Define parity bit, Computer Network Security

PARITY BIT:

A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has parity bit 1 as it has odd number of 1's. An odd parity data packet 10010111 has parity bit 0 as it has odd number of 1's.

Let us take another example, if noise or other interference produces an error one of the bits in the data will be modified from a 1 to a 0 or from a 0 to a 1. Thus the parity of giving bits will be large.

Suppose original parity and data is 10100001+1 (even parity). After interference the incorrect data is 10101001+1 and it has convert an odd parity.

LIMITATIONS OF PARITY CHECKING:

Parity can only check errors that modify in odd number of bits for example the parity and original data is 10100001+1 (even parity) and the incorrect data is 10101011+1 (even parity). We can see that even no. of bits have been modified due to noise so parity checking could not check this error. Parity generally is used to check on bit error.

ALTERNATIVE ERROR DETECTION METHODES:

In addition to parity checking alternative error detection functions have been produced. These functions differ from each other by the following respects.

  • The size of the additional data information (transmission overhead)
  • Calculates complexity of the algorithm (computational overhead)
  • The number of bits errors that can be checked (how well errors are detected )

 

Posted Date: 7/30/2012 5:44:05 AM | Location : United States







Related Discussions:- Define parity bit, Assignment Help, Ask Question on Define parity bit, Get Answer, Expert's Help, Define parity bit Discussions

Write discussion on Define parity bit
Your posts are moderated
Related Questions
- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu