Tough
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
ACROSS

1 The shape of a network, and the relationship between the nodes in that network [8]
18,19 ____ _______________Involves encoding information using fewer bits than the original representation [15]
29,30 The variable-length codes assigned to input characters are ________ _______ [11]
24,25 Huffman algorithm is an example of a _______ ______________. [15]
10,11 Arithmetic coding takes a message composed of symbols , and converts it to a _________ ________ number greater than or equal to zero and less than one [13]
31 the process of translating plaintext into ciphertext [12]
28 Packets that follow the IP specification are called IP _________ [9]
5 No information is lost in _________ compression [8]
27 Entropy is ______ when one outcome is certain [4]
8 data leaves a port or goes out [7]
26 In ________ Switching, the whole message is treated as a data unit [7]
7 ______services include sharing and transferring files over the network [4]
32 provide secure connections between individual users and their organization network over the Internet [3]
16 The original version of the method was created by Lempel and Ziv in ______ [4]
12 Lampel and Ziv starts with the dictionary of _______ characters [3]
14 RFC_______ defines security services as a processing or communication service that is provided by a system to give a specific kind of protection to system resources. [4]
21 _____ defines a security service as a service provided by a protocol layer of communicating open systems [5]
DOWN

3 The process to forward packets coming in from one port to a port leading towards the destination [9]
20 Data Comes to on a port [7]
23 In ________ Switching,Two nodes communicate with each other over a dedicated communication path [7]
4 packets are routed through a network based on the _____________ address contained within each packet [11]
17 In _________ Theory, a message or symbol occurs with probability p then the information contained in that symbol or message is -log2(p) bits [11]
15 In ________Compression,the decompression does not have to produce an identical copy of the original [5]
9 Arithmetic coding is a form of ______ encoding [7]
2 Entropy refers to _______ deliberately added to data in certain encryption processes [8]
22 DNS System is example of ______ Toplogy [4]
13 The entire message is broken down into smaller chunks called _________ [6]
6 Topology is typically used in a broadcast or SIMO network [4]