CN  Vol.8 No.1 , February 2016
A Practical Comparison between Signature Approach and Other Existing Approaches in Error Detection over TCP
Abstract: Error coding is suited when the transmission channel is noisy. This is the case of wireless communication. So to provide a reliable digital data transmission, we should use error detection and correction algorithms. In this paper, we constructed a simulation study for four detection algorithms. The first three methods—hamming, LRC, and parity are common techniques in networking while the fourth is a proposed one called Signature. The results show that, the hamming code is the best one in term of detection but the worst one in term of execution time. Parity, LRC and signature have the same ability in detecting error, while the signature has a preference than all others methods in term of execution time.
Cite this paper: Bawaneh, M. , Alkoffash, M. , Alqrainy, S. and Muaidi, H. (2016) A Practical Comparison between Signature Approach and Other Existing Approaches in Error Detection over TCP. Communications and Network, 8, 31-38. doi: 10.4236/cn.2016.81004.

[1]   Tanenbaum, A.S. (2003) Computer Networks. 4th Edition, Prentice Hall, Upper Saddle River, Chapter 3, Section 3.2, Electronic Book.

[2]   Liu, H., Ma, H.R., El Zarki, M. and Gupta, S. (1997) Error Control Schemes for Networks: An Overview. Journal Mobile Networks and Applications, 2, 167-182.

[3]   Forouzan, B.A. (2001) Data Communication and Networking. 2nd Edition, McGraw-Hill, Boston, Chapter 9, 273-292.

[4]   Chung, S.-J. (2001) Network Architecture: Hamming Codes and Cyclic Redundancy for Transmission Error Correction. ACM SIGCSE Bulletin, 33, 48-50.

[5]   Aikawa, S., Motoyama, Y. and Umehira, M. (1997) Error Correction and Error Detection Techniques for Wireless ATM Systems. Wireless Networks, Kluwer Academic Publishers, Norwell.

[6]   Alexiou, A., Bouras, C. and Papazois, A. (2011) A Study of Forward Error Correction for Mobile Multicast. International Journal of Communication Systems, 24, 607-627.

[7]   Akyildiz, I.F., Joe, I., Driver, H. and Ho, Y.-L. (2001) An Adaptive FEC Scheme for Data Traffic in Wireless ATM Networks. IEEE/ACM Transactions on Networking, 9, 419-426.

[8]   Miller, J. and Cozzens, M. (2010) Crypto Book Working Notes, Princeton University Press Princeton and Oxford, Error Detect Correct Factorization, 26 August 2010, Chapter One, 1-22.

[9]   Wobbrock, J.O. and Myers, B.A. (2004) Analyzing the Input Stream for Character-Level Errors in Unconstrained Text Entry Evaluations. ACM Transactions on Computer-Human Interaction (TOCHI). Journal ACM Transactions on Computer-Human Interaction (TOCHI), 13, 458-489.

[10]   Makris, Y. (2005) Concurrent Error Detection in Asynchronous Burst-Mode Controllers Sobeeh Almukhaizim. Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE’05), IEEE Computer Society, 1530-1591/05.

[11]   Krautz, U., Pflanz, M., Jacobi, C., Tast, H.W., Weber, K. and Vierhaus, H.T. (2006) Soft Error Analysis and Concurrent Testing: Evaluating Coverage of Error Detection Logic for Soft Errors Using Formal Methods. Proceedings of the conference on Design, Automation and Test in Europe: Proceedings DATE’06, 6 March 2006, 176-181.