Types of errors detection in crc , Computer Network Security

CRC can detect the following errors better than check sums.

a) Vertical errors

b) Burst errors

a) VERTICAL ERRORS:

 This kind of error happens due to a hardware failure. e.g. the second bit of each character will damage.

b) BURST ERRORS:

When a small set of bits modifies near a specific place due to electric or lighting motor starting nearby etc. then these kinds of errors are known as Burst errors.

 

 

Posted Date: 7/30/2012 5:55:47 AM | Location : United States







Related Discussions:- Types of errors detection in crc , Assignment Help, Ask Question on Types of errors detection in crc , Get Answer, Expert's Help, Types of errors detection in crc Discussions

Write discussion on Types of errors detection in crc
Your posts are moderated
Related Questions
ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,


QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

SDES encryption and decryption

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco