Transmission errors in networking, Computer Network Security

TRANSMISSION ERRORS:

 Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of which the bits are deleted or the bit value may be modified.

 ERROR CORRECTION AND DETECTION:

 To correct and detect errors, frames add additional information, which is

checked by the receiver and inserted by the sender. In this way incorrect data may be

rejected. Also the incorrect data may be accepted and corrected.

PARITY CHECKING:

 To find the error there are different functions in which parity checking is also usually used. In parity checking, parity denotes to the number of bits set to 1 in the data item.

There are two kinds:

  • Even Parity
  • Odd Parity

 EVEN PARITY:

In an even parity the no. of 1's in packet would be an even number.

 ODD PARITY:

In an Odd parity the no. of  in packet bits would be an odd number.

 

Posted Date: 7/30/2012 5:43:14 AM | Location : United States







Related Discussions:- Transmission errors in networking, Assignment Help, Ask Question on Transmission errors in networking, Get Answer, Expert's Help, Transmission errors in networking Discussions

Write discussion on Transmission errors in networking
Your posts are moderated
Related Questions
A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico


Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa


Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis