The structure or format of data is called ___________
An interconnected collection of piconets is called
As the data packet moves down the layer hierarchy from the upper to the lower layers, the headers are:
In asymmetric key cryptography, who keeps the private key?
In the transfer of a file between a server and a client, if the transmission rates along the path are 100Mbps, 200Mbps, 300Mbps, and 400Mbps, the throughput is usually ___________
Algorithms that do not take their decisions based on measurements or estimates of the current traffic and topology are called ________.
Given the message to be encrypted as IT IS A SMALL WORLD using Caesar Cipher with a shift of 3. If the spaces are encrypted as dots, then the encrypted message is ____________
What condition should the generator polynomial G(x) used for CRC checking satisfy to detect an odd number of bits in error?
Assume that the bandwidth for a TCP connection is 1048560 bits/sec. Let α be the value of RTT in milliseconds (rounded off to the nearest integer) after which the TCP window scale option is needed. Let β be the maximum possible window size with window scale option. Then the values of α and β are.
Consider a network using the pure ALOHA medium access control protocol, where each frame is of length 1,000 bits. The channel transmission rate is 1 Mbps (=106 bits per second). The aggregate number of transmissions across all the nodes (including new frame transmissions and retransmitted frames due to collisions) is modelled as a Poisson process with a rate of 1,000 frames per second. Throughput is defined as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is
OnSite
1 Openings
FullTime
Posted 17 days ago