Transmission errors in networking, Computer Network Security

TRANSMISSION ERRORS:

 Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of which the bits are deleted or the bit value may be modified.

 ERROR CORRECTION AND DETECTION:

 To correct and detect errors, frames add additional information, which is

checked by the receiver and inserted by the sender. In this way incorrect data may be

rejected. Also the incorrect data may be accepted and corrected.

PARITY CHECKING:

 To find the error there are different functions in which parity checking is also usually used. In parity checking, parity denotes to the number of bits set to 1 in the data item.

There are two kinds:

  • Even Parity
  • Odd Parity

 EVEN PARITY:

In an even parity the no. of 1's in packet would be an even number.

 ODD PARITY:

In an Odd parity the no. of  in packet bits would be an odd number.

 

Posted Date: 7/30/2012 5:43:14 AM | Location : United States







Related Discussions:- Transmission errors in networking, Assignment Help, Ask Question on Transmission errors in networking, Get Answer, Expert's Help, Transmission errors in networking Discussions

Write discussion on Transmission errors in networking
Your posts are moderated
Related Questions
QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po


STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n