Show the error detection- check sum, Computer Networking

Error Detection- Check Sum

  • The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16)
  • These segments are added utilizing one's complement arithmetic in such a way that the total is also "n" bits long
  • Total is complemented as well as appended to the end of the original data unit as redundancy bits called the check sum field
Posted Date: 7/22/2013 1:53:53 AM | Location : United States

Related Discussions:- Show the error detection- check sum, Assignment Help, Ask Question on Show the error detection- check sum, Get Answer, Expert's Help, Show the error detection- check sum Discussions

Write discussion on Show the error detection- check sum
Your posts are moderated
Related Questions
Q. Summary of osi model? - There was no standard for networks in the early period and as a result it was difficult for networks to communicate with each other. - The ISO (In

Cell splitting  In practice, the distribution of traffic and topographic features is not uniform, and this shows opportunities of capacity enhance. Cells in areas of high usage

Q. Presentation layer of osi reference model? - The presentation layer makes sure that the information that the application layer of one system sends out is readable by the app

Error control in TCP-duplicate & out-of-order segment- Duplicate segment - The destination TCP merely discards the segment Out-of-order segment - Not acknowledged unt

Determine the functioning of Service Support Service Support must be considered a strong point for hardware, especially for servers and should be available readily. Many brande

Overview Create a prototype web site for the "Computer Superstores" company. Your site should use effective navigation features and demonstrate good structure for  accessibility

At the Physical layer of the OSI model Repeaters work by regenerating the signal to extend the distance it can travel.

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major