Cyclic redundancy check (crc), Computer Network Security

CYCLIC REDUNDANCY CHECK (CRC)

To activate a network system to check move error without increasing the amount of information in every packet another most successful method is made which is named CRC.

To understand the functions of CRC consider data in a packet as co-efficient of a polynomial. Their co-efficient set is divided by a given polynomial. The remainder of this division is then transferred as checked and CRC at the receiver to check errors. CRC has good error detection properties. It is easy to understand in hardware.

HARDWARE COMPONENTS USED IN CRC:

CRC needs just two hardware elements:

  • Shift register
  • Exclusive OR ( XOR unit )

The XOR unit is given in the figure below.

 

1913_CRC.png

 

Shift register is also given in figure. It operates two operations.

  • Initialize: puts all bits to zero
  • Shift: replaced all bits to the left position.

 

 

1331_CYCLIC REDUNDANCY CHECK.png

Posted Date: 7/30/2012 5:50:47 AM | Location : United States







Related Discussions:- Cyclic redundancy check (crc), Assignment Help, Ask Question on Cyclic redundancy check (crc), Get Answer, Expert's Help, Cyclic redundancy check (crc) Discussions

Write discussion on Cyclic redundancy check (crc)
Your posts are moderated
Related Questions
Question: a) How many bits per second can be sent on a noiseless 4 MHz channel if four-level digital signals are used? b) If a binary signal is sent over a 3 KHz channel who


Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

for making the assignment

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

what is an SSID?