Define checksum, Computer Network Security

The method used to check errors is checksum. In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the final sum. Then checksum is calculated by transmission then it is sent along the data and the receiver and the same camputation is done and then compared with the original checksum transferred. In this way errors are checked if the received checksum is different from the sender.

The figure explained the example.

704_CheckSum.png

The integers may be 8,32 or 16 bits. Checksum is easy to check. It needs only addition but it has also limitations and can not check all errors. As given below.

 

 

1542_CheckSum.png

Posted Date: 7/30/2012 5:47:07 AM | Location : United States







Related Discussions:- Define checksum, Assignment Help, Ask Question on Define checksum, Get Answer, Expert's Help, Define checksum Discussions

Write discussion on Define checksum
Your posts are moderated
Related Questions
Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial