Transmission errors in networking, Computer Network Security

TRANSMISSION ERRORS:

 Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of which the bits are deleted or the bit value may be modified.

 ERROR CORRECTION AND DETECTION:

 To correct and detect errors, frames add additional information, which is

checked by the receiver and inserted by the sender. In this way incorrect data may be

rejected. Also the incorrect data may be accepted and corrected.

PARITY CHECKING:

 To find the error there are different functions in which parity checking is also usually used. In parity checking, parity denotes to the number of bits set to 1 in the data item.

There are two kinds:

  • Even Parity
  • Odd Parity

 EVEN PARITY:

In an even parity the no. of 1's in packet would be an even number.

 ODD PARITY:

In an Odd parity the no. of  in packet bits would be an odd number.

 

Posted Date: 7/30/2012 5:43:14 AM | Location : United States







Related Discussions:- Transmission errors in networking, Assignment Help, Ask Question on Transmission errors in networking, Get Answer, Expert's Help, Transmission errors in networking Discussions

Write discussion on Transmission errors in networking
Your posts are moderated
Related Questions
Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co