Define parity bit, Computer Network Security

PARITY BIT:

A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has parity bit 1 as it has odd number of 1's. An odd parity data packet 10010111 has parity bit 0 as it has odd number of 1's.

Let us take another example, if noise or other interference produces an error one of the bits in the data will be modified from a 1 to a 0 or from a 0 to a 1. Thus the parity of giving bits will be large.

Suppose original parity and data is 10100001+1 (even parity). After interference the incorrect data is 10101001+1 and it has convert an odd parity.

LIMITATIONS OF PARITY CHECKING:

Parity can only check errors that modify in odd number of bits for example the parity and original data is 10100001+1 (even parity) and the incorrect data is 10101011+1 (even parity). We can see that even no. of bits have been modified due to noise so parity checking could not check this error. Parity generally is used to check on bit error.

ALTERNATIVE ERROR DETECTION METHODES:

In addition to parity checking alternative error detection functions have been produced. These functions differ from each other by the following respects.

  • The size of the additional data information (transmission overhead)
  • Calculates complexity of the algorithm (computational overhead)
  • The number of bits errors that can be checked (how well errors are detected )

 

Posted Date: 7/30/2012 5:44:05 AM | Location : United States







Related Discussions:- Define parity bit, Assignment Help, Ask Question on Define parity bit, Get Answer, Expert's Help, Define parity bit Discussions

Write discussion on Define parity bit
Your posts are moderated
Related Questions
Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6


discuss the merits and demerits of computers freezing

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th