Increase of Error Detection Effectiveness in the Data Transmission Channels with Pulse-Amplitude Modulation

In this paper an approaches for increasing the effectiveness of error detection in computer network channels with Pulse-Amplitude Modulation (PAM) has been proposed. Proposed approaches are based on consideration of special feature of errors, which are appearances in line with PAM. The first approach consists of CRC modification specifically for line with PAM. The second approach is base of weighted checksums using. The way for checksum components coding has been developed. It has been shown that proposed checksum modification ensure superior digital data control transformation reliability for channels with PAM in compare to CRC.

Authors:



References:
[1] Sklar B. Digital communications. Fundamental and applications.
Prentice Hall PTR. - 2001, pp. 1099.
[2] Blahut R.E. Theory and Practice of Error Control Codes. Mass.:
Addison-Wesley Publishing Company, 2002, pp 452.
[3] Klove T., Korzhik V. Error Detecting Codes: General Theory and Their
Application in Feedback Communication Systems. Norwell, MA:
Kluwer, 1995, pp 433.
[4] Kounavis M.E., Berry F.L. A Systematic Approach to Building High
Performance Software-Based CRC Generators.// 10th IEEE Symposium
on Computers and Communications (ISCC'05), - 2005, pp. 855-862.
[5] Mercke R.C., "One-Way Hash Functions and DES" Advances in
Cryptology-CRYPTO-89 Proceeding, Berlin: Springer - Verlag, 1990,
pp.428-446.
[6] Vinogradov Y.N. Efficient calculation of hash-signatures in systems of
data authenticity and information integrity //Visnuk NTUU "KPI"
Informatics, management and processing techniques. K. "VEK+", N36,
2003, pp. 131-143.
[7] Ningping, S., Ryozo, N., Nonbing, Z., Akiro, T., and Wenling, S. "An
analysis of average search cost of external hashing with separate chain".
Proceedings of 7-th WSEAS International Conference on Circuits,
Systems, Communications and Computers (CSCC-2003). 2003, pp 315-
324.
[8] Kohonen, ðó. Associative memory. N.Y. WHP., 2002, p198.
[9] Chang, C.C. The study of an ordered minimal perfect hashing functions
// CACM Vol.24, Ôäû12, 2000, pp 384-387.
[10] Ramakrishna, M.V., and Bannai, Y. "Direct perfect hashing function of
external files", Journal of Database Administration, Vol.2, Ôäû.1, 1991,
pp 19-28.
[11] Cichelli, R.J. Minimal perfect hash functions made simple // CASM v.23
n.1-, 1980, pp 17-19.