Transmission errors in networking, Computer Network Security

TRANSMISSION ERRORS:

 Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of which the bits are deleted or the bit value may be modified.

 ERROR CORRECTION AND DETECTION:

 To correct and detect errors, frames add additional information, which is

checked by the receiver and inserted by the sender. In this way incorrect data may be

rejected. Also the incorrect data may be accepted and corrected.

PARITY CHECKING:

 To find the error there are different functions in which parity checking is also usually used. In parity checking, parity denotes to the number of bits set to 1 in the data item.

There are two kinds:

  • Even Parity
  • Odd Parity

 EVEN PARITY:

In an even parity the no. of 1's in packet would be an even number.

 ODD PARITY:

In an Odd parity the no. of  in packet bits would be an odd number.

 

Posted Date: 7/30/2012 5:43:14 AM | Location : United States







Related Discussions:- Transmission errors in networking, Assignment Help, Ask Question on Transmission errors in networking, Get Answer, Expert's Help, Transmission errors in networking Discussions

Write discussion on Transmission errors in networking
Your posts are moderated
Related Questions
What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r


Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs