interference and crosstalk occur due to

electromagnetic interference • Thermal noise, for instance, is proportional

to the temperature and bandwidth• Impulse noise that is induced as a result of

a surge in signal strength– Encountered immediately after the power is

switched on a communication line• Bulb fusing phenomenon is a practical example

Page 12: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Expression of the Quality of a Line

• Signal to noise ratio

Page 13: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Digital Advantage

• Although the signal changes due to various factors discussed, the original digital pattern can be extracted

Page 14: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 15: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Electro-Magnetic Interference (EMI)

Page 16: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Understanding Interference

Wall ElectricalOutlet

Electric Bulb

1

2

1.Wired cylinder connected to a bulb2. Wired cylinder connected to an electrical outlet

Page 17: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Interference Observation

• Bulb lights up as the smaller cylinder is lowered into the big cylinder

• The important point to note is that the cylinders do not touch one another

• This means that the electricity in one cylinder generates electricity in the other cylinder– Signifies the very definition of

interference

Page 18: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Role of Electromagnetic Field in Interference

• Electricity in the larger cylinder creates an electromagnetic field

• Electromagnetic field in turn creates electricity in the smaller cylinder

• The bulb thus lights up as a result indicating induced electricity by an adjacent carrier of electricity

Page 19: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Effect of Interference on Communication Signals

Electro- MagneticField

Cable 1

Cable 2

Creates Electricity

Creates Electricity

Page 20: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 21: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Minimizing Electromagnetic Interference

Page 22: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Major Source of Interference in Practice

• Major sources of interference– Cables adjacent to one another– Misbehaving electrical equipment

• Minimizing interference at the Medium– Twisting and shielding of cables

• Minimizing interference from an electronic/electrical device– FCC compliance and certification is often

required of devices

Page 23: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Twisting of Wires to Minimize Interference

Twisting Counterbalance

•Unshielded Twisted Pair (UTP)

•Shielded Twisted Pair (STP)Cat 5 : Higher quality

Cat 2 and 3: Lower quality

Page 24: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Twisting of Wires

• The higher the number of twists per foot, the better the quality of the twisted pair wires– Category 5e wires are of better

quality compared to Category 5 wires

Page 25: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

The Shielding of Cables

Shield the cable from outside interference (Conductive Material).

Minimize outside interference

Minimize emission of from the cable

Page 26: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Minimizing the Interference from

Equipment

• Ensure that the electrical and electronic equipment are FCC certified

• FCC certification implies that the equipment is in compliance with FCC regulations concerning the emission of the electromagnetic field

Page 27: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

FCC Regulations Requirement and

Certification• Requires that the device be

housed in a proper casing • Example of Certification

– Class B certification for microcomputers for instance

Page 28: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Examples of FCC Regulated Equipment

• Computers and communication devices

• Electrical equipment such as fans etc.

Page 29: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

In Summary

• Better the resistance to electromagnetic field, better the quality of the medium in terms of carrying the information at higher speeds over a longer distance

Page 30: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Fiber Optic Advantage• Does not generate electromagnetic field• No electromagnetic interference• Signal loss minimized• Data travels faster and further• Transmission of data is secure• Fiber strands can be strung closely

together– Large number of transmission lines in a fiber

optic cable of reasonable diameter

Page 31: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 32: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Securing Transmission

Page 33: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Data Eavesdropping

Ground

Listening Device

CableElectro-MagneticWave

(Eavesdropping device)

(Below ground cable)

Page 34: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Data Eavesdropping

• It is based on monitoring the surrounding electromagnetic field to tap the data being transmitted over the cable

• A listening device need not directly touch the cable

• For example, the data can be monitored above ground and by devices that are implanted in a building as well

Page 35: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Securing Electronically Transmitted Data

• Encryption• Information to be transmitted is

encrypted at the origin and decrypted at the destination

• Encryption has been pushed to the forefront following the extensive use of the Internet

Page 36: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Some Encryption Details

• Encrypted data is unintelligible– May resemble a binary file

• Encrypted data will only make sense when it is decrypted with a key

• Keys are used both for the encryption and decryption of information– Public key– Private key

Page 37: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Role of Public and Private Keys in Encryption

Private Key Public Key

Example of a key is A10012A.

Sender Receiver

A B

Page 38: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Degrees of Sophistication of Encryption

• Level of sophistication – Expressed in bits

• A 32 bit encryption algorithm is less sophisticated compared to the 64 bit algorithm

• At higher bit lengths, it may take hundred of years to decode the information using a supercomputer– 128 bit encryption is the most

sophisticated encryption

Page 39: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Encryption Applications

• PGP (Pretty Good Privacy)• PointSec

Page 40: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Enhancing the Security

• Use a secure transmission protocol– Point-to-Point Tunneling Protocol

(PPTP)

• PPTP is used for transmitting information over the Internet

• VPNs are created based on the PPTP Encryption/Tunneling protocol

• IPSec

Page 41: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 42: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Error Checking Technique: VRC

(Vertical Redundancy Code)

Page 43: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Major Error Correction Techniques

