The Spark
Upcoming SlideShare
Loading in...5
×
 

The Spark

on

  • 969 views

 

Statistics

Views

Total Views
969
Views on SlideShare
566
Embed Views
403

Actions

Likes
0
Downloads
2
Comments
0

3 Embeds 403

http://networkjourney.wordpress.com 399
http://translate.googleusercontent.com 2
http://www.plagscan.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Spark The Spark Presentation Transcript

  • EKTA M.S.SUPRIYA MALINI.B.S MANASA.R GOWRI.P
    • Error detection and correction
    • Understanding Checksum
    • Different algorithms of checksum
    • Implementation of checksums
    • Applications
    • Advantages and disadvantages
    View slide
    • Error detection uses the concept of
    • redundancy, which means adding extra bits
    • for detecting errors at destination
    ERROR DETECTION View slide
    • Parity check
    • Cyclic redundancy check(CRC)
    • Checksum
    • used by the higher layer protocols
    • It is based on the concept of redundancy(VRC, LRC, CRC ….)
    • To check data integrity when data is sent through telecommunication networks such as INTERNET.
    • To check data integrity of the data stored.
    • To verify data burned to CD-ROM, CD-R, DVD, DVD-R etc…
    • Parity byte or word
    • Modular sum
    • Position dependent checksum
    • Fletcher
    • Adler
    • The unit is divided into k sections, each of n bits.
    • All sections are added using one’s complement to get the sum.
    • The sum is complemented.
    • If the result is zero, the data are accepted: otherwise, rejected
    • The IP checksum is the 16 bit one's complement of the one's complement sum of all 16 bit words in the header.
    • Enhances file system integrity
    • Detection of error in large data
    • Embedded control networks
    • Antivirus checksum(winHKI)
    • Integrity protection (cryptographic checksum)
    • It is used only for error detection
    • Constraints of grammar based checksum
    • Intentional corruption goes undetected
    • Change in order of bytes goes undetected
    • It is not as strong as CRC in error checking
    • Internet application
    • Grammar based checksum
    • Bank account number
    • Social security number
    • Source code management
    • Password checking