Error Detection Approach
Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
Please use scholarly sources.

Error Detection Approach
An error occurs during transfer of information between networks where the sender’s information appears different from receiver’s information. An error occurs when the signals are affected in various ways, such as the corruption of data and effect from noise (Logapriya, and Preethi, 2016). Various detecting codes are used in the transport layer and the data link layer to detect errors during data transfer. The main approaches used in error detection include a checksum, cyclic redundancy and simple parity check.
The cyclic redundancy check (CRC) uses binary division instead of adding segments as checksum. The sequence of bits in this approach is known as the cyclic redundancy check bits implemented at the end of data. The redundancy check bits are appended at the end to ensure the final data unit can be divided by the second binary number (Gupta, 2019). When the data unit is divided at the destination and no remainder, the data unit is considered correct. In the case of a remainder, the data unit consists of errors, hence rejected. The cyclic redundancy check is a powerful error detection approach that uses the finite algebra theory of binary division (Gupta, 2019). CRC is easy to implement using hardware, such as the shift registers. CRC detects errors, such as long burst error, longer burst error and the short errors.
The checksum error detector operates by dividing data into segments (k) in every bit (m). The sender uses the 1’s complement arithmetic in adding the segments to get the sum, complemented to provide the checksum (Momtaz, Banerjee, and Chatterjee, 2017). However, the checksum is sent together with data to the receiver, where the receiver adds 1’s segment arithmetic to get the sum, which is complimented. The error is corrected if the results are zero, where the receiver discards the data. The checksum detector have a lower liability of undetected errors and considered simple.
A simple parity check detects an error from the data source through the parity bit generator as the check bit. For instance, adding 1 to the data block with an odd number of 1’s and 0 when the block consists of even numbers of 1’s (Himaja, Vinodhini, and Murty, 2018). The approach makes results in an even number of 1s. The parity check detector only checks errors when the receiver’s signal consists of contrasting expected parity.Appart from detecting an odd number of bit error, a parity check can detect error patterns. The parity check and checksum are appropriate for error detection but go through various limitations, such as, cannot detect an even number of bit errors; therefore, most information technology experts consider the CRC. The parity check is the simplest compared to CRC and checksum.
CRC detects errors, such as long burst error, longer burst error and short errors. The CRC can operate even in worst situations through the error features, such as data encryption. Nevertheless, CRC may be the easiest to implement but requires minimum software and hardware. Additionally, the CRC can detect errors in different data types, such as the double bit errors, single-bit errors and burst errors. On the other hand, the parity check is limited and only detects single-bit errors (Himaja, Vinodhini, and, Murty, 2018).
Checksum error detector detects multiple bit errors, and single-bit errors; hence, CRS is the most reliable (Logapriya, and Preethi, 2016). The CRC can be used in various systems, such as in public switched data networks, internet and amateur packets, where data can be secured and privatized between different networks using data encryption (Gupta, 2019). Although checksum is limited to bit errors, the approach consists of strong but costly types of checksums, such as the sha series and MD5. Data communication is a critical area in the military, business organizations and the government; hence error decors are implemented to acquire perfect medium.

References
Logapriya, R., & Preethi, J. (2016). Efficient Methods in wireless sensor network for error detection, correction and recovery of data. International Journal of Novel Research in Computer Science and Software Engineering, 3(2), 47-54.
Gupta, M. (2019). Cyclic Redundancy Check Based Data Authentication in Opportunistic. In 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication: WIDECOM 2019 (Vol. 27, p. 17). Springer.
Momtaz, M. I., Banerjee, S., & Chatterjee, A. (2017, July). Probabilistic error detection and correction in switched capacitor circuits using checksum codes. In 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS) (pp. 271-276). IEEE.
Himaja, U. S., Vinodhini, M., & Murty, N. S. (2018, October). Multi-Bit Low Redundancy Error control with Parity Sharing for NoC Interconnects. In 2018 3rd International Conference on Communication and Electronics Systems (ICCES) (pp. 61-65). IEEE.

Published by
Essays
View all posts