Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for network
106
votes
11
answers
1
GATE CSE 2015 Set 3 | Question: 36
Two hosts are connected via a packet switch with $10^7$ bits per second links. Each link has a propagation delay of $20$ microseconds. The switch begins forwarding a packet $35$ microseconds after it receives the same. If $10000$ bits of ... between the transmission of the first bit of data and the reception of the last bit of the data in microseconds is ______.
Two hosts are connected via a packet switch with $10^7$ bits per second links. Each link has a propagation delay of $20$ microseconds. The switch begins forwarding a pack...
go_editor
33.0k
views
go_editor
asked
Feb 15, 2015
Computer Networks
gatecse-2015-set3
computer-networks
normal
numerical-answers
network-switching
+
–
71
votes
8
answers
2
GATE CSE 2005 | Question: 73
In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is $24$ bytes and each packet contains a header of $3$ bytes, then the optimum packet size is: $4$ $6$ $7$ $9$
In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is $24$ bytes and each...
Kathleen
42.6k
views
Kathleen
asked
Sep 22, 2014
Computer Networks
gatecse-2005
computer-networks
network-switching
normal
+
–
38
votes
12
answers
3
GATE CSE 2019 | Question: 29
Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be used for this? X sends an ARP request packet to the local gateway' ... packet with broadcast MAC address in its local subnet X sends an ARP request packet with broadcast IP address in its local subnet
Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be ...
Arjun
19.5k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
computer-networks
network-protocols
2-marks
+
–
54
votes
4
answers
4
GATE CSE 2014 Set 2 | Question: 26
Consider the store and forward packet switched network given below. Assume that the bandwidth of each link is $10^6$ bytes / sec. A user on host $A$ sends a file of size $10^3$ bytes to host $B$ through routers $R1$ and $R2$ in three different ways. ... . Which one of the following is CORRECT? $T1<T2<T3$ $T1>T2>T3$ $T2=T3, T3<T1$ $T1=T3, T3> T2$
Consider the store and forward packet switched network given below. Assume that the bandwidth of each link is $10^6$ bytes / sec. A user on host $A$ sends a file of size ...
go_editor
19.2k
views
go_editor
asked
Sep 28, 2014
Computer Networks
gatecse-2014-set2
computer-networks
network-switching
normal
+
–
51
votes
6
answers
5
GATE IT 2004 | Question: 87
A TCP message consisting of $2100$ $bytes$ is passed to IP for delivery across two networks. The first network can carry a maximum payload of $1200$ $bytes$ per frame and the second network can carry a maximum payload of $400$ $bytes$ per frame, excluding ... second network for this transmission? $\text{40 bytes}$ $\text{80 bytes}$ $\text{120 bytes}$ $\text{160 bytes}$
A TCP message consisting of $2100$ $bytes$ is passed to IP for delivery across two networks. The first network can carry a maximum payload of $1200$ $bytes$ per frame an...
Ishrat Jahan
19.4k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-flow
normal
+
–
49
votes
7
answers
6
GATE IT 2006 | Question: 67
A link of capacity $100$ $\text{Mbps}$ is carrying traffic from a number of sources. Each source generates an on-off traffic stream; when the source is on, the rate of traffic is $10$ $\text{Mbps}$, and when the source is off, the rate of traffic is zero. The duty cycle, which ... $\text{and}$ $30$ $12$ $\text{and}$ $25$ $5$ $\text{and}$ $33$ $15$ $\text{and}$ $22$
A link of capacity $100$ $\text{Mbps}$ is carrying traffic from a number of sources. Each source generates an on-off traffic stream; when the source is on, the rate of tr...
Ishrat Jahan
11.2k
views
Ishrat Jahan
asked
Nov 1, 2014
Computer Networks
gateit-2006
computer-networks
network-flow
normal
+
–
39
votes
12
answers
7
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.9k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
34
votes
6
answers
8
GATE CSE 2016 Set 1 | Question: 24
Which one of the following protocols is NOT used to resolve one form of address to another one? $\textsf{DNS}$ $\textsf{ARP}$ $\textsf{DHCP}$ $\textsf{RARP}$
Which one of the following protocols is NOT used to resolve one form of address to another one?$\textsf{DNS}$$\textsf{ARP}$$\textsf{DHCP}$$\textsf{RARP}$
Sandeep Singh
18.3k
views
Sandeep Singh
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set1
computer-networks
network-protocols
normal
+
–
26
votes
3
answers
9
GATE IT 2004 | Question: 80
In a data link protocol, the frame delimiter flag is given by $0111$. Assuming that bit stuffing is employed, the transmitter sends the data sequence $01110110$ as $01101011$ $011010110$ $011101100$ $0110101100$
In a data link protocol, the frame delimiter flag is given by $0111$. Assuming that bit stuffing is employed, the transmitter sends the data sequence $01110110$ as$011010...
Ishrat Jahan
10.1k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-flow
normal
+
–
14
votes
2
answers
10
GATE CSE 2021 Set 1 | Question: 49
Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following: The time taken for processing the data frame by the receiver is negligible. The time taken for ... number of frames, (rounded to the nearest integer) needed to achieve a link utilization of $50\%$ is_____________.
Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following:The time taken for pr...