• Vertical Redundancy Checking (VRC)– Also known simply as parity checking

• Longitudinal Redundancy Checking (LRC)– Similar in principle to VRC– Operates on a block of data

• Cyclic Redundancy Checking (CRC)– Sophisticated error checking procedure – Performed on a block of data– Used extensively

Page 44: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Vertical Redundancy Checking (VRC)

• Two implementations of VRC– Odd– Even

Page 45: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Odd Parity Checking

• Add a parity bit• Either a one or a zero is added

– Total number of ones adds an odd number

• Example – Before parity 0110100 – After parity 01101000

Parity bit

Page 46: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Even Parity Checking

• Even– The total number of ones should add

up to an even number

• Example– Before parity 0101010– After parity 01010101

Parity bit

Page 47: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Error Detection Capability of VRC

• Errors can still escape detection– When two bits change value in which

case VRC becomes ineffective

• Even parity example– 11010111 Before transmission– 10000111After transmission– Parity count remains the same– But, the data has changed as shown by

the colored digits

Page 48: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Probability of Error Not Being by VRC

• Probability is indeed very low• Assumption that the probability of

a single digit changing value is .0001 – Probability of two digits changing is

• P1 x P1 • .0001 X .0001 = .000000001

Page 49: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 50: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Error Checking Technique: LRC(Longitudinal Redundancy

Checking)

Page 51: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Overview Of Longitudinal Redundancy Check (LRC)

• LRC is somewhat similar to parity checking except for the fact that the error checking is performed on a block of data

• The difference, in this case is that the number of ones across the block must add up to an:– even number for even parity– odd number for odd parity

Page 52: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Longitudinal Redundancy Code (LRC)

10111011

10101010110 110100100010001001011

Block of characters (data).

Parity Check (VRC)

LRC Check

8-bit data representing one character.

Page 53: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

LRC Error Detection Capability

• Errors can still escape detection• For example, LRC cannot detect

the error when four digits change value– Two may change along the row– Two may change along the column

Page 54: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Illustration of an Undetected Error in LRC

1 0 00 1 00 1 00 1

1 0 01 0 01 0 00 1

Parity

When four digits change value, the parity countstill remains as an odd number both along the block as well as within a character.

Origin Destination

Page 55: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Probability Of Error Being Undetected In LRC

• Probability of an error not being detected is indeed very very low

• Assumption • Probability of one digit changing value

is .00001

• Probability of all four digits changing values • P1 X P1 X P1 X P1• .00000000000000000001 • A very low number

Page 56: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 57: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module

Error Checking Technique CRC

(Cyclic Redundancy Code)

Page 58: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Overview Of CRC • CRC is performed on a block of data• It operates by adding a tail-end bit to the

block of data• Uses an advanced formula to derive the

parity bit– A polynomial is fitted to the data– CRC bit is added based on the characteristics of

the polynomial

• CRC supports a near error-free transmission of information

Page 59: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Cyclic Redundancy Code (CRC)

10111011

10101010110 110100100010001001011

CRC Check

Block of characters (data).

Parity Check(VRC)

8-bit data representing one character.

Page 60: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

ITU Standardized CRC Techniques

• Implemented in most high speed analog modems

• CRC 16 – Signifies that the degree of polynomial used in

error checking is 16

• CRC 32 – Corresponds to a polynomial of degree 32 being

used for error checking

• CRC 32 has a better error detection capability compared to CRC 16

Page 61: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

In Summary• CRC is the most sophisticated of

all error checking techniques• The higher the degree of

implantation– The better the error detection

capability– The more the resources required to

implement CRC

Page 62: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 63: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

© N. Ganesan, Ph.D. , All rights reserved.

Module (Appendix A)

Points of Error Detection in Communication

Page 64: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Micro

Points Of Error Detection

Modem

* Communication Software* Application Software

* ROM basedSoftware in the modem.

Page 65: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Hardware Based Error Detection in Modem

• MNP Level 5 detection• Built within a number of modems• Incorporated in the new standard

Page 66: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Error Detection Performed by Communication

Software

• Protocols incorporated in a communication software performs this error detection

• Sample communication protocols that incorporate error detection – Xmodem– Zmodem – Kermit

Page 67: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Error Detection in Application Software

• Applications may have programmed error checking capabilities– A bank transaction

• In summary– Combined effect of these error

checking techniques is the error free communication that is now possible

Page 68: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Error Detection in Digital and Analog Environments

• Analog technology– Error detection is done in some detail – An example is X.25

• Digital technology– Some protocols may not perform

extensive error detection– Error detection may be left to the

client

Page 69: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

Digital Technologies

• Frame Relay– Error detection and correction on the

network are not as intensive as in the case of X.25

– Digital transmission is less prone to errors

• UDP (May be used in place of TCP)– Connection less protocols that does not

guarantee error free transmission

Page 70: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

End of ModuleEnd of Module

Page 71: © N. Ganesan, Ph.D., All rights reserved. Chapter Error Causes and Detection

END OF MODULE END OF MODULE

END OF CHAPTEREND OF CHAPTER