Explore BrainMass

Error Detection & Correction

Error control, through detection and correction is what allows us to have a reliable delivery of digital data regardless of the quality of the communication channel. Noise, system bugs and other failures can threaten the integrity of information exchange in its journey from source to destination receiver, but computer scientists have developed rigorous methods of correcting these faults and checking that the digital signal arrives as intended. 

Example of artifact error in natural sciences which can affect signals

The first component of error control is the detection of faults in transmission. The algorithms for error detection center around verifying that check bits added to the end of meaningful data are logically consistent with what is expected. These bits are redundant in that they are not necessary for the content of the message, but they are essential to error detection because any unexpected change in them signals a compromised integrity in the signal. The correction component then has to do with seeing which of the bits changed and performing simple operations based on elimination reasoning to reinstate the original, error-free state of the signal.

These algorithms can by either systematic or non-systematic. In the former instance, the check bits attached are derived from the data by some deterministic algorithm. Using these, errors are corrected via either ARQ (automatic repeat request) which is simply noting that there is an issue and requesting that the signal be sent again, or FEC (forward error correction) where allowances are made for less critical errors on the receiving end. The two approaches may also be combined in the case of minor errors so that they can be straightened out without the need to resend all the data, while major errors are dealt with in that way. This combination is known as automatic repeat-request.

Risk Assessment Scope, Areas Of Assessment, Methodology

You have been hired as a security consultant to secure the network of a Fortune 500 company. 1. Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment.. 2. Select risk assessment methodology and give your rationale behind the one you chose.

Intrusion with DNS Messages

Suppose that an intruder could both insert and remove DNS messages into the network. Give three scenarios showing the problems that such an intruder could cause.

TCP Reliability

If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Discuss why or why not.

Networks: Transport Layer

UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01010100, 01110100. What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Sh

Coding of Binary Information and Error Detection (III)

Coding of Binary Information and Error Detection (III) Consider the (m,3m) encoding function e: B^m --> B^3m , where m = 4. For each of the received words, determine whether an error will be detected. (a) 011010011111 (b) 110110010110 (c) 010


Hello, Please need some help for this work with references In a 3- to 4-page paper discuss how early architectural decisions affect the resulting application software.

Professional Issues in Computing - Professional Responsibility

What responsibility do computing professionals have to society at large and to other members in their profession? Do they have any responsibilities or are their working lives solely measured in terms of their adherence to company policy and goals? How does this translate into the broader area of business ethics?

Telecommunications and Networking

Your initial meeting with upper management has generated the need to deliver a formal presentation to all staff, introducing them to a few key communciation concepts. Keep in mind that you will have a mixed audience of technical and non-technical managers. The key to your presentation will be to take technical issues and communi


Investigate the IEEE 806.16 (WiMax) wireless networking standard a. How do transmission speed and distances compare to the IEEE 802.11 standards? b. What method/s is/are used to detect and correct transmission errors? c. Will 806.16 networks eventually replace 802.11 networks? Why or why not?

Distinguish among several types of malicious software

Perform an Internet search and locate examples of the five different types of malicious software (malware): Trojan horse Virus Logic bomb Worm Applet Explain how each type compromises a system. How can these different types of malware be stopped?

Secure computer room

Provide a list of recommendations for establishing a secure computer room Justify the recommendations by explaining how they conform to the requirements put forward in the Sarbanes-Oxley Act Include the principles of separation of duties to determine who should be granted access into the computer room and the type of acces

Network Design Project Plan

Prepare a network design plan describing the goals of a network design project, assumptions, pros and cons of the proposed solutions, and project constraints.


Please do not use exception handling, not covered in this course. See note below. Project 4 brings together all of the major concepts covered in the course in addition to providing some practice with string processing, file operations, and a little bit of object-oriented programming. In this project you will first study an ex


Provide screenshots and an explanation of your results when you download, install, and run a security program such as Spybot - S&D. Compare and contrast two enterprise suites of antivirus programs. Which one would you recommend to HealthFirst Hospital Foundation (HHF)? Why? How would you train HHF employees to recognize and

Travel Time and Data Frames

Need help with a Travel Time and Data Frames question. please see attached. thank you. Please reference this figure for the question: 7. A host computer is one of the sources in Figure 1. The computer is part of a network that has a transport layer header of 1000 bits and information field capacity of 9000 bits. T

Throughput Points in Media

Please reference this figure for the question: 16. Calculate the THROUGHPUT between Points B and G for the following cases: a. The media is copper with a length of 150,000 meters. The data rate is determined by multiplexing of 24-128kbps sources with a 10% overhead. Frame length is 500 bits. A Go-Back-N protocol is use

The Currency Conversion Program

Generate a set of test inputs and expected results for the Currency Conversion program. Post the test procedure as an attachment. Please see the attachment the Currency Conversion Program with the tables.

6 questions inclduing character encoding, data streams, flags and parity.

Please see attached file. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the following framing method is used: (a) Character count. (b) Fla

Level of fault tolerance needed

Can you please assist with the follow? 1.How would you determine the level of fault tolerance needed for a particular business operational function? 2. Are there legal or regulatory considerations when determining the level of fault tolerance needed? 3. What are some of the tests performed to ensure the fault toleranc

Buffering Streaming Media Data

What is done by the industry to reduce buffer delay in streaming media. Please discuss 3 ways how minimizing buffer delay can be achieved.

Problems from Neural Networks, Cisco Meeting Place, and ES, DSS, and AI systems

1. For the following, identify those that would be best suited for an expert system, decision support systems, or a more advanced AI system. Explain why. a. Helping students create a degree program. b. Determining how many cooks are needed each night at a large restaurant. c. Identifying potential criminals at an airport.