Professional Documents
Culture Documents
net/publication/290060544
CITATIONS READS
4 89
4 authors, including:
Mohammed Al-Hubaishi
Sakarya University
14 PUBLICATIONS 66 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mueen Uddin on 04 April 2016.
1
School of Computer Science, Faculty of Information Science and Technology,
University Kebangsaan Malaysia, Bangi, 43600, Selangor, Malaysia
2
Faculty of Computer Science and Information System, Thamar University, Thamar, Republic of Yemen
3
FCT-DEEI, Universidade Algarve Portugal, Faro, Portugal
4
Kulliah of Information and Communication Technology, International Islamic University Malaysia
5
Asia Pacific University of Technology and Innovation, Kuala Lumpur, Malaysia
Abstract: Error control describes how the network handles and detects errors especially in the data link layer.
In this paper, we present on an overview of error control regarding error detection and error correction. Error
control happens in data link layer. We mainly discuss the type of error detection mechanisms that is used to
detect the errors and how the errors will be corrected so the receiver can extract the real data. At the end of this
paper, the conclusion and the future work are presented.
Key words: Data Link Layer Error Control Parity Check Checksum Cyclic Redundancy Check
Corresponding Author: Raed Alsaqour, School of Computer Science, Faculty of Information Science and Technology,
University Kebangsaan Malaysia, Bangi, 43600, Selangor, Malaysia.
968
Middle-East J. Sci. Res., 18 (7): 968-973, 2013
969
Middle-East J. Sci. Res., 18 (7): 968-973, 2013
970
Middle-East J. Sci. Res., 18 (7): 968-973, 2013
the second step is replaced with the value of n string. segments of n bits (usually 16). These segments are
Note that the CRC may consist of all 0’s. The binary data added using ones complement arithmetic in such a way
unit arrives to the receiver followed by the CRC. The that the total is also n bits long. That total (sum) is then
receiver treats the incoming binary data as one data block complemented and appended to the end of the original
and divides it with the same divisor that is used to data unit as redundancy bits, called the checksum field.
get the CRC value. If the data was arrived without an The extended data unit is transmitted across the network.
error, the CRC checks return all the value which is zero So if the sum of the data segments is T, the checksum will
and the binary data unit is passed [9]. be –T. The receiver performs the same calculation on the
Figure 4 shows the calculation for the CRC in the received data and compares the result with the received
sender, as shown the added of the data plus extra zero checksum. If the result is 0, the receiver keeps the
that is added to the data string and divided with the transmitted data; otherwise, the receiver knows that an
divisor. The remainder of the division will be the value of error occurred discards the transmitted data [5].
CRC that will replace the data plus extra zeros at the The checksum detects all errors involving an odd
receiver side. Figure 5 shows the calculation for the CRC number of bits as well as most errors involving an even
in the receiver side. At the receiver side, the data string number of bits.
and the CRC value is divided by the same value of divisor
in the sender part. Then the remainder of this division Suppose the following block of 16 bits is to be sent
determines either the received data bit string that to be using a checksum of 8 bits.
accepted or not. If the remainder is zero, then the data will
be accepted or else it will be rejected. 10101001 00111001
Performance of CRC: CRC has a very good The numbers are added using one’s complement
performance in detecting single-bit errors, double errors,
an odd number of errors and burst errors. They can 10101001
easily be implemented in hardware and software. 00111001
They are especially fast when implemented in hardware. ------------
This has made CRC a good candidate for many networks. Sum: 11100010
Checksum: 00011101
CHECKSUM: A third approach to determine the error The pattern sent is:
detection. The checksum method which is a very simple 10101001 00111001 00011101
method based on adding up all the words that are
transmitted and then transmit them including the Now suppose the receiver receives the pattern:
complement result of that sum. Like the parity check and 10101001, 00111001, 00011101and there is no error. When
CRC, the checksum is based on the concept of the receiver adds the three sections, it will get all 1s,
redundancy. As shown in Figure 6, in the sender, the which, after complementing, is all 0s and shows that there
checksum generator subdivides the data unit into equal is no error.
971
Middle-East J. Sci. Res., 18 (7): 968-973, 2013
10101001 REFERENCES
00111001
00011101 1. Jasin, A., R. Alsaqour, M. Abdelhaq, O. Alsukour
Sum: 11111111 and R. Saeed, 2012. Review on Current Transport
Complement: 00000000 Layer Protocols for TCP/IP Model, International
means that the pattern is OK. Journal of Digital Content Technology and its
Applications, 6: 495-503.
