Types of errors detection in crc , Computer Network Security

CRC can detect the following errors better than check sums.

a) Vertical errors

b) Burst errors

a) VERTICAL ERRORS:

 This kind of error happens due to a hardware failure. e.g. the second bit of each character will damage.

b) BURST ERRORS:

When a small set of bits modifies near a specific place due to electric or lighting motor starting nearby etc. then these kinds of errors are known as Burst errors.

 

 

Posted Date: 7/30/2012 5:55:47 AM | Location : United States







Related Discussions:- Types of errors detection in crc , Assignment Help, Ask Question on Types of errors detection in crc , Get Answer, Expert's Help, Types of errors detection in crc Discussions

Write discussion on Types of errors detection in crc
Your posts are moderated
Related Questions
Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Discuss the risks of having a single root user

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

What is the concept of topology?

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon