1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
8

A 1024-bit message is sent that contains 992 data bits and 32 CRC bits. CRC is computed using the IEEE 802 standardized, 32-degr

ee CRC polynomial. For each of the following, explain whether the errors during message transmission will be detected by the receiver: (a) There was a single-bit error. (b) There were two isolated bit errors. (c) There were 18 isolated bit errors. (d) There were 47 isolated bit errors. (e) There was a 24-bit long burst error. (f) There was a 35-bit long burst error.
Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
4 0

Answer:

a) Yes

b) Yes

c) Yes

d) No

e) Yes

f) No

Explanation:

a) All single-bit errors  are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.

b) All double-bit errors for any reasonably long message  are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

c) 5 isolated bit errors  are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.

It produces nearly 100 % of error detection.

d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.

Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.

You might be interested in
Mille gets a text from her friend asking if she wants to come over. It seems like a bit of a hassle to go to her friend's house,
Licemer1 [7]

Answer:

OC. It will be a more positive experience if she spends time with her friend in person.

Explanation:

You should always spend time with people in person rather than online whenever you get the chance.

8 0
2 years ago
How do you hack a iPhone, Like If you forgot your password and want to get back in your phone. What do you do?
s344n2d4d5 [400]

Answer:

fix it on itunes

Explanation:

or get a new one

6 0
3 years ago
Read 2 more answers
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
storchak [24]

Answer:C

Explanation:

The answer is C

6 0
2 years ago
Match the following: B. Static libraries A. Dynamic Link Libraries (DLL) - Using static libraries - Making some changes to DLL A
TiliK225 [7]

Answer:  hello your question is poorly written and I have been able to properly arrange them with the correct matching

answer

Static libraries :  C

Dynamic link libraries:  A

Using static libraries:  B

Making some changes to DLL:   D

Explanation:

Matching each term with its meaning

<u>Static Libraries </u> : Are attached to the application at the compile time using the Linker ( C )

<u>Dynamic link libraries</u> ( DLL ) : Is Loaded at runtime as applications need them ( A )

<u>Using static Libraries </u>: Makes your program files larger compared to using DLL ( B )

<u>Making some changes to DLL </u>: Does not require application using them to recompile ( D )

8 0
3 years ago
Sets of rules that a computer uses to solve problems?
jonny [76]

Protocal

I need to make this 20 charaters so ye

8 0
3 years ago
Read 2 more answers
Other questions:
  • The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?
    14·1 answer
  • The exercise instructions here are LONG -- please read them all carefully. If you see an internal scrollbar to the right of thes
    8·1 answer
  • Hot five was the famous band of which musician?
    14·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Which of the following statements is true of intrapreneurs
    15·1 answer
  • i will be doing an interview to someone so plz comment down below something random and you will automatically enter
    11·1 answer
  • Based upon what you know
    5·1 answer
  • What is data? and types ??
    9·2 answers
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • The cathode ray tube eventually was eventually used for what entertainment device?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!