Compute the checksum as tcp/ip does

Assignment Help Computer Engineering
Reference no: EM133218020

Question 1. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don't select the last packet because it might be too short, less than 10 characters.

Question 2. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.

Question 3. Using the "Text Encoding in ASCII" applet from lab2, type in the characters from the data packet, and click on translate text. (You can use an ASCII chart instead if you'd prefer).

Question 4. Add up the values for each of the characters. Then take the modulus of this number using 256. The modulus operator is available on some computer calculators and is represented by mod, but you can easily compute it by dividing the total by 256 and saving only the remainder. For instance, suppose the total is 650. Since 650 ÷ 256 = 2.5390, but we only want the remainder or 138 which is obtained as: (650 - (2 * 256) = 138).

Question 5. Compare your manually computed checksum (use the approach that was given in the class and question 4) for the first packet of the message Introduction to Computer Science against what the applet shows for the packet. Do they agree?

Question 6. Now damage your packet by altering one character (for instance change the C to any other character). Re-compute the checksum. You should realize how the applet can spot errors?

Question 7. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version (There are several possibilities. Imagine that two or more bytes are altered at the same time). Give one example for this scenario.

Reference no: EM133218020

Questions Cloud

Are they faster to evaluate : Are they faster to evaluate? Are they more accurate? Also, in C++ programming, we write infix algebraic expressions, how are these infix expressions evaluated
Design a system of triggers to enforce the m-m relationship : Design a system of triggers to enforce the M-M relationship. USe Figure 10B-59 as an example, but assume that departments with only one employee can be deleted
Prediction made using regular multiple regression : Summarize your results any way you like, but please don't give us the raw coefficients from 90 variables. c. Using the results from
Add a new field to the revenue query : displays Profit when the value of the Net field is greater than zero and Loss when it is less than or equal to zero. Need this function drawn up for Microsoft A
Compute the checksum as tcp/ip does : See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don't select the last packet because it might
What would be an obvious way to decrease the overhead : How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
Four rules for credit rating and each customer : Enter formulas/functions for rules 1-4 in columns I, J, K, and L respectively. These formulas will demonstrate if the customer credit is approved based on each
Evaluate various platforms for characteristics : Evaluate various platforms for characteristics, advantages, and weaknesses for hosting a web-based software application. Consider the following in your
Provide an overview of your data : Provide an overview of your data, business/organization, and use case Analyze the data and give reasoning of why you think it is useful to the business

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd