Define checksum, Computer Network Security

The method used to check errors is checksum. In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the final sum. Then checksum is calculated by transmission then it is sent along the data and the receiver and the same camputation is done and then compared with the original checksum transferred. In this way errors are checked if the received checksum is different from the sender.

The figure explained the example.

704_CheckSum.png

The integers may be 8,32 or 16 bits. Checksum is easy to check. It needs only addition but it has also limitations and can not check all errors. As given below.

 

 

1542_CheckSum.png

Posted Date: 7/30/2012 5:47:07 AM | Location : United States







Related Discussions:- Define checksum, Assignment Help, Ask Question on Define checksum, Get Answer, Expert's Help, Define checksum Discussions

Write discussion on Define checksum
Your posts are moderated
Related Questions
The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

what is relation ship between computer security goals?

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif