Print this page Print this page

Error Detection in Digital Systems

Mark A. Strain, PE


Course Outline

Information theory is a branch of applied mathematics and electrical engineering involving the quantification of information. When Claude Shannon developed information theory in 1948, thus ushering in the information age, he introduced the concept of entropy to information. This entropy or shortage of information in a message is what gives rise to errors in the data. Most communication systems and data storage and processing systems are unreliable to some degree, which means that errors may be introduced in the communications channel or while retrieving data from a memory device. These errors must be controlled.

The purpose of this course is to describe four different error detection techniques and to discuss the advantages and disadvantages of each. This course describes the parity check method as well as the checksum and cyclic redundancy check (CRC) methods. It describes hash functions and when they should be employed. This course also briefly discusses error correction techniques.

This course includes a multiple-choice quiz at the end, which is designed to enhance the understanding of the course materials.

Learning Objective

At the conclusion of this course the student will learn:

Intended Audience

This course is intended for all engineers.

Benefit to Attendees

Attendee of this course will be able to understand the different error detection techniques.

Course Introduction

We are exposed to a lot of information every day, from viewing content on a website on the Internet to listening to a song on our smart phone. This information (or data) is constantly stored, transmitted and processed. It is important that the data is correct or relatively error-free. Some amount of error is acceptable, depending on the application. For example, a few bit errors in a music data file in an MP3 format are acceptable, but a few bit errors in the data being transferred to the flight controls of a rocket could be catastrophic.

Course Content

This course is in the following PDF document:

Error Detection in Digital Systems

Please click on the above underlined hypertext to view, download or print the document for your study. Because of the large file size, we recommend that you first save the file to your computer by right clicking the mouse and choosing "Save Target As ...", and then open the file in Adobe Acrobat Reader. If you still experience any difficulty in downloading or opening this file, you may need to close some applications or reboot your computer to free up some memory.

Course Summary

The use of a parity check is perhaps the simplest form of error detection. With this technique a bit is inserted after a fixed number of bits to maintain either an odd number or an even number of bits. A checksum in which all of the bytes in a given block of data are XORed to produce a checksum value can be appended to a block of data before it is transmitted. When a block of data is received the checksum is recomputed and checked against the one just received with the block of data. Checksums (either ones that are XORed or a running sum) are weak compared to a CRC. A CRC is used in the same manner for error detection as a checksum, but are more robust because the value of the CRC depends on the order of the data.

Quiz

Once you finish studying the above course content, you need to take a quiz to obtain the PDH credits.


DISCLAIMER: The materials contained in the online course are not intended as a representation or warranty on the part of PDH Center or any other person/organization named herein. The materials are for general information only. They are not a substitute for competent professional advice. Application of this information to a specific project should be reviewed by a registered architect and/or professional engineer/surveyor. Anyone making use of the information set forth herein does so at their own risk and assumes any and all resulting liability arising therefrom.