Derive the transmitted crc header checksum, Computer Network Security


(a) Consider the following digital bit stream 01001100 is to be encoded in:

i. NRZ-I
ii. Pseudoternary
iii. Manchester
iv. Differential Manchester

Show the waveforms for each of the above-mentioned codes showing clearly the bit durations, signal levels and transitions where necessary.

(Assumptions: The signal level for NRZ-I for most recent preceding mark was positive; the signal level of the most recent preceding space was negative for Pseudoternary).

(b) A frame transmitter is using the generator polynomial x4 + x + 1 and that the header contains the above bit pattern: 10100110. Derive the transmitted CRC header checksum.

(c) Show how you could use a (11,7) block code to correct and detect a 1-bit error if say, the subsequent 1011000 bit pattern is received, while the original 1001000 bit pattern was transmitted.

Posted Date: 10/17/2013 7:29:26 AM | Location : United States

Related Discussions:- Derive the transmitted crc header checksum, Assignment Help, Ask Question on Derive the transmitted crc header checksum, Get Answer, Expert's Help, Derive the transmitted crc header checksum Discussions

Write discussion on Derive the transmitted crc header checksum
Your posts are moderated
Related Questions

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed