The Effectiveness of Checksums for Embedded Control Networks
#1

The Effectiveness of Checksums for Embedded Control Networks

Abstract

Embedded control networks commonly use checksums to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about the relative effectiveness of available options


A study of error detection capabilities for random independent bit errors and burst errors reveals that the XOR, twoâ„¢s complement addition, and Adlerchecksums are suboptimal for typical network use. Instead, oneâ„¢s complement addition should be used for networks willing to sacrifice error detection effectiveness to reduce computational cost, the Fletcher checksum should be used for networks looking for a balance between error detection and computational cost, and CRCs should be used for networks willing to pay a higher computational cost for significantly improved error detection.

Existing System:










Proposed System:


We proposed the error detection effectiveness of the following commonly used checksum computations: exclusive or (XOR), twoâ„¢s complementaddition, oneâ„¢s complement addition, Fletcher checksum, Adler checksum, and cyclic redundancy codes (CRCs).



Hardware Requirements

¢ SYSTEM : Pentium IV 2.4 GHz
¢ HARD DISK : 40 GB
¢ FLOPPY DRIVE : 1.44 MB
¢ MONITOR : 15 VGA colour
¢ MOUSE : Logitech.
¢ RAM : 256 MB
¢ KEYBOARD : 110 keys enhanced.

Software Requirements


¢ Operating system :- Windows XP Professional
¢ Front End :- Java Technology
Reply
#2
Hello sir/madam
i m a student of MscComputer science.I want to make a project based on embedded systems i.e it must include software and hardwre but not databases plese help me to find topics for the same.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: doc project cost effectiveness, effectiveness of wireless network, questonnaire on effectiveness of schemes, ppt for the effectiveness of checksum for embedded, evaluation of effectiveness of training project report, training effectiveness mba project, overal equipment effectiveness for fleets,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,594 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 877 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,078 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 812 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 783 15-02-2017, 11:00 AM
Last Post: jaseela123d
  ATM access control using fingerprint scanning smart paper boy 8 5,736 01-07-2016, 11:42 AM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,608 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,388 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,334 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,737 18-03-2014, 11:25 PM
Last Post: seminar report asees

Forum Jump: