[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Network architecture: hamming codes and cyclic redundancy for transmission error correction

Published: 01 December 2001 Publication History

Abstract

In this paper, we examine how detect and correct transmission errors transmission control protocols such as TCP. We will first show how to construct Hamming Codes to detect and correct single-bit transmission errors. Then, we will evaluate various aspects of the Cyclic Redundancy Check (CRC) codes in comparison to Hamming Codes. The efficiency and the ease with which we can build and implement CRC codes are some of the aspects of the CRC codes that this paper explores.

Cited By

View all
  • (2016)A Practical Comparison between Signature Approach and Other Existing Approaches in Error Detection over TCPCommunications and Network10.4236/cn.2016.8100408:01(31-38)Online publication date: 2016
  • (2012)A Coding Theoretic Model for Error-detecting in DNA SequencesProcedia Engineering10.1016/j.proeng.2012.06.21638(1773-1777)Online publication date: 2012
  • (2011)A high performance data integrity assurance based on the determinant techniqueFuture Generation Computer Systems10.1016/j.future.2010.05.01127:5(614-619)Online publication date: 1-May-2011
  • Show More Cited By
  1. Network architecture: hamming codes and cyclic redundancy for transmission error correction

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCSE Bulletin
    ACM SIGCSE Bulletin  Volume 33, Issue 4
    December 2001
    129 pages
    ISSN:0097-8418
    DOI:10.1145/572139
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 December 2001
    Published in SIGCSE Volume 33, Issue 4

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)A Practical Comparison between Signature Approach and Other Existing Approaches in Error Detection over TCPCommunications and Network10.4236/cn.2016.8100408:01(31-38)Online publication date: 2016
    • (2012)A Coding Theoretic Model for Error-detecting in DNA SequencesProcedia Engineering10.1016/j.proeng.2012.06.21638(1773-1777)Online publication date: 2012
    • (2011)A high performance data integrity assurance based on the determinant techniqueFuture Generation Computer Systems10.1016/j.future.2010.05.01127:5(614-619)Online publication date: 1-May-2011
    • (2009)Integrity Assurance Technique Using Determinant ApproachProceedings of the 2009 Workshops at the Grid and Pervasive Computing Conference10.1109/GPC.2009.8(160-164)Online publication date: 4-May-2009
    • (2003)Network protocolsACM SIGCSE Bulletin10.1145/960492.96052735:4(60-62)Online publication date: 1-Dec-2003

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media