Cyclic redundancy check (crc), Computer Network Security

CYCLIC REDUNDANCY CHECK (CRC)

To activate a network system to check move error without increasing the amount of information in every packet another most successful method is made which is named CRC.

To understand the functions of CRC consider data in a packet as co-efficient of a polynomial. Their co-efficient set is divided by a given polynomial. The remainder of this division is then transferred as checked and CRC at the receiver to check errors. CRC has good error detection properties. It is easy to understand in hardware.

HARDWARE COMPONENTS USED IN CRC:

CRC needs just two hardware elements:

  • Shift register
  • Exclusive OR ( XOR unit )

The XOR unit is given in the figure below.

 

1913_CRC.png

 

Shift register is also given in figure. It operates two operations.

  • Initialize: puts all bits to zero
  • Shift: replaced all bits to the left position.

 

 

1331_CYCLIC REDUNDANCY CHECK.png

Posted Date: 7/30/2012 5:50:47 AM | Location : United States







Related Discussions:- Cyclic redundancy check (crc), Assignment Help, Ask Question on Cyclic redundancy check (crc), Get Answer, Expert's Help, Cyclic redundancy check (crc) Discussions

Write discussion on Cyclic redundancy check (crc)
Your posts are moderated
Related Questions
ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any