Determine ones complement of sum eight-bit bytes

Assignment Help Basic Computer Science
Reference no: EM1381479

UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes? UDP and TCP utilize 16-bit words in calculating checksum, for this problem you are being asked to consider 8-bit sums. Illustrate all work. Describe why is it that UDP takes the 1s complement of the sum; that is.

Why not just use sum? With 1s complement schema, how does receiver detect errors? Is it possible that 1-bit error will go undetected? How about 2-bit error?

Describe and illustrate all addition of the three binary 8 bit bytes along with the carry over of ones in the addition of the problem.

Reference no: EM1381479

Questions Cloud

What is the optimal production quantity for the card : Wholemark is an Internet order business that sells one popular New Year greeting card once a year. The cost of the paper on which the card is printed is $0.95 per card
Feminization of poverty : What is feminization of poverty? What factors are responsible for keeping women uneducated and poor in the USA, and around the world? Is it plain old male tyranny?
Suppose the production manager is asked to reduce : Suppose the production manager is asked to reduce the safety stock of this item by 45 percent. If she does so, what will the new service probability be
Create a diagram for a hydrocarbon with 5 carbons : Create a diagram for a hydrocarbon with 5 carbons with a double bond between carbons 2 and 3 and structural isomer with the same number of carbons and hydrogens.
Determine ones complement of sum eight-bit bytes : UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes?
Monopoly optmum : How does the charging the monoply a specific tax per unit affect the monopoly optmum
Political ideologies in the united states : Identify the four most common political ideologies in the United States. Describe the basic beliefs of two of the ideologies, and what sort of policies would subscribers of these two ideologies support and oppose?
Drawing on hall''s high and low context : Drawing on hall's high and low context, describe some of the communication issues that might well arise when an arab company officer who hasvspent his career in the middle east is sent on temporary assignment
Creating a simple family tree : In a separate piece of paper, make a simple family tree for a couple showing children, and lineages from two children showing grand children, great grandchildren, great great grandchildren, and great great great grandchildren.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  State turing machine m that calculates function

State a Turing Machine M that computes the function f: {a, b}* → N, where: f(x) = the unary encoding of max(#a(x), #b(x)).

  Explain how backups are taken using microsoft access

Explain how backups are taken using Microsoft Access. What are the issues that must be considered before starting the backup? When an Access database is restored from backup, what issues need to be considered regarding the data?

  Approach appropriate for company forefront of technology

However, adopting a secondary approach where others adopt early and a firm learns from their mistakes is often a viable strategy. When is each approach most appropriate and why?

  Descriptions of data formats and to interpret raw data

The aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to interpret raw data according to a particular format.  In this exercise you will produce and read the dump of a ZIP file.

  Expalining protocols essential in data communications

What is meant by protocol? Why are protocols essential in data communications?

  Benefits and three negative effects workplace automation

Write at least three benefits and three negative effects brought about by workplace automation. Multinational corporation transfers a foreign employee to the United States on an L-1 visa.

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  Describing online services provided by selected companies

Identify and briefly describe the online services provided by the selected companies (e.g. online catalogue search, online information search.

  Show how mips can implement the instruction swap

Show how MIPS can implement the instruction swap $rs $rt, which swaps the contents of registers $rs and $rt. Consider the case in which there is an available register.

  Determine one-s complement of sum of eight-bit bytes

UDP and TCP use 1s complement for their checksums. Assume you have following three 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes?

  Type of information of microsoft useful inprofessional life

What kind of information on the site do you find to be valuable to you? What kind of information about Microsoft Word do you find to be useful in your personal or professional life? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd