Found 1248 Articles for Computer Network

What is Polynomial Code?

George John
Updated on 30-Jul-2019 22:30:24
A polynomial code is a linear code having a set of valid code words that comprises of polynomials divisible by a shorter fixed polynomial is known as generator polynomial.They are used for error detection and correction during the transmission of data as well as storage of data.Types of Polynomial CodesThe types of polynomial codes are:Cyclic Redundancy CodeBose–Chaudhuri–Hocquenghem (BCH) CodesReed–Solomon CodesRepresentation of Bit Strings with PolynomialsThe code words, which are essentially bit strings, are represented by polynomials whose coefficients are either 0 or 1. A 𝑘 – bit word is represented by a polynomial ranging from 𝑥0 to 𝑥𝑘−1. The order ... Read More

Fletcher’s Checksum

Chandu yadav
Updated on 30-Jun-2020 07:38:08
Fletcher checksum is an error – detection technique that uses two checksums to determine single-bit errors in a message transmitted over network channels. It is a block code technique that was devised by John G. Fletcher in 1970s at Lawrence Livermore Labs, USA.The checksums are created based on the data values in the data blocks to be transmitted and appended to the data. When the receiver gets this data, the checksums are re-calculated and compared with the existing checksums. A non-match indicates an error.The error-detection capabilities of this method is nearly same as that of Cyclic Redundancy Check (CRC) but ... Read More

What is meant cyber crime? What are its different types?

Knowledge base
Updated on 30-Jul-2019 22:30:24
Cybercrime is the crime that is done using the internet and a computer or a phone or any other device as an instrument to cheat people, commit frauds, stealing intellectual property, violating privacy, stealing identities and diverting monetary transactions through the internet, female and child trafficking in pornography etc. Cybercrime has been very prevalent in the world today that almost everyone in the world is directly or indirectly affected by this. As the computer has become the gateway to the trade, banking, governance etc. Cybercrime is increasing by leaps and bounds.There are different types of Cybercrime that can be enlisted ... Read More

Is Quantum Computing changing the future of our world?

Shanmukh Pasumarthy
Updated on 30-Jul-2019 22:30:24
Quantum figuring contemplates hypothetical calculation frameworks (quantum PCs) that make coordinate utilization of quantum-mechanical marvels, for example, superposition to perform operations on data. Quantum PCs are unique in relation to binary digital PCs in light of transistors.While regular advanced registering requires that the information is encoded into twofold digits (bits), each of which is dependable in one of two distinct states (0 or 1), quantum calculation utilizes quantum bits, which can be in superpositions of states. A Quantum Turing Machine is a hypothetical model of such a PC and is otherwise called the general quantum PC.What are they?Starting at 2017, ... Read More

What is the difference between a search engine friendly and search engine optimised website?

Shankar Bhatt
Updated on 25-Jun-2020 11:51:11
This question always muddles the minds of those who want to start a website and get traffic to it as quickly as possible. However, it’s very crucial to know the answer to the question at the early stage, especially during the development because your developer can make your website search engine friendly. However, optimizing a website is a completely different task altogether.Search Engine Friendly Vs Search Engine OptimizedTurning a website search engine friendly is somewhat a one-time process. This process might involve a number of things but once it’s done there is not much required to do unless there is ... Read More

Why is software testing a need today?

sahas salguti
Updated on 25-Jun-2020 13:48:44
Software testing has become very important in our society because the world has grown very fast and we are not able to keep up with the world. The internet customers want their products to get implemented and developed and want to be updated faster than their competitors.The customers want their products to have the latest software for better performances and for better efficiency rate. The customers want their software releases with new features and to be implemented in a shorter period of time because of the competition from the competitors. The customers don't like to work with defected software.Software testing ... Read More

What is Interleaving?

Ankith Reddy
Updated on 26-Jun-2020 13:08:14
Interleaving is a tool that is used to enhance existing error correcting codes so that they can be used to perform burst error corrections as well.Most error correcting codes (ECCs) are designed to correct random errors, i.e. error caused by additive noise that is independent of each other. Burst error are the errors that occur in a sequence or as groups. They are caused due to defects in storage media or disruption in communication signals due to external factors like lightning etc. Interleaving modifies the ECC or does some processing on the data after they are encoded by ECCs.Interleaving ProcedureDuring ... Read More

What is a Parity Bit?

Arjun Thakur
Updated on 26-Jun-2020 13:08:35
A parity bit is a check bit, which is added to a block of data for error detection purposes. It is used to validate the integrity of the data. The value of the parity bit is assigned either 0 or 1 that makes the number of 1s in the message block either even or odd depending upon the type of parity. Parity check is suitable for single bit error detection only.The two types of parity checking areEven Parity − Here the total number of bits in the message is made even.Odd Parity − Here the total number of bits in ... Read More

Error-Detecting Codes - Cyclic Redundancy Checks (CRCs)

Chandu yadav
Updated on 26-Jun-2020 13:08:57
Errors and Error DetectionWhen bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits leads to spurious data being received by the receiver and are called errors.Error detection techniques are responsible for checking whether any error has occurred or not in the frame that has been transmitted via network. It does not take into account the number of error bits and the type of error.For error detection, the sender needs to send some additional bits along with the data bits. The receiver performs necessary checks based upon the ... Read More

Error-Detecting Codes - Checksums

George John
Updated on 26-Jun-2020 13:13:37
Errors and Error DetectionWhen bits are transmitted over the computer network, they are subject to get corrupted due to interference and network problems. The corrupted bits leads to spurious data being received by the receiver and are called errors.Error detection techniques are responsible for checking whether any error has occurred or not in the frame that has been transmitted via network. It does not take into account the number of error bits and the type of error.For error detection, the sender needs to send some additional bits along with the data bits. The receiver performs necessary checks based upon the ... Read More
Advertisements