Computer Networks Lab
(231CS5L02)
[Link] RAM [Link];(Ph.D)
Assistant Professor
Computer Science and Engineering
Aditya University
Error Detection Code - Checksum
• Checksum is the error detection method used by upper-layer protocols and is considered
to be more reliable than Longitudinal Redundancy Check (LRC), Vertical Redundancy
Check (VRC), and Cyclic Redundancy Check (CRC). This method uses a Checksum
Generator on the sender side and a Checksum Checker on the receiver side.
• On the Sender side, the data is divided into equal subunits of n bit length by the
checksum generator. This bit is generally of 16-bit length. These subunits are then added
together using one's complement method. This sum is of n bits. The resultant bit is then
complemented. This complemented sum which is called checksum is appended to the
end of the original data unit and is then transmitted to the receiver.
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 2
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 3
• The Receiver after receiving data + checksum passes it to checksum checker.
Checksum checker divides this data unit into various subunits of equal length and
adds all these subunits.
• These subunits also contain checksum as one of the subunits.
• The resultant bit is then complemented.
• If the complemented result is zero, it means the data is error-free.
• If the result is non-zero it means the data contains an error and Receiver rejects
it.
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 4
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 5
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 6
Advantages of Checksum
•Error Detection: It helps detect data corruption during transmission or storage, ensuring the data
received is correct.
•Simple and Fast: Easy to implement with quick calculations, making it ideal for real-time applications
like network transfers.
•Less Resources: Requires minimal computing resources, so it doesn’t slow down the system.
Disadvantages of Checksum
•Limited Detection: It may miss certain types of errors, such as bit rearrangements or specific patterns of
corruption.
•No Error Correction: It can only detect errors but cannot fix or recover corrupted data.
•Not Secure: Checksum algorithms are not designed for security and can be easily manipulated by
attackers.
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 7
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 8
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE. 9
Thank You
13/10/2025 Computer Networks [Link] Ram, [Link]., CSE.
10