If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.
1.First
2.middle
3.Last
4.All of the above
Posted Date:-2022-05-27 12:37:51
AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
1.5, 7, 15
2.10, 12, 14
3. 5, 6, 7
4.20, 12, 14
Posted Date:-2022-05-27 12:48:56
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for
1. Cable TV
2.Ethernet
3. Thin Ethernet
4. Thick Ethernet
Posted Date:-2022-05-27 12:47:50
Data Encryption Techniques are particularly used for _______.
1.protecting data in Data Communication System
2.reduce Storage Space Requirement
3.enhances Data Integrity
4.decreases Data Integrity
Posted Date:-2022-05-27 12:50:19
The design issue of Datalink Layer in OSI Reference Model is
1.Framing
2.Representation of bits
3.Synchronization of bits
4.Connection control
Posted Date:-2022-05-27 12:46:43
The GSM network is divided into the following three major systems :
1.SS, BSS, OSS
2.BSS, BSC, MSC
3.CELL, BSC, OSS
4.SS, CELL, MSC
Posted Date:-2022-05-27 12:35:22
The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
1.SNMP (Simple Network Management Protocol)
2.SMTP (Simple Mail Transfer Protocol)
3.SS7 (Signalling System 7)
4.HTTP (Hyper Text Transfer Protocol)
Posted Date:-2022-05-27 12:36:38