Determine complement of sum of these eight-bit bytes

Assignment Help Basic Computer Science
Reference no: EM1347998

Q1) UDP and TCP use 1s complement their checksums. Assume you have following three 8-bit bytes: 01010011, 01010100, 01110100. Determine the 1s complement of sum of these eight-bit bytes? (Note that although UDP and TCP you 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a one bit error will go undetected? How about a two bit error?

Reference no: EM1347998

Questions Cloud

Discuss the major funds for a governmental entity : Discuss and explain the major funds for a governmental entity & what items belong in those funds. These funds include general amount, a governmental or enterprise fund.
Find out the final velocity of the handcar : A concrete highway is built of slabs 8.0 m long (20°C). How wide should expansion cracks between the slabs be (at 20°C) to prevent buckling if the range of temperature is -35°C to +45°C.
Creation of a motivational and rewards program : create a comprehensive motivational and rewards strategy for an organization to enhance its overall effectivness.
Discuss the organizational structure of your organization : Discuss the organizational structure of your selected organization, then compare and contrast it with two different organizational structures.
Determine complement of sum of these eight-bit bytes : UDP and TCP use 1s complement their checksums. Assume you have following three 8-bit bytes: 01010011, 01010100, 01110100. Determine 1s complement of sum of these eight-bit bytes?
How an psychologist can raise employee motivation : How can an industrial/organizational psychologist help employees to raise their self-expectations and increase their motivation for success?
Find out the angular speed after the grindstone : A rotating cylinder about 16 {rm km} long and 7.40 km in diameter is designed to be used as a space colony. With what angular speed must it rotate so that the residents on it would experience the same acceleration due to gravity as on Earth.
Find the amount of gain or loss : The Horstmeyer Company commenced operations early in 2011. A number of expneses were made during 2011 that were debited to one account called intangible asset.
Custom vs pre canned motivation program : Prepare a custom motivation program or purchase one offered by a consulting firm. What are the dilemmas the manager faces in selecting either of theses alternatives?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining firewalls and virus protection software

Lots of people who connect their systems to the Internet rush out and purchase latest copies of firewalls and virus protection software.

  What your research aims to do

You need to describe what your research aims to do, the objectives that need to be meet to get to the final aim, the context and technical background of the work and also why it is important that this work is carried out.

  Drawing crow-s foot erd using a specialization hierarchy

Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate.

  Data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs, Flash RAM, and solid-state drives

  Sequence diagram for field officer

Draw a sequence diagram for the following use case. Draw only the first five messages sent. The FieldOfficer activates the "Report Emergency" function of her terminal. The system responds by presenting a form to the officer.

  Runnig test cases on same piece of code

Why four people must waste their time looking for faults when one person can run test cases on same piece of code. How do you respond?

  Tools or tactics for risks for computing infrastructure

As part of project to assess security risks for computing infrastructure, you have found that other managers often have different idea. List any tools or tactics that could be used.

  Rating of vital for page with highest utility

Rating of Vital is always given to the page with the highest utility.

  Relationship between certifications and performance

Describe the relationship between certifications and performance? What does "performance" mean and how do you measure it?

  Determining minimum size of control bus

Determine the minimum size of the control bus?

  Laws and regulation in telecommunications field

Do you believe we require laws and regulation in telecommunications field at all? Why or why not?

  Finding instruction format for indirect addressing

Determine the instruction format, considering that there is no bit for indirect addressing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd