Cyclic redundancy check (crc), Computer Network Security

CYCLIC REDUNDANCY CHECK (CRC)

To activate a network system to check move error without increasing the amount of information in every packet another most successful method is made which is named CRC.

To understand the functions of CRC consider data in a packet as co-efficient of a polynomial. Their co-efficient set is divided by a given polynomial. The remainder of this division is then transferred as checked and CRC at the receiver to check errors. CRC has good error detection properties. It is easy to understand in hardware.

HARDWARE COMPONENTS USED IN CRC:

CRC needs just two hardware elements:

  • Shift register
  • Exclusive OR ( XOR unit )

The XOR unit is given in the figure below.

 

1913_CRC.png

 

Shift register is also given in figure. It operates two operations.

  • Initialize: puts all bits to zero
  • Shift: replaced all bits to the left position.

 

 

1331_CYCLIC REDUNDANCY CHECK.png

Posted Date: 7/30/2012 5:50:47 AM | Location : United States







Related Discussions:- Cyclic redundancy check (crc), Assignment Help, Ask Question on Cyclic redundancy check (crc), Get Answer, Expert's Help, Cyclic redundancy check (crc) Discussions

Write discussion on Cyclic redundancy check (crc)
Your posts are moderated
Related Questions
You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

how can you enter the ASVAB practice test on line?

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter