UDP and TCP use 1’s complement for their checksums to detect errors. Suppose you have the following 8-bit bytes: 11011001, 01010010, 11001010, 10100100 and 01011001. A. What is the 1’s complement of the sum of these 8-bit bytes? Show all the details of your work. B. Why do UDP and TCP take the 1’s complement of the sum as their checksum? That is, what do UDP and TCP not simply use the sum of these bytes as checksum? C. With the 1’s complement scheme, how does the receiver detect errors? D. With this checksum scheme, is it possible that any l-bit error will go undetected? How about a two-bit error? Explain your answer.
UDP and TCP use 1’s complement for their checksums to detect errors. Suppose you have the following 8-bit bytes: 11011001, 01010010, 11001010, 10100100 and 01011001. A. What is the 1’s complement of the sum of these 8-bit bytes? Show all the details of your work. B. Why do UDP and TCP take the 1’s complement of the sum as their checksum? That is, what do UDP and TCP not simply use the sum of these bytes as checksum? C. With the 1’s complement scheme, how does the receiver detect errors? D. With this checksum scheme, is it possible that any l-bit error will go undetected? How about a two-bit error? Explain your answer.
Chapter9: Computer Networks
Section: Chapter Questions
Problem 10VE
Related questions
Question
UDP and TCP use 1’s complement for their checksums to detect errors. Suppose you have
the following 8-bit bytes: 11011001, 01010010, 11001010, 10100100 and 01011001.
A. What is the 1’s complement of the sum of these 8-bit bytes? Show all the details of your work.
B. Why do UDP and TCP take the 1’s complement of the sum as their checksum? That is, what do
UDP and TCP not simply use the sum of these bytes as checksum?
C. With the 1’s complement scheme, how does the receiver detect errors?
D. With this checksum scheme, is it possible that any l-bit error will go undetected? How about a
two-bit error? Explain your answer.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Step 1: A. What is the 1’s complement of the sum of these 8-bit bytes? Show all the details of your work.
VIEWStep 2: B. Why do UDP and TCP take the 1’s complement of the sum as their checksum? what do UDP and TCP
VIEWStep 3: C. With the 1’s complement scheme, how does the receiver detect errors?
VIEWStep 4: D. With this checksum scheme, is it possible that any l-bit error will go undetected? How about
VIEWSolution
VIEWTrending now
This is a popular solution!
Step by step
Solved in 5 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning