Loading learning content...
In the previous page, we explored single-bit errors—isolated corruptions where one bit flips independently of its neighbors. While elegant mathematical models like the Binary Symmetric Channel assume this independence, reality often behaves differently.
When a lightning strike induces voltage on a communication cable, it doesn't flip just one bit and politely stop. When a wireless signal fades due to multipath interference, multiple symbols are affected simultaneously. When a scratch appears on a disk surface, it corrupts a contiguous region of data.
These are burst errors—and understanding them is crucial because they occur far more frequently than isolated single-bit errors in many communication scenarios, yet require fundamentally different detection and correction strategies.
By the end of this page, you will understand the precise definition of burst errors, their physical origins, the mathematical frameworks used to characterize them, their impact on error detection schemes designed for independent errors, and the specialized techniques developed to combat them.
A burst error (also called a cluster error or error burst) occurs when multiple consecutive or nearly-consecutive bits are corrupted. The defining characteristic is the spatial or temporal correlation between errors—they cluster together rather than occurring independently.
Formal Definition:
A burst of length L is defined as a contiguous sequence of L bits where:
Importantly, the burst length is measured from the first to the last error, not by counting only the corrupted bits. Between the first and last corrupted bits, there may be correct bits mixed with incorrect ones.
Alternative Definition (Guard Band):
Some sources define burst errors using a guard band approach: two bursts are considered separate if at least g correct bits appear between them. This definition is useful for analyzing burst error statistics in real channels.
Transmitted: 1011001101010110Received: 1011010001110110Positions 5, 6, 8, 9, 10 (0-indexed from right) are affected. The burst spans from position 5 to position 10—a burst length of 6 bits, even though only 5 bits are actually corrupted. The burst includes one correct bit (position 7) within its span.
Why the Definition Matters:
The burst length definition is critical for error detection and correction:
CRC Capability: A CRC with an n-bit check value can detect:
If the burst length is measured incorrectly, protection guarantees become invalid.
Interleaving Design: Burst error correction often uses interleaving, where the interleaving depth must exceed the maximum expected burst length. Underestimating burst length leads to uncorrectable errors.
Systems designed only for single-bit errors can be devastated by burst errors. A simple parity check that catches any single-bit error becomes useless when a burst flips an even number of bits—the parity looks correct despite massive corruption.
Burst errors arise from physical phenomena that cause sustained signal degradation—disturbances that persist longer than the transmission of a single bit. Understanding these causes reveals why burst errors dominate in certain environments.
The Temporal Correlation Principle:
When an interfering phenomenon has a duration τ and the bit period is T, the minimum burst length L is approximately:
$$L \approx \lceil \tau / T \rceil$$
This explains why high-speed links tend to have longer burst lengths for the same physical disturbance—more bits fit into the same interference window.
| Environment | Primary Burst Sources | Typical Burst Length | Frequency |
|---|---|---|---|
| Telephone Lines (POTS) | Impulse noise, crosstalk | 10-100 bits | Several per minute |
| Wireless Cellular | Deep fading, handoffs | 100-1000 bits | Varies with mobility |
| Satellite Links | Rain fade, sun outage | 1000-10000+ bits | Weather dependent |
| Optical Fiber | Connector vibration, splice issues | Rare, but long when occur | Very infrequent |
| Magnetic Storage | Surface defects, head crashes | Sector-sized bursts | Age dependent |
| CD/DVD/Blu-ray | Scratches, fingerprints, dust | Hundreds of bits | Handling dependent |
Higher data rates mean longer burst lengths for the same physical disturbance. A 1ms impulse corrupts 1,000 bits at 1 Mbps but 1,000,000 bits at 1 Gbps. This is why modern high-speed systems invest heavily in burst error protection—the consequences of interference scale with speed.
The Binary Symmetric Channel model, which assumes independent errors, fails to capture burst error behavior. More sophisticated models are required to characterize channels where errors cluster.
The Gilbert-Elliott Model:
The most widely used burst error model is the Gilbert-Elliott channel, which uses a two-state Markov model:
State G (Good): Low error probability (typically 0 or very small) State B (Bad): High error probability (typically 0.5 or higher)
The channel transitions between states with probabilities:
This elegantly captures the correlated nature of burst errors: once in the bad state, errors are likely, and the channel tends to stay in that state for some duration.
Key Parameters:
Average burst length (when in bad state): $$\bar{L} = \frac{1}{r}$$
Average gap between bursts (when in good state): $$\bar{G} = \frac{1}{p}$$
Fraction of time in bad state: $$\pi_B = \frac{p}{p + r}$$
Overall bit error probability: $$P_e = \pi_G \cdot P_{e|G} + \pi_B \cdot P_{e|B}$$
Example Parameterization:
For a channel with average burst length of 10 bits and bursts occurring every 1000 bits on average:
Extended Models:
Fritchman Model: Extends Gilbert-Elliott to multiple good states and bad states, enabling more precise modeling of channels with variable error-free gaps between bursts.
Hidden Markov Models (HMM): For channels with complex burst characteristics, HMMs can be trained on observed error sequences to create empirically-accurate models without assuming simple state structures.
Burst Length Distribution:
In the basic Gilbert model, burst lengths follow a geometric distribution: $$P(L = k) = (1-r)^{k-1} \cdot r$$
This means short bursts are most common, with probability decreasing exponentially for longer bursts. Real channels often exhibit heavier tails, requiring extended models.
Accurate channel modeling enables optimal error correction design. Over-engineering wastes bandwidth on redundancy; under-engineering causes data loss. The Gilbert-Elliott model, despite its simplicity, provides surprisingly accurate predictions for many real channels and enables analytical calculation of error correction code performance.
