Write a program to implement the checksum method

Assignment Help Computer Engineering
Reference no: EM132210231

Write a program to implement the checksum method.

The implementation has two parts:

Calculating the checksum at the sender

Verifying the checksum at the receiver

Calculating the checksum at the sender

Inputs: 4 data each consisting of 16-bit (binary)

Output: Checksum of 16-bit (binary)

For example, suppose we have the following data. I separate the

data into groups of 4 bits only for readability.

1000 0110 0101 1110

1010 1100 0110 0000

0111 0001 0010 1010

1000 0001 1011 0101

First, we add the 16-bit values 2 at a time:

1000 0110 0101 1110 First 16-bit value

+ 1010 1100 0110 0000 Second 16-bit value

---------------------

1 0011 0010 1011 1110 Produced a carry-out, which gets added

+ \----------------> 1 back into LSb

---------------------

0011 0010 1011 1111

+ 0111 0001 0010 1010 Third 16-bit value

---------------------

0 1010 0011 1110 1001 No carry to swing around (**)

+ 1000 0001 1011 0101 Fourth 16-bit value

---------------------

1 0010 0101 1001 1110 Produced a carry-out, which gets added

+ \----------------> 1 back into LSb

---------------------

0010 0101 1001 1111 Our "one's complement sum"

(**) Note that we could "swing around" the carry-out of 0, but adding

0 back into the LSb has no effect on the sum. (But technically, that's

what the checksum generator does.)

Then we have to take the one's complement of the sum. We do this by simply inverting all the bits in the final result from above:

0010 0101 1001 1111 Our "one's complement sum"

1101 1010 0110 0000 The "one's complement"

Therefore, the checksum generated from the given data would be

1101 1010 0110 0000.

Verifying the checksum at the receiver

Inputs: 4 data each is consisting of 16-bit and their 16-bit checksum

Output: Checksum for 4 data each is consisting of 16-bit and their 16-bit
checksum

If checksum is equal to 0s, your data is not corrupted

If checksum is not equal 0s, your data is corrupted

Please in java

Reference no: EM132210231

Questions Cloud

Which attempt to think global and act local : Identify examples of companies/products which attempt to think global and act local (‘glocalisation’).
Present a logical thesis driven essay : Present a logical thesis driven essay which argues its case. Marks will be deducted if the essay indulges in personal responses and empty discussions.
Court-ordered desegregation plan involving busing : An affluent school district was subject to a court-ordered desegregation plan involving busing.
Write a program to implement bubble sort : Write a program to implement bubble sort, insertion sort, selection sort, merge sort and quick sort (pivot = first index) algorithms.
Write a program to implement the checksum method : Write a program to implement the checksum method. Calculating the checksum at the sender.
Validate that the entered number meets these requirements : Write a program that inputs a string that represents a binary number. The string can contain only 0s and 1s and no other characters, not even spaces.
Do erickson and sizemore have contract : Do Erickson and Sizemore have a contract? If so, why? If not, are there any other theories of recovery available to Sizemore?
Implement the three disk-arm scheduling algorithms : Write a program to implement the three disk-arm scheduling algorithms. Write a driver program that generates a sequence of cylinder numbers .
Which of the four traps facing established firms : Which of the four traps (listed below) facing established firms do you see as the most prevalent and why?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design a single-bus structure for asc

Change the ASC instruction format to accommodate both preindexed and postindexed indirect addressing. Rewrite the microcode to accommodate those operations.

  How many packets can be sent before transmitter has to stop

If a 7-bit sliding window size is used, how many packets can be sent before the transmitter has to stop and wait for an acknowledgment?

  Name an example of each type of patterns

There are 1) Creational Patterns, 2) Behavioral Patterns. And 3) Structural Patterns HW 19.1 Name an example of each type of patterns.

  How could such a vulnerability come about

How could such a vulnerability come about? What controls could be instituted to counter such a vulnerability?

  Write down an assembly language program

Write down an assembly language program The product number from one to five (3 characters wide, right justified)

  Write a solution to the red or blue computation

In the first half step of an iteration, any red color can move right one cell if the cell to the right is unoccupied (white);

  Define how company will use enterprise resource planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.

  What is flash memory

What is the basic difference between EPROM and EEPROM?

  Write a program that will open a blastn

Write a program that will open a BLASTN (nucleotide to nucleotide search) output file, parse out specific information.

  Write a gui-based program that manages an auction

Write a GUI-based program that manages an auction of several items.

  Example of a business problem solved using a case statement

offer an example of a business problem solved using a case statement. Give an example for a business problem solved with an IF statement. Can IF statements replace SELECT statements, why or why not.

  How would an ssa bus configuration recover

How would an SSA bus configuration recover from a single disk failure? Suppose another node fails before the first one can be fixed. How would the system recover?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd