Error detection-- crc, Computer Networking

Error Detection-- CRC

  • Powerful error detection system
  • Rather than addition, binary division is utilized
  • A series of redundant bits called "CRC" or else "CRC remainder" is appended to the data unit consequently that the resulting data unit becomes divisible by a predetermined binary number
  • At the receiver side the incoming data unit is divided by the similar predetermined number.
  • If there is no remainder entirely the data unit is accepted
  • If there is a remainder entirely the receiver indicates that the data unit has been damaged during transmission

1459_Error Detection-- CRC.png

Posted Date: 7/22/2013 1:51:22 AM | Location : United States







Related Discussions:- Error detection-- crc, Assignment Help, Ask Question on Error detection-- crc, Get Answer, Expert's Help, Error detection-- crc Discussions

Write discussion on Error detection-- crc
Your posts are moderated
Related Questions
What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also allowed. The other name for virtua

A Comparative Study between MPLS VPN and the Public Internet which has intro. operation of tecnology, analysis, discussion, recommendation, conclusion.

Q. Explain about Twisted-Pair Cable? - Two conductors surrounded by insulating material - One wire utilize to carry signals and other used as a ground reference - Twistin

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

Q. Explain File Transfer Protocol? - File Transfer Protocol (FTP) is a TCP/IP client-server application for copying files from one host to another -- Establishes two connect

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

Question: (a) Distinguish between UDP and TCP. (b) You have been asked to design and implement a chat application for a university. Which protocol could you used TCP or UDP

Introduction An algorithm is defined as a series of computational steps required to accomplish an exact task. The algorithm works for a given input and will terminate in a well

PRAM is one of the models used for designing the parallel algorithm as given in Figure. The PRAM models have the following components: A set of identical type of processors