The Effectiveness of Checksums for Embedded Control Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
02-07-2010, 06:15 PM

The Effectiveness of Checksums for Embedded Control Networks


Embedded control networks commonly use checksums to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about the relative effectiveness of available options

A study of error detection capabilities for random independent bit errors and burst errors reveals that the XOR, twoâ„¢s complement addition, and Adlerchecksums are suboptimal for typical network use. Instead, oneâ„¢s complement addition should be used for networks willing to sacrifice error detection effectiveness to reduce computational cost, the Fletcher checksum should be used for networks looking for a balance between error detection and computational cost, and CRCs should be used for networks willing to pay a higher computational cost for significantly improved error detection.

Existing System:

Proposed System:

We proposed the error detection effectiveness of the following commonly used checksum computations: exclusive or (XOR), twoâ„¢s complementaddition, oneâ„¢s complement addition, Fletcher checksum, Adler checksum, and cyclic redundancy codes (CRCs).

Hardware Requirements

¢ SYSTEM : Pentium IV 2.4 GHz
¢ MONITOR : 15 VGA colour
¢ MOUSE : Logitech.
¢ RAM : 256 MB
¢ KEYBOARD : 110 keys enhanced.

Software Requirements

¢ Operating system :- Windows XP Professional
¢ Front End :- Java Technology
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Anupam Singh
Active In SP

Posts: 1
Joined: Aug 2010
09-08-2010, 12:20 PM

Hello sir/madam
i m a student of MscComputer science.I want to make a project and implimentation based on embedded systems i.e it must include software and hardwre but not databases plese help me to find topics for the same.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: dataflow model for the effectiveness of checksum for embedded control networks, checksum in computer networkn ppt, dataflow diagram for the effectiveness of checksum for embedded control networks, checksum in computer network ppt, ppt for the effectiveness of checksums, problems for the effectiveness of checksums for embedded control networks, embedded control networks,
Popular Searches: effectiveness of different recruitment sources, whai is meant embedded control networks, effectiveness of trainingand development, machine effectiveness seminar project, role effectiveness accomplishments, evaluation of traiing effectiveness in india, e mentoring effectiveness,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Switching and Traffic Grooming in WDM Networks at java project topics 3 930 09-09-2016, 02:27 PM
Last Post: Dhanabhagya
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,727 09-12-2014, 09:25 PM
Last Post: Guest
Thumbs Up Inventory Control System uttuswami 2 721 20-10-2014, 07:46 PM
Last Post: CxWfRyIPv
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,791 02-06-2014, 09:51 AM
Last Post: seminar project topic
Last Post: seminar project topic
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 747 08-03-2014, 12:43 PM
Last Post: seminar project topic
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,128 30-09-2013, 10:54 AM
Last Post: Guest
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 587 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Routing Security in Ad Hoc Wireless Networks seminar projects maker 0 546 26-09-2013, 02:20 PM
Last Post: seminar projects maker
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 319 26-09-2013, 02:10 PM
Last Post: seminar projects maker