Types of errors detection in crc , Computer Network Security

Assignment Help:

CRC can detect the following errors better than check sums.

a) Vertical errors

b) Burst errors

a) VERTICAL ERRORS:

 This kind of error happens due to a hardware failure. e.g. the second bit of each character will damage.

b) BURST ERRORS:

When a small set of bits modifies near a specific place due to electric or lighting motor starting nearby etc. then these kinds of errors are known as Burst errors.

 

 


Related Discussions:- Types of errors detection in crc

Explain how the diffie-hellman key agreement protocol works, (a) Using Fer...

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Token ring, TOKEN RING Many LAN methods that are ring topology need to...

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

Software vulnerabilities, 1.  We used the National Vulnerability Database. ...

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Emulation, In this section, you should create a program that emulates a GBN...

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Write pseudocode for the password guessing algorithm, Write Pseudocode for ...

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Explain about structure of management information, Question 1 a) What is a...

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

Access controls-information security, Access Controls Access controls ad...

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd