IJITCS Vol. 6, No. 9, 8 Aug. 2014
Cover page and Table of Contents: PDF (size: 278KB)
Full Text (PDF, 278KB), PP.14-23
Views: 0 Downloads: 0
Detection, Cyclic Redundancy Checks(CRC), Multi-User Request System, Error Detection Algorithm
Error and error related issues have been a challenge in the development and reliable usage of computing systems and application. The ability to detect minute error in a system improves the reliability of the system by aiding developers and users to know were challenges are so that they can be fixed during development and even when the system is already in use. In other to achieve that different algorithm have been used including the Cyclic Redundancy Check 16-bit, 32-bit and higher bits. In this paper, error detection schemes are examined and the way they check and detect error in multi-user request and transmitted system. The paper also offers improvement on a Cyclic Redundancy Checks 32-bit detection algorithm for the detection of error that can occur in transmitted data and on stored, backed-up and archived data in the system without consuming large resources as the higher bits.
Eke O. Bartholomew, Ebong A. Oscar, "Error Detection in a Multi-user Request System Using Enhanced CRC Algorithm", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.9, pp.14-23, 2014. DOI:10.5815/ijitcs.2014.09.02
[1]Allen Kent; James G. Williams, Rosalind Kent(1990). Encyclopedia of Microcomputers: Volume 6 Electronic Dictionaries in Machine Translation to Evaluation of Software: Microsoft Word Version 4.0. CRC Press Inc. p. 343. ISBN 978-0-8247-2705-5.
[2]Fletcher, J. A. (2009). An Arithmetic Checksum for Serial Transmissions. IEEE Trans. On Commun. 58(10), 1321 – 1331.
[3]Gary, C. (2010). Mysterious Russian Numbers Station Changes Broadcast After 20 Years. Gizmodo. Retrieved from 12 March 2013.
[4]Jonathan, S., Michael, G., Craig, P., Hughes, J. Performance of Checksums and CRCs over Real Data, SIGCOMM Vol 17, pg 126 (2010).
[5]Maha S. And Mohamed K. (2012)Wireless HDVideo Transmission Over Multicarrier Error-Correction channels, Journal Of Computer Science vol. 11 Pg 1897- 1913,Science Publications , Alexandria, Egypt
[6]Michael, B. (2007). CRC Implementation, Journal of Data and Database, Vol 5, pg 56, online.
[7]Postel, J. (1981). Transmission Control Protocol. Internet Request for Comments, ISI, 3.
[8]Scuro, R. S. (2004). Introduction to Error Theory, Visual Physics Laboratory, Texas A&M University, College Station, TX 77843.
[9]Thamer (2000). Information Theory 4th class in Communications, USA Transactions on Communication 30(1), Viking Software Solutions, Canton Ave., Suite 900, Tulsa.
[10]Wang, Z.and Crowcroft, J. S. (2002). Detects Cell Misordering. IEEE Network Magazine, 6(4), 8-19.
[11]Wadayama Tadashi (2010) Error detection by binary sparse matrices, Journal of Physics: Conference Series pp 233, 012017, IOP Publishing Ltd
[12]Zhang Kehuan, XiaoFeng Wang (2011) Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems, http://static.usenix.org/ event/sec09/ tech/ slides/zhang.pdf
[13]Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mohd Nordin Abdul Rahman,(2012) Architecture for Accessing Heterogeneous Databases, I.J. Information Technology and Computer Science, Vol 4 No. 1, 2012, 1, pg. 25-31 in MECS (http://www.mecs-press.org/)
[14]Geetha V. and Sreenath N.(2013), Semantic Multi-granular Lock Model for Object Oriented Distributed Systems, I.J. Information Technology and Computer Science,Vol. 5 2013, 05, Pg. 74-84 Published Online April 2013 in MECS (http://www.mecs-press.org/)
[15]Braubach L. and A.Pokahr(2011), “Intelligent Distributed Computing V”, Proceedings of the 5PthP International Symposium on Intelligent Distributed Computing (IDC 2011), Springer, pp141-151, 2011.