Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
Increase of Error Detection Effectiveness in the Data Transmission Channels with Pulse-Amplitude Modulation

Authors: Akram A. Mustafa

Abstract:

In this paper an approaches for increasing the effectiveness of error detection in computer network channels with Pulse-Amplitude Modulation (PAM) has been proposed. Proposed approaches are based on consideration of special feature of errors, which are appearances in line with PAM. The first approach consists of CRC modification specifically for line with PAM. The second approach is base of weighted checksums using. The way for checksum components coding has been developed. It has been shown that proposed checksum modification ensure superior digital data control transformation reliability for channels with PAM in compare to CRC.

Keywords: Pulse-Amplitude Modulation, checksum, transmission, discrete.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334612

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1007

References:


[1] Sklar B. Digital communications. Fundamental and applications. Prentice Hall PTR. - 2001, pp. 1099.
[2] Blahut R.E. Theory and Practice of Error Control Codes. Mass.: Addison-Wesley Publishing Company, 2002, pp 452.
[3] Klove T., Korzhik V. Error Detecting Codes: General Theory and Their Application in Feedback Communication Systems. Norwell, MA: Kluwer, 1995, pp 433.
[4] Kounavis M.E., Berry F.L. A Systematic Approach to Building High Performance Software-Based CRC Generators.// 10th IEEE Symposium on Computers and Communications (ISCC'05), - 2005, pp. 855-862.
[5] Mercke R.C., "One-Way Hash Functions and DES" Advances in Cryptology-CRYPTO-89 Proceeding, Berlin: Springer - Verlag, 1990, pp.428-446.
[6] Vinogradov Y.N. Efficient calculation of hash-signatures in systems of data authenticity and information integrity //Visnuk NTUU "KPI" Informatics, management and processing techniques. K. "VEK+", N36, 2003, pp. 131-143.
[7] Ningping, S., Ryozo, N., Nonbing, Z., Akiro, T., and Wenling, S. "An analysis of average search cost of external hashing with separate chain". Proceedings of 7-th WSEAS International Conference on Circuits, Systems, Communications and Computers (CSCC-2003). 2003, pp 315- 324.
[8] Kohonen, ðó. Associative memory. N.Y. WHP., 2002, p198.
[9] Chang, C.C. The study of an ordered minimal perfect hashing functions // CACM Vol.24, Ôäû12, 2000, pp 384-387.
[10] Ramakrishna, M.V., and Bannai, Y. "Direct perfect hashing function of external files", Journal of Database Administration, Vol.2, Ôäû.1, 1991, pp 19-28.
[11] Cichelli, R.J. Minimal perfect hash functions made simple // CASM v.23 n.1-, 1980, pp 17-19.