Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Data link protocols almost always put the CRC in a trailer
rather than in a header. Why?


Answer Posted / cade bryant

It is more efficient. Only one pass needs to be made over the packet as it computes the CRC while scanning the packet, and then outputs it at the end (trailer). If the CRC were in the header, then two passes would be necessary - one to compute the CRC, and one more to append it to the front of the packet.

Is This Answer Correct ?    104 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

When is a translating bridge used ?

1692


Define Consumer Satellite Products

1261


What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.

1769


give an example of bus type network.

1190


up to which ver of linux using lilo boot loader? last ver of linux.

2055


On a nexus, is the metric-type keyword not available in the "default-information originate" command?

1122


What Equipment Do I Need for My VSAT Network?

1183


1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?

2782


List out the main responsibilities of the network layer.

1861


What is the difference between IE 6 & 8?

2425


Explain leaky bucket algorithm and compare it with token bucket algorithm.

2629


What is virtual path

1162


Explain network equipment used in wired-LANS and explain the function of Hub, Switch, and bridge.

1801


Which layer is used to detect and correct errors

1633


How do cryptography-based keys ensure the validity of data transferred across the network?

6675