Derive the transmitted crc header checksum, Computer Network Security

Assignment Help:

QUESTION

(a) Consider the following digital bit stream 01001100 is to be encoded in:

i. NRZ-I
ii. Pseudoternary
iii. Manchester
iv. Differential Manchester

Show the waveforms for each of the above-mentioned codes showing clearly the bit durations, signal levels and transitions where necessary.

(Assumptions: The signal level for NRZ-I for most recent preceding mark was positive; the signal level of the most recent preceding space was negative for Pseudoternary).

(b) A frame transmitter is using the generator polynomial x4 + x + 1 and that the header contains the above bit pattern: 10100110. Derive the transmitted CRC header checksum.

(c) Show how you could use a (11,7) block code to correct and detect a 1-bit error if say, the subsequent 1011000 bit pattern is received, while the original 1001000 bit pattern was transmitted.


Related Discussions:- Derive the transmitted crc header checksum

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Reason for multiple topologies, REASON FOR MULTIPLE TOPOLOGIES Every t...

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Access control devices-cryptography, ACCESS CONTROL DEVICES Successful a...

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Define packet, CONCEPT OF PACKET : Network systems splits data in small ...

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

Which authorization model could be ideal, Question: (a) Your office ad...

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Explain how the diffie-hellman key agreement protocol works, (a) Using Fer...

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Define checksum, The method used to check errors is checksum . In this m...

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd