Derive the transmitted crc header checksum, Computer Network Security


(a) Consider the following digital bit stream 01001100 is to be encoded in:

i. NRZ-I
ii. Pseudoternary
iii. Manchester
iv. Differential Manchester

Show the waveforms for each of the above-mentioned codes showing clearly the bit durations, signal levels and transitions where necessary.

(Assumptions: The signal level for NRZ-I for most recent preceding mark was positive; the signal level of the most recent preceding space was negative for Pseudoternary).

(b) A frame transmitter is using the generator polynomial x4 + x + 1 and that the header contains the above bit pattern: 10100110. Derive the transmitted CRC header checksum.

(c) Show how you could use a (11,7) block code to correct and detect a 1-bit error if say, the subsequent 1011000 bit pattern is received, while the original 1001000 bit pattern was transmitted.

Posted Date: 10/17/2013 7:29:26 AM | Location : United States

Related Discussions:- Derive the transmitted crc header checksum, Assignment Help, Ask Question on Derive the transmitted crc header checksum, Get Answer, Expert's Help, Derive the transmitted crc header checksum Discussions

Write discussion on Derive the transmitted crc header checksum
Your posts are moderated
Related Questions
Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm