Determine ones complement of sum eight-bit bytes

Assignment Help Basic Computer Science
Reference no: EM1381479

UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes? UDP and TCP utilize 16-bit words in calculating checksum, for this problem you are being asked to consider 8-bit sums. Illustrate all work. Describe why is it that UDP takes the 1s complement of the sum; that is.

Why not just use sum? With 1s complement schema, how does receiver detect errors? Is it possible that 1-bit error will go undetected? How about 2-bit error?

Describe and illustrate all addition of the three binary 8 bit bytes along with the carry over of ones in the addition of the problem.

Reference no: EM1381479

Questions Cloud

What is the optimal production quantity for the card : Wholemark is an Internet order business that sells one popular New Year greeting card once a year. The cost of the paper on which the card is printed is $0.95 per card
Feminization of poverty : What is feminization of poverty? What factors are responsible for keeping women uneducated and poor in the USA, and around the world? Is it plain old male tyranny?
Suppose the production manager is asked to reduce : Suppose the production manager is asked to reduce the safety stock of this item by 45 percent. If she does so, what will the new service probability be
Create a diagram for a hydrocarbon with 5 carbons : Create a diagram for a hydrocarbon with 5 carbons with a double bond between carbons 2 and 3 and structural isomer with the same number of carbons and hydrogens.
Determine ones complement of sum eight-bit bytes : UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes?
Monopoly optmum : How does the charging the monoply a specific tax per unit affect the monopoly optmum
Political ideologies in the united states : Identify the four most common political ideologies in the United States. Describe the basic beliefs of two of the ideologies, and what sort of policies would subscribers of these two ideologies support and oppose?
Drawing on hall''s high and low context : Drawing on hall's high and low context, describe some of the communication issues that might well arise when an arab company officer who hasvspent his career in the middle east is sent on temporary assignment
Creating a simple family tree : In a separate piece of paper, make a simple family tree for a couple showing children, and lineages from two children showing grand children, great grandchildren, great great grandchildren, and great great great grandchildren.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  User interface design guidelines used for new system

Design a suitable source document for ads that are telephoned or mailed in. Suggest at least four user interface design guidelines that could be used for the new system.

  Types of pre-created objects that can be used on web sites

Types of pre-created objects that can be used on Web sites. Describe the objects you find and what they are used for. Include links to the sites you used in your research.

  Explain applications of pervasive computing

Which of the applications of pervasive computing do you believe are probable to gain greatest market acceptance over next few years? Why?

  What are different types of memory

What are some of the newer technology innovations you have seen in regards to I/O and Memory? What are the different types of Memory and how much is recommended?

  Explain the term omniscience

Explain the term omniscience Explain the importance of autonomy in an agent Develop the task environment for an interactive language tutor

  In-house development and packaged solution for r-way system

Should R/Way's new system be based on file-server or client/server architecture? Why? What would be the pros and cons of selecting in-house development versus a packaged solution for the R/Way system?

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  Recognize and explain six basic computer operations

Recognize the six basic computer operations. Describe each operation's role in computer program and indicate whether it is part of program's input component,

  How much memory is required to store picture

A 1024*768 image is displayed, noninterlaced, at a rate of thirty frames per second. If the image is stored with 64k-color resolution, which uses 2 bytes per pixel, how much memory is required to store the picture?

  Runnig test cases on same piece of code

Why four people must waste their time looking for faults when one person can run test cases on same piece of code. How do you respond?

  Explaining competition in early years of telephone industry

Was regulation alternative to competition in early years of telephone industry?

  Determine companies which specialize in computer forensics

What needs clarified? it's plainly stated use google to find 3 companies which specialize in computer forensics of those 3 companies write 2 or 3 paragraphs comparing what each company does.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd