Fill in the missing entries in the table

Assignment Help Basic Computer Science
Reference no: EM131046279

The CRC algorithm as presented in this chapter requires lots of bit manipulations. It is, however, possible to do polynomial long division taking multiple bits at a time, via a table-driven method, that enables efficient software implementations of CRC. We outline the strategy here for long division 3 bits at a time (see Table 2.6); in practice we would divide 8 bits at a time, and the table would have 256 entries. Let the divisor polynomial C = C(x) be x3 + x2 +1, or 1101. To build the table for C, we take each 3-bit sequence, p, append three trailing 0s, and then find the quotient
q = p ?000÷C, ignoring the remainder. The third column is the product C × q, the first 3 bits of which should equal p.

(a) Verify, for p = 110, that the quotients p ?000 ÷ C and p ?111 ÷ C are the same; that is, it doesn't matter what the trailing bits are.

367_3976fc14-5c0e-4a55-9a49-31f0dc6383a9.png

(b) Fill in the missing entries in the table.

(c) Use the table to divide 101 001 011 001 100 by C. Hint: The first 3 bits of the dividend are p = 101, so from the table the corresponding first 3 bits of the quotient are q = 110. Write the 110 above the second 3 bits of the dividend, and subtract C×q = 101 110, again from the table, from the first 6 bits of the dividend. Keep going in groups of 3 bits. There should be no remainder.

Reference no: EM131046279

Questions Cloud

How dcf techniques are useful in overcoming financial risks : Explain how DCF techniques are useful in overcoming financial risks at the time of taking investment decision, supporting your answer with an example - Compare between any two brands and their local demand in the market
Develop curiosity to generate significant and problematic : Hopefully, this semester your accompanying research helped you to become more critical consumers of the material you read, and to develop the curiosity to generate significant and problematic questions.
An example of a byte/bit sequence that should never appear : For each of the following framing protocols, give an example of a byte/bit sequence that should never appear in a transmission.
Identify most significant cybersecurity threats to a company : For this assignment, imagine that you are a cybersecurity consultant hired to identify the most significant cybersecurity threats to a company.
Fill in the missing entries in the table : Write the 110 above the second 3 bits of the dividend, and subtract C×q = 101 110, again from the table, from the first 6 bits of the dividend. Keep going in groups of 3 bits. There should be no remainder.
Identify the top hr risks that mark french need to manage : Mark French has called his senior management team in early on a Monday morning about three weeks ago. He handed each of the managers a document titled, Future Directions. Identify the top five HR risks that Mark French and his team will need to man..
Designing a sliding window protocol for a 1-mbps : Assuming that each frame carries 1 KB of data, what is the minimum number of bits you need for the sequence number in the following cases? Assume the speed of light is 3 × 108 m/s.
Create a informational report on dodge data services : Create a 2-3 page professional-looking informational report (stapled; no report covers) on a topic that provides information to Dodge Data Services.
What is the minimum number of bits you need : Assuming that each frame carries 1 KB of data, what is the minimum number of bits you need for the sequence number?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Lack the virtues they are not truly flourishing

lack the virtues they are not truly flourishing

  Write a main program which will prompt the user

Write a Main Program which will prompt the user for how many numbers they which to enter as an integer counter (numcount) variable. The program should then prompt the user to enter each number using a loop and then output the average of the number..

  Write a function in python

Write a function in Python that could open a file to read and get the function names in the file as a list of strings

  How verbal and nonverbal communication affect communication

Write 1,750- to 2,100-word paper explaining how verbal and nonverbal communication can affect communication in given areas: Police situations (public announcement to the press).

  Create a database schema that supports the companys business

Create a database schema that supports the companys business and processes - Explain and support the database schema with relevant arguments that support the rationale for the structure.

  Consider a telephone system that has an automatic redial

Telephone SystemConsider a telephone system that has an automatic redial feature

  Webpage in html that can segregate and store music

Task: A homepage that automatically comes up when you go to 127.0.0.1:3000 (instead of the default Ruby-on-Rails page). This page will describe your musical tastes including your two favorite types of music. These two types could be like: rock and..

  What is the objective of the hipaa security rule

What isThe HIPAA Security Rule?What Is the Objective of theHIPAA Security Rule?How Is the HIPAA Security Rule Organized?

  Using the sql schema generation feature of the modeling tool

Consider the description of UNIVERSITY database below. Using the SQL schema generation feature of the modeling tool, generate the SQL schema and diagram for an Oracle database.

  Create a column of integers 1 through 30

In the next three columns show how each value is represented using the binary, octal, and hex number systems. Identify when and why each of the each three numbering systems is used ?

  For each of these pairs of sets determine whether the first

for each of these pairs of sets determine whether the first is a subset of the second the second is a subset of the

  Organization is planning to deploy sql server 2012

Your organization is planning to deploy SQL Server 2012 on two (2) servers as a production database. You have been asked to outline the steps required to implement these servers into the existing network, with the knowledge that 500 users will be con..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd