473,734 Members | 2,298 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Create CRC-16 CCITT for a string

I have an app that needs to create a CRC-16 CCITT code for a small string
(less than 16 characters). I cannot find any sample code that will help me
do it. My language of choice is VB .NET 2.0, but C# is also an option. I am
not sure if I am allowed to purchase 3rd party plug-ins / controls / etc. for
this project, so a code sample that worked would be great.

I have not done amything like this before, and I am tight on time. Any help
is greatly appreciated.

Thanks in advance,
Brad Simon
Jan 26 '06 #1
0 1926

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

by: Dwight via AccessMonster.com | last post by:
Hi everyone I have a database containing pictures (actually only links to them). Each picture has a ID consisting of a number. My problem is this: as more pictures are added, duplicates will occure. I want to use the CRC for each image-file as its unique identifier, thus reducing the risk of duplicates. There are a lot of standalone CRC calculators but I wonder if there is any way to have Access read the CRC?
by: joboja | last post by:
Looking for help with 8 bit crc. Poly is x8 + x7 + x4 + x3 + x + 1 starting with all one bits. Crc result is complemented before transmission. Received message 14000000 with appended crc 05.
by: Susanne Strege | last post by:
Hello... I'm wondering if it is possible to perform a CRC or Checksum on the data contained in a simple Linked List that uses pointers to nodes???
by: Chen L. | last post by:
Hi all, If I have a 32-bit data M, and the CRC genrator polynomial G(x),which power is 32, then I can get the CRC checkword R by the following algorithm: X^32*M(x) = Q(x)G(x) + R(x), But how is the inversed process, if I have get the R(x), is there a inverse polynomial to generator the M(x)? Another example is that I have a 32-bit data sequence D0,D1,D2,D3,
by: StormyTheCat | last post by:
Perhaps this is easy, but I'm new to C# am in need of some help. I need to embed a CRC value into an XML file to be able to detect when the data contained therin is corrupted. Calculating the CRC on the DataSet (or an XML structure) has been the big problem. This seems like a fairly common problem but I have been unable to find the solution. In the world of plain old C, all I needed was the start and end address of
by: Jochen Müller | last post by:
I want to add a CRC field to the HTTP header that contains a kind of checksum over the whole page content. 1. Where have I to place the CRC calculation? I tried to do it in the Page_Unload event: Response.AppendHeader("CRC", crc_val) but it refused! 2. Is there an already implemented CRC feature in ASP.NET that I can use?
by: Dragon | last post by:
Hi, I am trying to find out what type CRC a particular utility is using. I am attaching a sample txt file (in a zip). When I use CRC32 to get the CRC value of this text file I get 3524-41C2. When I use this particular utility, it gives me 75EF-9AEB. Does anyone know what other type of CRC might result in a value like above? (Sorry about the attachment but I don't know of any other way to explain it.) Thank you.
by: ValK | last post by:
Hello, I’m working with handheld device that communicates with windows service thru the serial port. Transaction between device and my application looks like this: Handshaking: Device sends ENQ Service responds DLE 0 Device sends DLESOH4168840000SR01L01DLEETX4á
by: John Crouse | last post by:
I am able to check the crc of the archive but would like to check the crc for the file in the archive. How can I accomplish this? Do I need to extract the file first? I would rather not do this since I am searching a folder of 2500 files for a crc match. Thanks, John
by: mfareed | last post by:
Can somebody help me with the CRC (Cyclic Redundancy Code) algorithm implementation given below: There is a three byte packet header. <--------1st byte-----><--------2nd byte-----><--------3rd byte-------------> --------------------------------------------------------------------------------------------- | 8bits | 8bits | 3 bits| 5 bits (CRC ) | ...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.