### Determine ones complement of sum eight-bit bytes

Assignment Help Basic Computer Science
##### Reference no: EM1381479

UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes? UDP and TCP utilize 16-bit words in calculating checksum, for this problem you are being asked to consider 8-bit sums. Illustrate all work. Describe why is it that UDP takes the 1s complement of the sum; that is.

Why not just use sum? With 1s complement schema, how does receiver detect errors? Is it possible that 1-bit error will go undetected? How about 2-bit error?

Describe and illustrate all addition of the three binary 8 bit bytes along with the carry over of ones in the addition of the problem.

#### Questions Cloud

 What is the optimal production quantity for the card : Wholemark is an Internet order business that sells one popular New Year greeting card once a year. The cost of the paper on which the card is printed is \$0.95 per card Feminization of poverty : What is feminization of poverty? What factors are responsible for keeping women uneducated and poor in the USA, and around the world? Is it plain old male tyranny? Suppose the production manager is asked to reduce : Suppose the production manager is asked to reduce the safety stock of this item by 45 percent. If she does so, what will the new service probability be Create a diagram for a hydrocarbon with 5 carbons : Create a diagram for a hydrocarbon with 5 carbons with a double bond between carbons 2 and 3 and structural isomer with the same number of carbons and hydrogens. Determine ones complement of sum eight-bit bytes : UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes? Monopoly optmum : How does the charging the monoply a specific tax per unit affect the monopoly optmum Political ideologies in the united states : Identify the four most common political ideologies in the United States. Describe the basic beliefs of two of the ideologies, and what sort of policies would subscribers of these two ideologies support and oppose? Drawing on hall''s high and low context : Drawing on hall's high and low context, describe some of the communication issues that might well arise when an arab company officer who hasvspent his career in the middle east is sent on temporary assignment Creating a simple family tree : In a separate piece of paper, make a simple family tree for a couple showing children, and lineages from two children showing grand children, great grandchildren, great great grandchildren, and great great great grandchildren.

### Write a Review

#### Explain specific challenges of facing designer

Explain specific challenges of facing the designer, specifically with regard to limitations of hardware, software and interface design two paragraph each.

#### Explaining parse tree n-m nodes

W has derivation of m steps, show that w has a parse tree n+m nodes.

#### Describing how prolog executes command

Describe how Prolog executes command (query) and goal matching process.

#### Place two three d points a and b in two different locations

Place the two 3d points A and B in two different locations in a simple stereo diagram which demonstrates these two possibilities. Draw a different picture for each situation.

#### Monthly reporting form for checking account customers

As part of a larger system project. Clone Bank of Clone, Colorado, desires your help in setting up a new monthly reporting form for its checking account customers.

#### Computing cycles to save if registers are available

Determine the number of cycles will be saved if both registers are available?

#### Methods for information systems can become vulnerable

While word weakness seems to define it pretty well, there are a number of mthods that information systems can become vulnerable.

#### Secure operations in globally interconnected commercial

Has its creation increased or decreased the need for organizations to maintain secure operation of their systems? Why?

#### Support day-to-day working activities of organization

____are used to support day-to-day working activities of organization. Typical decisions involve e-commerce transaction acceptance, approval of personal loans by bank.

#### What type of hardware is needed to support t-1 connection

What kind of hardware is needed to support a T-1 connection to your business? You want to write a song and apply a digital signature to it, so that you can later prove that it is your song.

#### Find out amount of access that new user needs

As a security manager for XYZ Corporation, you are asked to find out amount of access that new user needs. You contact user and ask them to help you understand what kind of access they need.

#### Computing requirements for dozen handbags

Leather-goods factory manufactures ?ve styles of handbags, whose variable contributions are \$30, \$40, \$45, \$25, and \$60 per dozen, respectively.

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!