Define checksum, Computer Network Security

The method used to check errors is checksum. In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the final sum. Then checksum is calculated by transmission then it is sent along the data and the receiver and the same camputation is done and then compared with the original checksum transferred. In this way errors are checked if the received checksum is different from the sender.

The figure explained the example.

704_CheckSum.png

The integers may be 8,32 or 16 bits. Checksum is easy to check. It needs only addition but it has also limitations and can not check all errors. As given below.

 

 

1542_CheckSum.png

Posted Date: 7/30/2012 5:47:07 AM | Location : United States







Related Discussions:- Define checksum, Assignment Help, Ask Question on Define checksum, Get Answer, Expert's Help, Define checksum Discussions

Write discussion on Define checksum
Your posts are moderated
Related Questions
Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo