Which steps are used at receiver end by check sum, Computer Networking

Assignment Help:

Q. Which steps are used at receiver end by check sum?

The receiver follows these steps:

  • The unit is divided into "k" sections each of "n" bits
  • All sections are added utilizing one's complement to get the sum.
  • The sum is complemented.
  • If the product is zero the data are accepted otherwise rejected

1371_Which steps are used at receiver end by check sum1.png

Check Sum-An Example


Related Discussions:- Which steps are used at receiver end by check sum

Advantages and disadvantages of public and private network, The disadvantag...

The disadvantages and advantages of Private and Public networks are shown in the table below:

What is a transaction server, What is a Transaction server? With a tran...

What is a Transaction server? With a transaction server, the client includes remote procedures that reside on the server with an SQL database engine. These remote processes on

Determine how many bits are used for the page number, 1.  A virtual memory ...

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

Define the types of computer network, Define the Types of Computer Network ...

Define the Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolita

Distributed enrollment protocol dep, Introduction: This is a specialized p...

Introduction: This is a specialized protocol designed for CS5244. It provides a distributed means to access a BasicEnrollmentManager implementation through client-server communica

Describe essential security services, Problem: (a) Application Layer pr...

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

Show example on hedge fund, Q. Show example on Hedge Fund? Hedge Fund ...

Q. Show example on Hedge Fund? Hedge Fund have been playing a no-lose game In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the

Error and flow control in dll, differntiate between error control and flow...

differntiate between error control and flow control in data link layer

Evaluate error detection in crc polynomials, Q. Evaluate Error Detection in...

Q. Evaluate Error Detection in CRC Polynomials? The divisor in the CRC generator is most habitually represented as an algebraic Polynomial. Reasons: It is short

What do you use the aux port for, The auxiliary port is used to link a mode...

The auxiliary port is used to link a modem to for dial backups.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd