Define checksum, Computer Network Security

The method used to check errors is checksum. In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the final sum. Then checksum is calculated by transmission then it is sent along the data and the receiver and the same camputation is done and then compared with the original checksum transferred. In this way errors are checked if the received checksum is different from the sender.

The figure explained the example.

704_CheckSum.png

The integers may be 8,32 or 16 bits. Checksum is easy to check. It needs only addition but it has also limitations and can not check all errors. As given below.

 

 

1542_CheckSum.png

Posted Date: 7/30/2012 5:47:07 AM | Location : United States







Related Discussions:- Define checksum, Assignment Help, Ask Question on Define checksum, Get Answer, Expert's Help, Define checksum Discussions

Write discussion on Define checksum
Your posts are moderated
Related Questions
Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t