SlideShare a Scribd company logo
a) Consider the standard 16-bit CRC protocol in the slides. Can we use this protocol to do error-
CORRECTION? If so, how powerful is it? I.e., what is the largest x such that the protocol
performs x-bit correction? b) What algorithm would you use to perform this correction? Give me
the pseudocode (or a sensible explanation)

More Related Content

More from Eric2EmGreenec

A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdfA soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
Eric2EmGreenec
 
According to Maslow- the following are among the traits cited in the s.pdf
According to Maslow- the following are among the traits cited in the s.pdfAccording to Maslow- the following are among the traits cited in the s.pdf
According to Maslow- the following are among the traits cited in the s.pdf
Eric2EmGreenec
 
Accepting the null hypothesis when it should have been rejected is an.pdf
Accepting the null hypothesis when it should have been rejected is an.pdfAccepting the null hypothesis when it should have been rejected is an.pdf
Accepting the null hypothesis when it should have been rejected is an.pdf
Eric2EmGreenec
 
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdfABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
Eric2EmGreenec
 
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdfAadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
Eric2EmGreenec
 
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdfA-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
Eric2EmGreenec
 
A- The __init__ method is called automatically- (T-F) B- A class can.pdf
A- The __init__ method is called automatically- (T-F)  B- A class can.pdfA- The __init__ method is called automatically- (T-F)  B- A class can.pdf
A- The __init__ method is called automatically- (T-F) B- A class can.pdf
Eric2EmGreenec
 
A- High-tech clusters- A planned development- within a concentrated ar.pdf
A- High-tech clusters- A planned development- within a concentrated ar.pdfA- High-tech clusters- A planned development- within a concentrated ar.pdf
A- High-tech clusters- A planned development- within a concentrated ar.pdf
Eric2EmGreenec
 
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdfA Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
Eric2EmGreenec
 
A rights offering is the issue of- Select one- a- proxies to the share.pdf
A rights offering is the issue of- Select one- a- proxies to the share.pdfA rights offering is the issue of- Select one- a- proxies to the share.pdf
A rights offering is the issue of- Select one- a- proxies to the share.pdf
Eric2EmGreenec
 
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdfa) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
Eric2EmGreenec
 
A university found that 40- of its students withdraw without completin.pdf
A university found that 40- of its students withdraw without completin.pdfA university found that 40- of its students withdraw without completin.pdf
A university found that 40- of its students withdraw without completin.pdf
Eric2EmGreenec
 
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdfA warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
Eric2EmGreenec
 
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdfA warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
Eric2EmGreenec
 
A university class has 27 students- 13 are nursing majors- 8 are histo.pdf
A university class has 27 students- 13 are nursing majors- 8 are histo.pdfA university class has 27 students- 13 are nursing majors- 8 are histo.pdf
A university class has 27 students- 13 are nursing majors- 8 are histo.pdf
Eric2EmGreenec
 

More from Eric2EmGreenec (15)

A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdfA soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
A soccer team has 11 players- Alfred- Bastian- Camille- Dora- Eleanor-.pdf
 
According to Maslow- the following are among the traits cited in the s.pdf
According to Maslow- the following are among the traits cited in the s.pdfAccording to Maslow- the following are among the traits cited in the s.pdf
According to Maslow- the following are among the traits cited in the s.pdf
 
Accepting the null hypothesis when it should have been rejected is an.pdf
Accepting the null hypothesis when it should have been rejected is an.pdfAccepting the null hypothesis when it should have been rejected is an.pdf
Accepting the null hypothesis when it should have been rejected is an.pdf
 
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdfABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
ABC stock has an expected ROE of 12- per year- expected earnings per s.pdf
 
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdfAadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
Aadakilerden hangisi bilgisayar tabanl bilgi sistemlerinin ilevlerinde.pdf
 
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdfA-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
A-Q1 -4 Points- How are RFCs used in the development and implementatio.pdf
 
A- The __init__ method is called automatically- (T-F) B- A class can.pdf
A- The __init__ method is called automatically- (T-F)  B- A class can.pdfA- The __init__ method is called automatically- (T-F)  B- A class can.pdf
A- The __init__ method is called automatically- (T-F) B- A class can.pdf
 
A- High-tech clusters- A planned development- within a concentrated ar.pdf
A- High-tech clusters- A planned development- within a concentrated ar.pdfA- High-tech clusters- A planned development- within a concentrated ar.pdf
A- High-tech clusters- A planned development- within a concentrated ar.pdf
 
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdfA Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
A Risk Management Plan may include all of the following EXCEPI Risk ma.pdf
 
A rights offering is the issue of- Select one- a- proxies to the share.pdf
A rights offering is the issue of- Select one- a- proxies to the share.pdfA rights offering is the issue of- Select one- a- proxies to the share.pdf
A rights offering is the issue of- Select one- a- proxies to the share.pdf
 
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdfa) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
a) Consider the standard 16-bit CRC protocol in the slides- Can we use (1).pdf
 
A university found that 40- of its students withdraw without completin.pdf
A university found that 40- of its students withdraw without completin.pdfA university found that 40- of its students withdraw without completin.pdf
A university found that 40- of its students withdraw without completin.pdf
 
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdfA warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
A warehouse employs 27 workers on first shif- 17 workers on second shi.pdf
 
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdfA warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
A warehouse employs 27 workers on first shith- 17 workers on socond sh.pdf
 
A university class has 27 students- 13 are nursing majors- 8 are histo.pdf
A university class has 27 students- 13 are nursing majors- 8 are histo.pdfA university class has 27 students- 13 are nursing majors- 8 are histo.pdf
A university class has 27 students- 13 are nursing majors- 8 are histo.pdf
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

a) Consider the standard 16-bit CRC protocol in the slides- Can we use.pdf

  • 1. a) Consider the standard 16-bit CRC protocol in the slides. Can we use this protocol to do error- CORRECTION? If so, how powerful is it? I.e., what is the largest x such that the protocol performs x-bit correction? b) What algorithm would you use to perform this correction? Give me the pseudocode (or a sensible explanation)