1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
8

A 1024-bit message is sent that contains 992 data bits and 32 CRC bits. CRC is computed using the IEEE 802 standardized, 32-degr

ee CRC polynomial. For each of the following, explain whether the errors during message transmission will be detected by the receiver: (a) There was a single-bit error. (b) There were two isolated bit errors. (c) There were 18 isolated bit errors. (d) There were 47 isolated bit errors. (e) There was a 24-bit long burst error. (f) There was a 35-bit long burst error.
Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
4 0

Answer:

a) Yes

b) Yes

c) Yes

d) No

e) Yes

f) No

Explanation:

a) All single-bit errors  are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.

b) All double-bit errors for any reasonably long message  are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

c) 5 isolated bit errors  are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.

It produces nearly 100 % of error detection.

d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.

f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.

Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.

You might be interested in
Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sendin
Pani-rosa [81]

Answer:

The answer is B. Digital subscriber line technology

Explanation:

Digital subscriber line or DSL technology is used to transmit digital data over telephone wires.

It makes file sharing possible which includes multimedia data (i.e. transfer of pictures and graphics), and also video and audio conferencing.

DSL uses a reliable medium that prevents packet loss and interruptions. It is also fast.

6 0
3 years ago
Provides information of the active slide at the bottom of the slide
denis-greek [22]

I believe the answer is: Status bar

4 0
3 years ago
How can I find all the answers for the NWEA MAP Math, English, Reading, and Science tests? Please help!!!!! I found some answers
Gala2k [10]

Answer:

if its a test try to just do it on your own ,you got nothing to lose from a test, its just to understand what you know on the concepts, but if you would still like answers just search around the net or here and you can always post the questions to ask people for help someone would eventually answer your questions but then beware of bots that post links as answer!

Explanation:

6 0
3 years ago
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites
joja [24]

Answer:

Phishing I believe

4 0
2 years ago
Other questions:
  • Describe Network in terms of the classroom computer lab
    14·1 answer
  • For each of these statements find a domain for which the statement is true and a domain for which the statement is false. a) Eve
    13·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • Given two variables, is Empty of type boolean, indicating whether a class roster is empty or not, and number Of Credits of type
    10·1 answer
  • Which of the following is NOT one of the four steps preparing for sales forecast ?
    10·1 answer
  • 9.A major step before taking print of the document is (3 points)
    14·1 answer
  • Which term describes a visual object such as a picture a table or text box
    15·2 answers
  • Consider the following method, remDups, which is intended to remove duplicate consecutive elements from nums, an ArrayList of in
    7·1 answer
  • ________ has the ability to drag windows to the edges or corners of your screen and have them snap into place.
    12·1 answer
  • In NumPy, the_______
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!