Arjun
13.5k
views
Arjun
asked
Feb 18, 2021
Computer Networks
gatecse-2021-set1
computer-networks
network-protocols
sliding-window
numerical-answers
2-marks
+
–
0
votes
1
answer
11
Network Addressing
What is the Network ID for the network denoted by 192.168.242.5/20? a)192.168.242.0 b)192.168.240.0 c)192.168.226.0 d)192.168.192.0
What is the Network ID for the network denoted by 192.168.242.5/20? a)192.168.242.0b)192.168.240.0c)192.168.226.0d)192.168.192.0
Ayankahn
47
views
Ayankahn
asked
4 days
ago
Computer Networks
computer-networks
network-addressing
+
–
4
votes
0
answers
12
GO Classes Test Series 2024 | Mock GATE | Test 12 | Question: 11
Host $\text{A}$ and $\text{B}$ are behind different NATs. $\text{A's}$ private IP address is $192.168.1.11,$ and $\text{B's}$ private IP is $10.1.1.12.$ The public IP of the NAT box connected to $\text{A}$ is $4.3.2.1$ and ... destination IP address in the packet leaving $\text{A}?$ $4.3.2.1$ $2.2.2.2$ $10.1.1.12$ $1.2.3.4$
Host $\text{A}$ and $\text{B}$ are behind different NATs. $\text{A's}$ private IP address is $192.168.1.11,$ and $\text{B's}$ private IP is $10.1.1.12.$ The public IP of ...
GO Classes
532
views
GO Classes
asked
Jan 21
Computer Networks
goclasses2024-mockgate-12
goclasses
computer-networks
network-addressing
1-mark
+
–
1
votes
1
answer
13
ISRO 2024
CAPTCHA is used to provide protection from Zero day attack Buffer Overflow Automated scripted attack Man in the middle attack
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
Ramayya
300
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
network-security
web-technologies
+
–
0
votes
0
answers
14
Andrew S. Tanenbaum Edition 5th Chapter 5 Question 35 (Page No. 493)
You have just explained the ARP protocol to a friend. When you are all done, he says: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of the data link layer.’’ What do you say to him?
You have just explained the ARP protocol to a friend. When you are all done, he says: ‘‘I’ve got it. ARP provides a service to the network layer, so it is part of t...
kalamar
105
views
kalamar
asked
Jan 3
Computer Networks
computer-networks
network-layer
network-protocols
+
–
0
votes
0
answers
15
Can anyone provide a list of frequently asked protocols wrt various layers of OSI model, or an authentic source from where I can get the list for the same.
tishhaagrawal
163
views
tishhaagrawal
asked
Dec 12, 2023
Computer Networks
gate-preparation
computer-networks
network-protocols
general-topic-doubt
network-layer
+
–
1
votes
2
answers
16
#ACE acedmy test series
In a host size for PDU of network layer is 17076 bytes, MTU size for that network is 200 bytes and IPv4 header size is 20 bytes .find number of IP fragments
In a host size for PDU of network layer is 17076 bytes, MTU size for that network is 200 bytes and IPv4 header size is 20 bytes .find number of IP fragments
amit166
482
views
amit166
asked
Jan 5, 2023
Computer Networks
computer-networks
network-layer
ip-addressing
ace-test-series
+
–
8
votes
2
answers
17
GATE Overflow Test Series | Mock GATE | Test 1 | Question: 36
Two nodes, $A$ and $B$, communicate through a store and forward network. Node $A$ is connected to the network by a $100$ Mbps link, while node $B$ is connected by a $500$ Mbps link. Node $A$ ... a node is defined as the time when the last bit of the packet has arrived at that node. $1$ $2$ $5$ $10$
Two nodes, $A$ and $B$, communicate through a store and forward network. Node $A$ is connected to the network by a $100$ Mbps link, while node $B$ is connected by a $500$...
gatecse
964
views
gatecse
asked
Jan 3, 2021
Computer Networks
go2025-mockgate-1
network-switching
computer-networks
+
–
0
votes
0
answers
18
Message switching
What is the formula for total time in message switching
What is the formula for total time in message switching
Ray Tomlinson
207
views
Ray Tomlinson
asked
Jul 30, 2023
Computer Networks
computer-networks
network-switching
packet-switching
+
–
2
votes
2
answers
19
Subnets
Given an IP address 156.233.42.56 with a subnet mask of 7 bits. How many hosts and Subnets are Possible ? 126 hosts and 510 subnet 128 host and 512 subnet 510 hosts and 126 subnet 512 hosts and 128 Subnet
Given an IP address 156.233.42.56 with a subnet mask of 7 bits. How many hosts and Subnets are Possible ?126 hosts and 510 subnet128 host and 512 subnet510 hosts and 126 ...
Na462
2.5k
views
Na462
asked
Dec 4, 2018
Computer Networks
subnetting
computer-networks
network-addressing
+
–
42
votes
3
answers
20
GATE CSE 2011 | Question: 2
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOT block entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$ block all $\text{ICMP}$ traffic stop incoming traffic from specific $\text{IP}$ ... same IP address block $\text{TCP}$ traffic from a specific user on a multi-user system during $9:00PM$ to $5:00AM$
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOTblock entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$block...
go_editor
17.0k
views
go_editor
asked
Sep 29, 2014
Computer Networks
gatecse-2011
computer-networks
network-security
firewall
normal
out-of-gate-syllabus
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register