Complement in tcp and udp connections

Assignment Help Basic Computer Science
Reference no: EM13829769

Problem:

UDP and TCP use the 1s complement for their check sums. Suppose you have the following three 8-bit bytes: 10011001, 01010010, and 01011001.

a. What is the 1s complement of the sum of these 8-bit bytes? Show all your work.

b. Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum?

c. With the 1s complement scheme, how does the receiver detect errors?

d. Is it possible that a l-bit error will go undetected? How about a two-bit error? (Note that although UDP and TCP use 16-bit words to compute the checksum, for this problem you are being asked to consider 8-bit summands.)

Additional Information:

This question is from Computer Science, particularly to Networking as well as it is about 8-bit bytes complement in TCP and UDP. The difference in complement of sums has been given in solution.

Reference no: EM13829769

Questions Cloud

Fsm packet sending and receiving protocols : Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.
Compute the projects annual net cash flows : The Taylor Mountain Uranium Company currently has annual cash revenues of $1.2 million and annual cash expenses of $700,000. Depreciation amounts to $200,000 per year. These figures are expected to remain constant for the foreseeable future (at least..
Book review of bravo for the marshallese : Book Review of Bravo for the Marshallese
Example related to the issue of reporting human capital : Discuss an example related to the issue of reporting human capital in finance statement. offering examples of human capital being measured in the organization.
Complement in tcp and udp connections : UDP and TCP use the 1s complement for their check sums. Suppose you have the following three 8-bit bytes: 10011001, 01010010, and 01011001.
Explore the connection between agriculture and civilizations : The question is from Sociology and it is explores about the connection between agriculture and the first civilizations. The influence of agriculture in shaping early human societies around the world have been discussed
Represent source of competitive advantage in global market : Which of the following does not represent a source of competitive advantage in global marketing?
What is three-way handshake : What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.
Essay about chosing narendra modi as the prime ministerial : Essay about Chosing Narendra Modi as the Prime Ministerial

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop a raptor flowchart to compute the solution

Develop a Raptor flowchart to compute the solution of the equation

  Lfsr produces a sequence with a period of length

An n-stage LFSR produces a sequence with a period of length at most 2n - 1, but the register has n bits and thus may assume 2n values. Why can the length of the period never be 2n? Which register value is excluded from the cycle, and why?

  Dns is a commonly used service in the internet

1> DNS is a commonly used service in the Internet. Explain the roles of the local name servers, the authoritative name servers, and the root name servers.

  Develop an effective research plan considering context

Develop an effective research plan considering context, research questions, sources, timeline, and larger implications for writing a formal research report

  Construct and describe a tree

Construct and describe a tree that indicates the following: A college president has 2 employees who answer directly to him or her, namely a vice president and provost. The vice president and provost each have an administrative assistant.

  Describing security management mechanisms

When describing Security Management mechanisms, focus and solutions are usually divided into three main categories:

  Create a behavioral state machine for complex classes

Create a behavioral state machine for each of the complex classes in the class diagram. Perform a CRUD analysis to show the interactivity of the objects in the system.

  Differences and similarities between windows 7and windows 8.

Complete steps that cover the differences and similarities between Windows 7and Windows 8.1. In your APA formatted Paper answer the questions below.1. Discuss three differences and three similarities in the configuration of a Windows 7 for a h..

  Analyse the ethical dilemma

Analyse the ethical dilemma using the Australian Computer Society Code of Professional Conduct, The word limit is 800 words ± 10%. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do.

  Flowchart that display the students average scores

Flowchart that display the students average scores for 3 quizzes - Display an appropriate error message and ask the user to re enter a value of 3 quizzes.

  List the number (count) of unreserved room

List the guests by guest number, last name, first name and the number of times each guest has stayed in one of our hotels (include all reservations, past, current and future). Arrange the list in order from most-frequent stayer (greatest number of st..

  A network application for accessing a dial-up database

Wworking for a company that has a network application for accessing a dial-up database of corporate profiles. From your computer workstation, a request for a profile travels over corporate local area network to a modem. The modem, using a conventiona..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd