Types of errors detection in crc , Computer Network Security

CRC can detect the following errors better than check sums.

a) Vertical errors

b) Burst errors

a) VERTICAL ERRORS:

 This kind of error happens due to a hardware failure. e.g. the second bit of each character will damage.

b) BURST ERRORS:

When a small set of bits modifies near a specific place due to electric or lighting motor starting nearby etc. then these kinds of errors are known as Burst errors.

 

 

Posted Date: 7/30/2012 5:55:47 AM | Location : United States







Related Discussions:- Types of errors detection in crc , Assignment Help, Ask Question on Types of errors detection in crc , Get Answer, Expert's Help, Types of errors detection in crc Discussions

Write discussion on Types of errors detection in crc
Your posts are moderated
Related Questions
FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Ask question #Minimum 100 words acceptwwwed#

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

I need a help on how to write good assignment on the above topic

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t