Manually simulate the Fletcher algorithm (Figure 10.18) to calculate the checksum of the following bytes: (2B) 16
Question:
Manually simulate the Fletcher algorithm (Figure 10.18) to calculate the checksum of the following bytes: (2B)16, (3F)16, (6A)16, and (AF)16. Also show that the result is a weighted checksum.
Figure 10.18
Transcribed Image Text:
Figure 10.18 Algorithm to calculate an 8-bit Fletcher checksum Notes Start L:Left 8-bit checksum R: Right 8-bit checksum D;: Next 8-bit data item R=L=0 More data? Iyes] L= (L+ R) mod 256 R= (R + D;) mod 256 Ino] 16-bit L checksum Checksum = Lx 256 +R R Stop
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 66% (9 reviews)
a We calculate R and L values in each iteration of the loop and th...View the full answer
Answered By
Sidharth Jain
My name is Sidharth. I completed engineering from National Institute of Technology Durgapur which is one of the top college in India. I am currently working as an Maths Faculty in one of the biggest IITJEE institute in India. Due to my passion in teaching and Maths, I came to this field. I've been teaching for almost 3 years.
Apart from it I also worked as an Expert Answerer on Chegg.com. I have many clients from USA to whom I teach online and help them in their assignments. I worked on many online classes on mymathlab and webassign. I guarantee for grade 'A'.
4.90+
3+ Reviews
10+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
Show how the Fletcher algorithm (Figure 10.18) attaches weights to the data items when calculating the checksum. Figure 10.18 Notes Start L: Left 8-bit checksum R: Right 8-bit checksum R=L= 0 D;:...
-
Manually simulate the Adler algorithm (Figure 10.19) to calculate the checksum of the following words: (FBFF) 16 and (EFAA) 16 . Also show that the result is a weighted checksum. Figure 10.19 Start...
-
Assume a packet is made only of four 16-bit words (A7A2) 16 , (CABF) 16 , (903A) 16 , and (A123) 16 . Manually simulate the algorithm in Figure 10.17 to find the checksum. Figure 10.17 Figure 10.17...
-
Consider the market for milk. Draw a supply curve and a demand curve (is the demand curve elastic on inelastic). Label the equilibrium price and quantity. Suppose that the production of milk causes...
-
Javier and Anita Sanchez purchased a home on January 1, 2016 for, $500,000 by paying $200,000 down and borrowing the remaining $300,000 with a 7 percent loan secured by the home. The loan requires...
-
The following is the pre-closing trial balance for Christina Rehabilitation Hospital as of September 30, 2020. Required a. Prepare a statement of operations and a statement of changes in net assets...
-
Consider the vector \(u\) that consists of 32 equally spaced samples of the function \(f(t) \approx \cos (4 \pi t)\) on the interval [0,1]. That is, \(u_{1}=f(0), u_{2}=\) \(f\left(\frac{1}{32}...
-
Draft the standard form of audit report commonly issued after a satisfactory audit of a nonpublic clients financial statements.
-
A light car is purchased on January 1 at a cost of $25,900. It is expected to serve for eight years and have a salvage value of $3,000. It is expected to be used for 96,000 miles over its eight-year...
-
TipTop Flight School offers flying lessons at a small municipal airport. The school's owner and manager has been attempting to evaluate performance and control costs using a variance report that...
-
Traditional checksum calculation needs to be done in ones complement arithmetic. Computers and calculators today are designed to do calculations in twos complement arithmetic. One way to calculate...
-
In the interleaving approach to FEC, assume each packet contains 10 samples from a sampled piece of music. Instead of loading the first packet with the first 10 samples, the second packet with the...
-
What is the first step HR managers should take when developing employee safety and security programs? a. Program evaluation b. Program implementation c. Recognition of a safety threat d. Program...
-
What are the main changes to channel structures that are facilitated through the Internet?
-
Trading online increasingly involves developing multichannel strategies. Give three examples of potential channel conflicts that might arise from using the Internet. Illustrate your answer with...
-
Setting long-term strategic objectives for a website is unrealistic since the rate of change in the marketplace is so rapid. Discuss.
-
Summarise how each of the micro-environment factors may directly drive the content and services provided by a website.
-
What is the purpose of a digital marketing audit? What should it involve?
-
A probability distribution can be written in formula notation such as P(X) = 1/X, where X = 2, 3, 6. The distribution is shown as follows: P(X) = X for X = 0.2, 0.3, 0.5 3 P(X) 61-16
-
Complete the equations for the following equilibria and calculate Keq where the Keq expression includes [HO]. Be sure to enter Keq in proper scientific notation. (a) ammonia (acting as a base) reacts...
-
Show how to use the transfer method, described in Exercise R-6.4, and two temporary stacks, to replace the contents of a given stack S with those same elements, but in reversed order.
-
Suppose Alice has picked three distinct integers and placed them into a stack S in random order. Write a short, straightline piece of pseudocode (with no loops or recursion) that uses only one...
-
Augment the ArrayQueue implementation with a new rotate( ) method having semantics identical to the combination, enqueue(dequeue( )). But, your implementation should be more efficient than making two...
-
Many American car manufacturers are located in the Southeast. Due to hurricane season, the Southeast has gotten a significant amount of rain, causing vast flooding. How is the supply of cars impacted?
-
Suppose that the cost in dollars for a weekly production of x tons of sugar is given by the following function (a) Find the marginal cost. 1 C(x) = x+3x+200. (b) Find the cost and marginal cost when...
-
16. An IEEE standard 32-bit floating point number is N = -15 x 2E-127 x 1.F, where S is the sign bit, F is the fractional mantissa, and E the biased exponent. a. Convert the decimal number 123.5 into...
Study smarter with the SolutionInn App