Types of errors detection in crc , Computer Network Security

CRC can detect the following errors better than check sums.

a) Vertical errors

b) Burst errors

a) VERTICAL ERRORS:

 This kind of error happens due to a hardware failure. e.g. the second bit of each character will damage.

b) BURST ERRORS:

When a small set of bits modifies near a specific place due to electric or lighting motor starting nearby etc. then these kinds of errors are known as Burst errors.

 

 

Posted Date: 7/30/2012 5:55:47 AM | Location : United States







Related Discussions:- Types of errors detection in crc , Assignment Help, Ask Question on Types of errors detection in crc , Get Answer, Expert's Help, Types of errors detection in crc Discussions

Write discussion on Types of errors detection in crc
Your posts are moderated
Related Questions
how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Discuss how developers should apply the following countermeasures to improve the security of their code:

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared