Assume a packet is made only of four 16-bit words (A7A2) 16 , (CABF) 16 , (903A)
Question:
Assume a packet is made only of four 16-bit words (A7A2)16, (CABF)16, (903A)16, and (A123)16. Manually simulate the algorithm in Figure 10.17 to find the checksum.
Figure 10.17
Transcribed Image Text:
Figure 10.17 Algorithm to calculate a traditional checksum Start Sum = 0 More words? Iyes] Sum = Sum + Next Word Ino] Left(sum) is nonzero? Įyes] Sum = Left(Sum) + Right(Sum) Notes: Ino] a. Word and Checksum are each Checksum = Complement (Sum) 16 bits, but Sum is 32 bits. b. Left(Sum) can be found by shifting Sum 16 bits to the right. c. Right(Sum) can be found by ANDing Sum with (0000FFFF. d. After Checksum is found, truncate Checksum = truncate (Checksum) 16 Stop it to 16 bits.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 50% (8 reviews)
The following shows the steps a We first add the numbers to get 0002A3BE 16 This corresponds ...View the full answer
Answered By
AJIN KURIAKOSE
I HAVE ELECTRONICS ENGINEERING DEGREE..AND MY AREA OF INTEREST IS MATHEMATICS,CONTROL SYSTEM,NETWORK,DIGITAL
4.70+
21+ Reviews
32+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
Consider the figure on the next page, which is similar to Figures 7.22-7.25. Answer the following questions: a. Assuming FIFO service, indicate the time at which packets 2 through 12 each leave the...
-
In the interleaving approach to FEC, assume each packet contains 10 samples from a sampled piece of music. Instead of loading the first packet with the first 10 samples, the second packet with the...
-
a. What does a firewall do when an arriving packet is definitely an attack packet? 24a.) When a firewall identifies an attack packet, it ________. a. Discards the packet b. Copies information about...
-
What is the output of the following statements? int a=2; float b=3.5; int c=a; printf("%d",c)
-
Jesse Brimhall is single. In 2016, his itemized deductions were $4,000 before considering any real property taxes he paid during the year. Jesse's adjusted gross income was $70,000 (also before...
-
The Edwards Lake Community Hospital balance sheet as of December 31, 2019, follows. Required a. Record in general journal form the effect of the following transactions during the fiscal year ended...
-
Define the Haar's wavelets function \(\psi(t)\) and verify that for every \(t\), \[si(t)= \begin{cases}1, & 0 \leq t
-
A study dealing with health care issues plans to take a sample survey of 1500 Americans to estimate the proportion who have health insurance and the mean dollar amount that Americans spent on health...
-
Selling expenses Direct labor Interest expense Manufacturing overhead, actual Raw materials used Administrative expenses $ 159,200 304,000 40,900 112,240 484,000 115,100 During the month, 18,600...
-
Music-Is-Us, Inc., is a supplier of musical instruments for professional and amateur musicians. The companys accountants make adjusting entries monthly, and they make all closing entries annually....
-
Traditional checksum calculation needs to be done in ones complement arithmetic. Computers and calculators today are designed to do calculations in twos complement arithmetic. One way to calculate...
-
Manually simulate the Fletcher algorithm (Figure 10.18) to calculate the checksum of the following bytes: (2B) 16 , (3F) 16 , (6A) 16 , and (AF) 16 . Also show that the result is a weighted checksum....
-
A U-tube manometer filled with water, density 1000 kg/m3 shows a height difference of 25 cm. What is the gauge pressure? If the right branch is tilted to make an angle of 30with the...
-
Outline different applications of digital marketing which can help meet business goals.
-
Give an example of how each of the macro-environment forces may directly drive the content and services provided by a website.
-
What are the market and product positioning opportunities offered by the Internet?
-
The relationship between intermediaries, suppliers and resellers are crucial to every business. Discuss how the Internet potentially changes supply-chain relationships?
-
How should a marketing manager benchmark the online performance of competitors?
-
A probability distribution can be written in formula notation such as P(X) = 1/X, where X = 2, 3, 6. The distribution is shown as follows: P(X) = X/6 for X = 1, 2, 3 3 P(X) 61-16
-
What mass of H2 will be produced when 122 g of Zn are reacted? Zn(s) + 2HCl(aq) ( ZnCl2(aq) + H2(g)
-
Suppose you have a stack S containing n elements and a queue Q that is initially empty. Describe how you can use Q to scan S to see if it contains a certain element x, with the additional constraint...
-
Alice has three array-based stacks, A, B, and C, such that A has capacity 100, B has capacity 5, and C has capacity 3. Initially, A is full, and B and C are empty. Unfortunately, the person who...
-
Suppose you have three nonempty stacks R, S, and T. Describe a sequence of operations that results in S storing all elements originally in T below all of Ss original elements, with both sets of those...
-
Explain how the OS and Utility programs work with application software. Summarize the features of several embedded operating systems course: introduction to information technology code: EBI...
-
Please explain and describe what are input and output devices. Explain what the differences are between an operating system, an embedded operating system, and a network operating system. Explain and...
-
Determine the complexity of the following pseudocode snippets in Big-O and Big-Q2. Do these code snippets have a Big-e? What are the functions doing? 1) my_func(some_nums) result = 0 for (num in...
Study smarter with the SolutionInn App