Cyclic redundancy check (crc), Computer Network Security

CYCLIC REDUNDANCY CHECK (CRC)

To activate a network system to check move error without increasing the amount of information in every packet another most successful method is made which is named CRC.

To understand the functions of CRC consider data in a packet as co-efficient of a polynomial. Their co-efficient set is divided by a given polynomial. The remainder of this division is then transferred as checked and CRC at the receiver to check errors. CRC has good error detection properties. It is easy to understand in hardware.

HARDWARE COMPONENTS USED IN CRC:

CRC needs just two hardware elements:

  • Shift register
  • Exclusive OR ( XOR unit )

The XOR unit is given in the figure below.

 

1913_CRC.png

 

Shift register is also given in figure. It operates two operations.

  • Initialize: puts all bits to zero
  • Shift: replaced all bits to the left position.

 

 

1331_CYCLIC REDUNDANCY CHECK.png

Posted Date: 7/30/2012 5:50:47 AM | Location : United States







Related Discussions:- Cyclic redundancy check (crc), Assignment Help, Ask Question on Cyclic redundancy check (crc), Get Answer, Expert's Help, Cyclic redundancy check (crc) Discussions

Write discussion on Cyclic redundancy check (crc)
Your posts are moderated
Related Questions
Ask question #Minimum.. 100 words accepted#

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Discuss the risks of having a single root user

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

how can you enter the ASVAB practice test on line?

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so