Determine ones complement of sum eight-bit bytes

Assignment Help Basic Computer Science
Reference no: EM1381479

UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes? UDP and TCP utilize 16-bit words in calculating checksum, for this problem you are being asked to consider 8-bit sums. Illustrate all work. Describe why is it that UDP takes the 1s complement of the sum; that is.

Why not just use sum? With 1s complement schema, how does receiver detect errors? Is it possible that 1-bit error will go undetected? How about 2-bit error?

Describe and illustrate all addition of the three binary 8 bit bytes along with the carry over of ones in the addition of the problem.

Reference no: EM1381479

Questions Cloud

What is the optimal production quantity for the card : Wholemark is an Internet order business that sells one popular New Year greeting card once a year. The cost of the paper on which the card is printed is $0.95 per card
Feminization of poverty : What is feminization of poverty? What factors are responsible for keeping women uneducated and poor in the USA, and around the world? Is it plain old male tyranny?
Suppose the production manager is asked to reduce : Suppose the production manager is asked to reduce the safety stock of this item by 45 percent. If she does so, what will the new service probability be
Create a diagram for a hydrocarbon with 5 carbons : Create a diagram for a hydrocarbon with 5 carbons with a double bond between carbons 2 and 3 and structural isomer with the same number of carbons and hydrogens.
Determine ones complement of sum eight-bit bytes : UDP and TCP use 1s complement for checksums. Assume you have the following 3 8-bit bytes: 01010101, 01110000, 01001100. Determine the 1s complement of sum of these 8-bit bytes?
Monopoly optmum : How does the charging the monoply a specific tax per unit affect the monopoly optmum
Political ideologies in the united states : Identify the four most common political ideologies in the United States. Describe the basic beliefs of two of the ideologies, and what sort of policies would subscribers of these two ideologies support and oppose?
Drawing on hall''s high and low context : Drawing on hall's high and low context, describe some of the communication issues that might well arise when an arab company officer who hasvspent his career in the middle east is sent on temporary assignment
Creating a simple family tree : In a separate piece of paper, make a simple family tree for a couple showing children, and lineages from two children showing grand children, great grandchildren, great great grandchildren, and great great great grandchildren.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Training data from gaussian distribution of variance

Suppose we have training data from a Gaussian distribution of known covariance S but unknown mean Mu.

  Compare activity of disk required for each of the relational

Compare the activity (quite theoretical) of the disk (in number of bytes) required for each of both relational. Indicate the advantages and the inconveniences of the new relational scheme.

  Determine maximum size of register file in instruction-set

You are designing simple 32-bit instruction-set architecture which requires to support 45 opcodes, three source operands and one destination operand. Determine the maximum size of register file that this architecture can use?

  Create incident response policy covers development-response

Policy to reduce network down-time if future incidents happen. Create incident response policy which covers development of incident response team, disaster recovery process and business continuity planning.

  Explaining visible and consistent management support

Illustrate visible and consistent management support. Establish privacy responsibilities. Privacy needs need to be incorporated into any position which handles personally identifiable information (PII).

  Solving problem by permutation on set is a one-to-one

Prove that PERM=POWER P, the obvious algorithm doesn't run in polynomial time as problem size is logarithmic (and no linear) with respect to the value of t.

  State whether each reference is hit or a miss

Assume a cache has 16 1-word blocks and is initially empty. Placement is by direct mapping. Also, state whether each reference is a hit or a miss.

  Example of weighted directed grap with weight function

Provide an example of weighted directed graph G = (V, E) with weight function ω:E→R and source vertex s such that G satisfies following property.

  Enforcing mandatory access control environment

Users dont seem to understand that they need to handle certain documents with more care and control than others. Which of the following will improve this situation?

  Verify local police department-s findings on firm-s case

Tension over case is running high in city. What do you require to ask police investigator for, and what procedures must you follow?

  Determining contents of memory of specified address

Find the contents of memory from address 0x1800 up to, but not including, 0x1809, after this code is executed.

  Find default amount of time that entry remains in arp cache

Determine the default amount of time that the entry remains in ARP cache before being removed. You can find this empirically (by monitoring the cache contents).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd