Transmission errors in networking, Computer Network Security

TRANSMISSION ERRORS:

 Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of which the bits are deleted or the bit value may be modified.

 ERROR CORRECTION AND DETECTION:

 To correct and detect errors, frames add additional information, which is

checked by the receiver and inserted by the sender. In this way incorrect data may be

rejected. Also the incorrect data may be accepted and corrected.

PARITY CHECKING:

 To find the error there are different functions in which parity checking is also usually used. In parity checking, parity denotes to the number of bits set to 1 in the data item.

There are two kinds:

  • Even Parity
  • Odd Parity

 EVEN PARITY:

In an even parity the no. of 1's in packet would be an even number.

 ODD PARITY:

In an Odd parity the no. of  in packet bits would be an odd number.

 

Posted Date: 7/30/2012 5:43:14 AM | Location : United States







Related Discussions:- Transmission errors in networking, Assignment Help, Ask Question on Transmission errors in networking, Get Answer, Expert's Help, Transmission errors in networking Discussions

Write discussion on Transmission errors in networking
Your posts are moderated
Related Questions
The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.