Question

In: Computer Science

sender needs to send the four data items: 0x3456, 0xABCC,0x02BC, and 0xEEEE. 1. What is the...

sender needs to send the four data items: 0x3456, 0xABCC,0x02BC, and 0xEEEE.


1. What is the checksum at the sender site, receiversite (if there is no error)?


2. What is the checksum at the receiver site if thesecond data item is changed to 0xABCE?


3. What is the checksum at the receiver site if thesecond data item is changed to 0xABCEand            the third data item is changed to 0x02BA?


I don't understand how to formulate the items to get achecksum at the sender or receiver site?


Solutions

Expert Solution


Related Solutions

A sender needs to send the five datawords 0xAABE3, 0xF6DD1, 0x3D1CF, 0x3CFF0, and the last 5...
A sender needs to send the five datawords 0xAABE3, 0xF6DD1, 0x3D1CF, 0x3CFF0, and the last 5 digits of your student ID (put them as is no need to convert them to hexadecimal). Answer the following: 3.1) Find the checksum at the sender site. 3.2) Find the checksum at the receiver site if there is no error. 3.3) Find the checksum at the receiver site if the first dataword is changed to 0x1245A. Last digits of ID : 70664
A sender needs to send the five datawords 0xBD74, 0xC56D, 0xFD1F, 0xF3CF, and the last 4...
A sender needs to send the five datawords 0xBD74, 0xC56D, 0xFD1F, 0xF3CF, and the last 4 digits of your student ID(984) (put them as is no need top convert them to hexadecimal). Answer the following: 3.1) Find the checksum at the sender site. 3.2) Find the checksum at the receiver site if there is no error. 3.3) Find the checksum at the receiver site if the third dataword is changed to 0xF003
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
this is data structures with C++ language, please do "#1 & a" separately and please send...
this is data structures with C++ language, please do "#1 & a" separately and please send me copyable file 1. Write a program that allows the user to enter the last names of the candidates in a local election and the votes received by each candidate. The program should then output each candidate's name, votes received by that candidate, and the percentage of the total votes received by the candidate. Assume a user enters a candidate's name only once and...
1) A company that wants to send data over the Internet will use an encryption program...
1) A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
When encrypting data, we must ensure that both the sender and the receiver are in possession...
When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total) i. Name each type and briefly explain how they are different? ii. Name one popular algorithm used for each type of encryption. iii. A user would like to send a long,...
A sender wants to transmit 16 frames in data link layer to a receiver, and every...
A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if A) Go-back-3 flow control is used? B) Selective repeat is used? C) Stop-and-wait is used?
To authenticate MS, the MSC needs to send SRES to MS for verification. (True or False)...
To authenticate MS, the MSC needs to send SRES to MS for verification. (True or False) When HLR crashes for some reason, GSM allows VLR to be the fall back so MS can still be authenticated.(True or False) GSM allows important authentication where mobile equipment verifies the validity of network to avoid phishing attacks.(True or False)
If two applications use TCP to send data but only send 10 bytes per segment (e.g....
If two applications use TCP to send data but only send 10 bytes per segment (e.g. by using the push operation), what is the maximum percent of the network bandwidth they will have for their data?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT