Define checksum, Computer Network Security

The method used to check errors is checksum. In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the final sum. Then checksum is calculated by transmission then it is sent along the data and the receiver and the same camputation is done and then compared with the original checksum transferred. In this way errors are checked if the received checksum is different from the sender.

The figure explained the example.

704_CheckSum.png

The integers may be 8,32 or 16 bits. Checksum is easy to check. It needs only addition but it has also limitations and can not check all errors. As given below.

 

 

1542_CheckSum.png

Posted Date: 7/30/2012 5:47:07 AM | Location : United States







Related Discussions:- Define checksum, Assignment Help, Ask Question on Define checksum, Get Answer, Expert's Help, Define checksum Discussions

Write discussion on Define checksum
Your posts are moderated
Related Questions
(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

Network diagram for a mediacal care

what is relation ship between computer security goals?