Performance of Checksum: The traditional checksum 2. Chellis, J., C. Perkins and M. Strebe, 1999.
uses a small number of bits (16) to detect errors in a MCSE, Networking Essentials Study Guide with
message of any size (sometimes thousands of bits). CDROM, 2nd ed., New Riders Publishing.
However, it is not as strong as the CRC in error-checking 3. Karris, S., 2009. Networks, Design and Management,
capability. For example, if the value of one word is 2nd ed. Orchard Publications.
incremented and the value of another word is 4. Wu, K., H. Tan, Y. Liu, J. Zhang, Q. Zhang and
decremented by the same amount, the two errors L.M. Ni, 2012. Side channel: bits over interference,
cannot be detected because the sum and checksum Mobile Computing, IEEE Transactions on,
remain the same. Also if the values of several words 11: 1317-1330.
are incremented but the total change is a multiple of 5. Peterson, L.L. and B.S. Davie, 2007.
65535, the sum and the checksum does not change, Computer networks, a systems approach, 3rd ed.,
which means the errors are not detected. Fletcher and Elsevier.
Adler [12, 13] have proposed some weighted checksums, 6. Hossein Berenjeian Tabrizi, Ali Abbasi and
in which each word is multiplied by a number (its weight) Hajar Jahadian Sarvestani, 2013. Comparing the Static
that is related to its position in the text. [14, 15] This will
and Dynamic Balances and Their Relationship with
eliminate the first problem we mentioned. However, the
the Anthropometrical Characteristics in the Athletes
tendency in the Internet, particularly in designing new
of Selected Sports, Middle-East Journal of Scientific
protocols, is to replace the checksum with a CRC. The
Research, 15(2): 216-221.
Fletcher checksum and the later Adler checksum are both
7. Anatoliy Viktorovich Molodchik, 2013.
designed to give error detection properties almost as
Leadership Development. A Case of a Russian
good as CRCs with significantly reduced computational
Business School, Middle-East Journal of Scientific
cost.
Research, 15(2): 222-228.
8. Meruert Kylyshbaevna Bissenova and
CONCLUSION
Ermek Talantuly Nurmaganbet, The Notion of Guilt
and Problems of Legislative Regulations of its Forms.
There are different ways to detect error in the data
The Notion of Guilt in the Criminal Law of Kazakstan,
link layer. But not all the methods of error detection can
detect error accurately and effectively. Every method has Middle-East Journal of Scientific Research,
its own specialty, advantage and their own mechanism to 15(2): 229-236.
detect error. Parity check is simple and can detect all 9. Kaise, T. and M. Kitakami, 2002. Single-bit
single-bit error. CRC has a very good performance in error correcting and burst error locating
detecting single-bit errors, double errors, an odd number codes, in Information Theory, Proceedings,
of errors and burst errors while checksum is not efficient 2002. IEEE International Symposium on, 2002.
as the CRC in error detection when the two words are pp: 117.
incremented with the same amount, the two errors cannot 10. Behrouz, F. and M. Firouz, 2012.Computer Networks.
be detected because the sum and checksum remain the A Top Down Approach, 1st International ed.
same. McGraw-Hill,
The authors gratefully acknowledge the 11. Halsall, F., 2006. Computer Networking
support of this work by the Centre for Research and and the Internet, 5/e: Pearson Education
Instrumentation Management (CRIM), University India.
Kebangsaan Malaysia UKM), Malaysia. Grant 12. Bonaventure, O., 2011. Computer Networking
numbers: UKM-GGPM-ICT-035-2011 and UKM-GUP- Principles, Protocols and Practice. The Saylor
2012-089. Foundation.
972
Middle-East J. Sci. Res., 18 (7): 968-973, 2013
13. Fletcher, J., 1982. An arithmetic checksum for serial 15. Mueen Uddin, Asadullah Shah, Raed Alsaqour and
transmissions, Communications, IEEE Transactions Jamshed Memon, 2013. Measuring Efficiency of Tier
on, 30: 247-252. Level Data Centers to Implement Green Energy
14. Gailly, J. and P. Deutsch, 1996. Zlib compressed data Efficient Data Centers, Middle-East Journal of
format specification version 3.3, Network Working Scientific Research, 15(2): 200-207.
Group Request for Comments (RFC),
http://tools.ietf.org/html/rfc1950.
973