The structure or format of data is called ___________
An interconnected collection of piconets is called
As the data packet moves down the layer hierarchy from the upper to the lower layers, the headers are:
In asymmetric key cryptography, who keeps the private key?
In the transfer of a file between a server and a client, if the transmission rates along the path are 100Mbps, 200Mbps, 300Mbps, and 400Mbps, the throughput is usually ___________
Algorithms that do not take their decisions based on measurements or estimates of the current traffic and topology are called ________.
Given the message to be encrypted as IT IS A SMALL WORLD using Caesar Cipher with a shift of 3. If the spaces are encrypted as dots, then the encrypted message is ____________
What condition should the generator polynomial G(x) used for CRC checking satisfy to detect an odd number of bits in error?
Assume that the bandwidth for a TCP connection is 1048560 bits/sec. Let α be the value of RTT in milliseconds (rounded off to the nearest integer) after which the TCP window scale option is needed. Let β be the maximum possible window size with window scale option. Then the values of α and β are.
Consider a network using the pure ALOHA medium access control protocol, where each frame is of length 1,000 bits. The channel transmission rate is 1 Mbps (=106 bits per second). The aggregate number of transmissions across all the nodes (including new frame transmissions and retransmitted frames due to collisions) is modelled as a Poisson process with a rate of 1,000 frames per second. Throughput is defined as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is