Burst errors pose unique challenges for error detection. Schemes optimized for independent single-bit errors can fail dramatically when errors cluster.
Parity Failure:
A single parity bit detects any odd number of errors. However, a burst that flips an even number of bits produces correct parity despite significant corruption:
Statistically, a burst of length L has approximately 50% probability of containing an even number of errors, making simple parity useless against bursts.
Hamming Code Vulnerability:
Standard Hamming codes are designed to correct single-bit errors and detect double-bit errors. Against bursts, they fare poorly:
Checksum Weakness:
Internet checksums (1's complement addition) can miss certain burst patterns:
Studies show approximately 1 in 65,536 arbitrary error patterns evades 16-bit checksum detection—acceptable for TCP/IP with underlying CRC protection, but dangerous as a sole defense.
Real systems layer multiple detection mechanisms precisely because each has weaknesses. Ethernet uses CRC-32 at the link layer while TCP adds a checksum at the transport layer. Neither alone provides complete protection, but together they achieve extremely high detection rates against both burst and random errors.
When burst errors exceed simple detection capabilities, specialized techniques transform the problem into one that simpler codes can handle.
Interleaving: Spreading Bursts Across Codewords
The key insight of interleaving is that if we spread data across multiple codewords before transmission, a burst error affecting consecutive transmitted bits will be distributed across multiple codewords at the receiver—converting one long burst into multiple short errors that simpler codes can correct.
Block Interleaving Example:
Consider 4 codewords of 8 bits each. Instead of transmitting them sequentially:
We interleave by transmitting the first bit of each codeword, then the second bit of each, etc.:
A 4-bit burst now affects one bit in each of four codewords rather than four consecutive bits in one codeword. If each codeword can correct single-bit errors, the burst is fully corrected.
Codewords: [A1A2A3A4] [B1B2B3B4] [C1C2C3C4] [D1D2D3D4]
Interleaved transmission: A1B1C1D1 A2B2C2D2 A3B3C3D3 A4B4C4D4
4-bit burst corrupts: A2B2C2D2De-interleaved: [A1**A2**A3A4] [B1**B2**B3B4] [C1**C2**C3C4] [D1**D2**D4D4]
Each codeword has exactly 1 errorThe burst, which would have destroyed one entire codeword, is now distributed as single-bit errors across four codewords. If each codeword uses a single-error-correcting code (like Hamming), all errors are corrected despite the severe burst.
Interleaving Parameters:
The interleaving depth d determines burst tolerance:
Trade-offs:
Convolutional Interleaving:
Block interleaving has constant latency but requires large buffers. Convolutional (or helical) interleaving uses variable delays that average to a lower latency while achieving similar burst spreading. This is the preferred technique for streaming applications.
| System | Interleaving Type | Depth/Parameters | Burst Tolerance |
|---|---|---|---|
| CD Audio | Cross-interleaved Reed-Solomon | 28 frames | ~2.5mm scratch (4000 bits) |
| DVD | Reed-Solomon Product Code | 2D interleaving | ~6mm defect |
| DAB Radio | Time interleaving | 384ms | Long fade events |
| DVB-T | Convolutional | Depth 12 | Impulse noise, multipath |
| LTE/5G | Turbo code interleaving | Variable | Fading channels |
A CD can have a 2-3mm scratch—corrupting thousands of consecutive bits—and still play perfectly. This is achieved through multiple layers of Reed-Solomon coding with deep interleaving. The same physics applies to DVDs, Blu-rays, and QR codes.
Understanding the fundamental differences between single-bit and burst errors is essential for selecting appropriate error control strategies.
| Characteristic | Single-bit Errors | Burst Errors |
|---|---|---|
| Definition | Exactly one bit corrupted | Multiple consecutive bits corrupted |
| Statistical Model | Binary Symmetric Channel | Gilbert-Elliott or Fritchman |
| Independence | Errors are independent | Errors are correlated |
| Primary Causes | Thermal noise, shot noise, cosmic rays | Impulse noise, fading, media defects |
| Typical Environment | Well-shielded wired connections | Wireless, storage media, noisy environments |
| Simple Parity Detection | 100% effective | ~50% effective (fails on even-count bursts) |
| Hamming Code Effectiveness | Full correction capability | Poor—may miscorrect or miss entirely |
| CRC Effectiveness | 100% detection | 100% for bursts ≤ CRC length; ~2⁻ⁿ miss rate for longer |
| Best Correction Approach | Hamming, BCH, simple parity + retransmit | Interleaving + Reed-Solomon |
| Redundancy Requirements | Lower (log₂(n) check bits) | Higher (must handle burst length) |
Choosing the Right Strategy:
For channels dominated by single-bit errors:
For channels with significant burst errors:
For mixed channels:
Most practical channels experience both error types. A wireless link has random errors from thermal noise AND burst errors from fading. Hybrid approaches—like concatenated coding or modern iterative codes with interleaving—address both simultaneously.
We have explored burst errors in depth—understanding how they differ from single-bit errors and why they require specialized treatment. Let's consolidate the key insights:
What's Next:
Having understood both single-bit and burst errors, we'll next investigate what causes these errors. The upcoming page on Error Sources examines the physical and environmental factors that introduce errors into communication systems—from fundamental physics to practical engineering challenges.
You now understand burst errors comprehensively—their nature, causes, mathematical characterization, impact on detection schemes, and the specialized techniques used to combat them. This knowledge complements your understanding of single-bit errors and prepares you for deeper exploration of error sources and countermeasures.