Revisiting Fletcher and Adler Checksums
نویسنده
چکیده
Checksums are routinely used to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about relative effectiveness of available options. We study the error detection effectiveness of the Fletcher and Adler checksums for random independent bit errors and burst errors. Our study reveals that in most cases the Fletcher checksum should be used instead of the Adler checksum.
منابع مشابه
Performance of Checksums and Crc's Over Real Data - Networking, IEEE/ACM Transactions on
Checksum and cyclic redundancy check (CRC) algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of checksums and CRC’s over real data from various UNIX file systems. We show that, when given real data in small to modest pieces (e.g., 48 bytes), all the checksum algorithms have skewed distri...
متن کاملThe Comparison of the Effectiveness of Parent-Child Interaction Training and Adler-Dreikurs Parenting Training on Improving the Quality of the Parent-Child Relationship in divorced Mother’s Children
Introduction: Children of divorce experience many psychological and social problems during their future lives and they need to be trained and supported. Therefore, this study aimed to investigate and compare the effectiveness of Parent –Child Interaction and Adler-Dreikurs method on the quality of Parent-Child Relationship in divorced mother’s children. Methods: The present study was a semi-exp...
متن کاملRevisiting the Relationship Between Systems of Innovation and Health Systems: A Response to Recent Commentaries
متن کامل
Revisiting Quotes from Educational Perspective: An Inquiry into the Multifarious Applications of Grand Quotes in English Language Pedagogy
متن کامل
Enhancing File System Integrity Through Checksums
Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Also in operating systems like Unix that allow a user to bypass the file system to access the raw disk, integrity checks not only detect data corruption, but also track malicious attacks. Checksumming is a common way of ensuring data integrity. Checks...
متن کامل