1988
DOI: 10.17487/rfc1071
|View full text |Cite
|
Sign up to set email alerts
|

Computing the Internet checksum

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
9

Year Published

2006
2006
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(43 citation statements)
references
References 3 publications
0
34
0
9
Order By: Relevance
“…The IP checksum is validated and recomputed at each hop using the Internet checksum algorithm-it is a 16-bit, one's complement sum of the data in the header [12]. This checksum is also used to validate the entire contents of packets at other protocol layers, notably TCP (the Transmission Control Protocol) and UDP (the User Datagram Protocol).…”
Section: Internet Router Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The IP checksum is validated and recomputed at each hop using the Internet checksum algorithm-it is a 16-bit, one's complement sum of the data in the header [12]. This checksum is also used to validate the entire contents of packets at other protocol layers, notably TCP (the Transmission Control Protocol) and UDP (the User Datagram Protocol).…”
Section: Internet Router Architecturementioning
confidence: 99%
“…The IP checksum is a one's complement 16-bit sum of the 16-bit words of the IP header [12]. It is commonly implemented using commonly available two's complement adders, in which the high-order carry-out is wrapped around as the low-order carry-in.…”
Section: Optical Checksummentioning
confidence: 99%
“…A checksum is an error detection mechanism that is created by "summing up" all the bytes or words in a data word to create a checksum value, which is appended to the stored or transmitted data word [22,23]. The checksum of the retrieved data word is recomputed and compared with the received checksum value, as shown in Fig1.…”
Section: Checksum Technique (Cst)mentioning
confidence: 99%
“…These techniques append excess information about the data to use them in detecting the possibility of violation. A checksum is an error detection mechanism that is created by summing up all the bytes or words in a data word to create a checksum value, which is appended to the stored or transmitted data word [8,9]. The checksum of the retrieved data word is recomputed and compared with the received checksum value.…”
Section: Introductionmentioning
confidence: 99%