If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.
1.First
2.middle
3.Last
4.All of the above
AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
1.5, 7, 15
2.10, 12, 14
3. 5, 6, 7
4.20, 12, 14
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for
1. Cable TV
2.Ethernet
3. Thin Ethernet
4. Thick Ethernet
Data Encryption Techniques are particularly used for _______.
1.protecting data in Data Communication System
2.reduce Storage Space Requirement
3.enhances Data Integrity
4.decreases Data Integrity
The design issue of Datalink Layer in OSI Reference Model is
1.Framing
2.Representation of bits
3.Synchronization of bits
4.Connection control
The GSM network is divided into the following three major systems :
1.SS, BSS, OSS
2.BSS, BSC, MSC
3.CELL, BSC, OSS
4.SS, CELL, MSC
The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
1.SNMP (Simple Network Management Protocol)
2.SMTP (Simple Mail Transfer Protocol)
3.SS7 (Signalling System 7)
4.HTTP (Hyper Text Transfer Protocol)