Cyclic redundancy check (crc), Computer Network Security

CYCLIC REDUNDANCY CHECK (CRC)

To activate a network system to check move error without increasing the amount of information in every packet another most successful method is made which is named CRC.

To understand the functions of CRC consider data in a packet as co-efficient of a polynomial. Their co-efficient set is divided by a given polynomial. The remainder of this division is then transferred as checked and CRC at the receiver to check errors. CRC has good error detection properties. It is easy to understand in hardware.

HARDWARE COMPONENTS USED IN CRC:

CRC needs just two hardware elements:

  • Shift register
  • Exclusive OR ( XOR unit )

The XOR unit is given in the figure below.

 

1913_CRC.png

 

Shift register is also given in figure. It operates two operations.

  • Initialize: puts all bits to zero
  • Shift: replaced all bits to the left position.

 

 

1331_CYCLIC REDUNDANCY CHECK.png

Posted Date: 7/30/2012 5:50:47 AM | Location : United States







Related Discussions:- Cyclic redundancy check (crc), Assignment Help, Ask Question on Cyclic redundancy check (crc), Get Answer, Expert's Help, Cyclic redundancy check (crc) Discussions

Write discussion on Cyclic redundancy check (crc)
Your posts are moderated
Related Questions
WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

UDP DATAGRAM FORMAT: It is given in the figure below:

How much would it cost to have a project completed by tomorrow night?

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)