Revisiting Fletcher and Adler Checksums

نویسنده

  • Theresa Maxino
چکیده

Checksums are routinely used to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about relative effectiveness of available options. We study the error detection effectiveness of the Fletcher and Adler checksums for random independent bit errors and burst errors. Our study reveals that in most cases the Fletcher checksum should be used instead of the Adler checksum.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of Checksums and Crc's Over Real Data - Networking, IEEE/ACM Transactions on

Checksum and cyclic redundancy check (CRC) algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of checksums and CRC’s over real data from various UNIX file systems. We show that, when given real data in small to modest pieces (e.g., 48 bytes), all the checksum algorithms have skewed distri...

متن کامل

The Comparison of the Effectiveness of Parent-Child Interaction Training and Adler-Dreikurs Parenting Training on Improving the Quality of the Parent-Child Relationship in divorced Mother’s Children

Introduction: Children of divorce experience many psychological and social problems during their future lives and they need to be trained and supported. Therefore, this study aimed to investigate and compare the effectiveness of Parent –Child Interaction and Adler-Dreikurs method on the quality of Parent-Child Relationship in divorced mother’s children. Methods: The present study was a semi-exp...

متن کامل

Enhancing File System Integrity Through Checksums

Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Also in operating systems like Unix that allow a user to bypass the file system to access the raw disk, integrity checks not only detect data corruption, but also track malicious attacks. Checksumming is a common way of ensuring data integrity. Checks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006