Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
1
votes
1
answer
1081
home work
A system uses the Sliding Window Protocol is having a bandwidth of 10Mbps with a window size of 100. What is the size of data if the distance between the sender and receiver is 72000km and the propagation speed is 3 x 10^8 m/sec? Given utilization is 0.5
A system uses the Sliding Window Protocol is having a bandwidth of 10Mbps with a window size of 100. What is the size of data if the distance between the sender and recei...
Samaa.qudah
2.8k
views
Samaa.qudah
asked
Nov 28, 2018
Computer Networks
computer-networks
sliding-window
+
–
0
votes
0
answers
1082
#CN Noob Doubt in Ethernet Frame.
Please someone explain in simplest of terms what is Ethernet Frame and what is Ethernet packet. I can't visualize them and tell them apart from one and another. Any help would be appreciated. Preamble SFD Destination MAC Source Mac Length field DATA ... in this and what is Ethernet packet and what's being received at DLL from Phy layer and NL from Transport layer?
Please someone explain in simplest of terms what is Ethernet Frame and what is Ethernet packet. I can’t visualize them and tell them apart from one and another. Any hel...
iarnav
242
views
iarnav
asked
Nov 28, 2018
Computer Networks
computer-networks
ethernet
+
–
0
votes
0
answers
1083
#CN Ethernet Question.
What is the maximum number of hosts that can be present in Ethernet LAN?
What is the maximum number of hosts that can be present in Ethernet LAN?
iarnav
289
views
iarnav
asked
Nov 28, 2018
Computer Networks
computer-networks
ethernet
+
–
1
votes
2
answers
1084
Application layer protocol
Which of the following Application Layer Protocol cannot be used between mail server and receiver’s client machine? SMTP HTTP POP3 IMAP4
Which of the following Application Layer Protocol cannot be used between mail server and receiver’s client machine?SMTPHTTPPOP3IMAP4
Sandy Sharma
2.7k
views
Sandy Sharma
asked
Nov 28, 2018
Computer Networks
computer-networks
application-layer-protocols
+
–
1
votes
0
answers
1085
Gateforum Test Series: Computer Networks - Lan Technologies
As per the explanation here https://gateoverflow.in/1983/gate2014-2-25#7752 the answer should be 21. But 17 is provided as answer.
As per the explanation here https://gateoverflow.in/1983/gate2014-2-25#7752 the answer should be 21. But 17 is provided as answer.
Gupta731
491
views
Gupta731
asked
Nov 28, 2018
Computer Networks
gateforum-test-series
computer-networks
lan-technologies
+
–
1
votes
3
answers
1086
IEEE 802.11
Consider the following statements: S1 : IEEE 802.11 does not uses sequence number. S2 : The amount of data send in one time in limited by RTS frame (data = sender's data + ACK). S3 : IEEE 802.11 uses CSMA/CA medium access protocol. S4 : The ... of collision on retransmissions in ethernet. Which of the following is true? This is from topic- wifi. From where should i study this topic ?
Consider the following statements:S1 : IEEE 802.11 does not uses sequence number.S2 : The amount of data send in one time in limited by RTS frame (data = sender’s dat...
Sandy Sharma
5.8k
views
Sandy Sharma
asked
Nov 28, 2018
Computer Networks
computer-networks
ieee-representation
+
–
2
votes
1
answer
1087
Computer Networks
Suppose a TCP message of 2000 bytes of data and 20 bytes of TCP header is passed to the IP layer. Suppose this host is connected to a link with an MTU size of 512 Bytes. What is the total length of the last IP fragment? Express in bytes. What is the value of the offset field in the last fragment?
Suppose a TCP message of 2000 bytes of data and 20 bytes of TCP header is passed to the IPlayer. Suppose this host is connected to a link with an MTU size of 512 Bytes. W...
Rohan Deshmukh
1.5k
views
Rohan Deshmukh
asked
Nov 27, 2018
Computer Networks
computer-networks
tcp
ip
+
–
0
votes
2
answers
1088
GATEBOOK_CN_20
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob's encryption public key, and $K_A^{-1}$ be Alice's private key for signing. Which of the following options would be the best choice for protecting confidential ... message, Alice should sign the encrypted message and then should send this signature along with the encrypted message to BOB. Please help.
Let M be a confidential email that Alice wants to send to Bob, $K_B$ be Bob’s encryption public key, and $K_A^{-1}$ be Alice’s private key for signing. Which of the...
Ayush Upadhyaya
2.1k
views
Ayush Upadhyaya
asked
Nov 27, 2018
Computer Networks
network-security
computer-networks
+
–
0
votes
0
answers
1089
GATEBOOK_CN4_19
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for e Which of the following is true ? A. Only I B. Only I and II C. Only I and III D. All of I,II and II I am Getting answer (C), but answer is given (D). As per kurose Ross, Z is defined to be $(p-1)(q-1)$
Consider RSA with p = 31 and q = 47. I. n = 1457 II. z= 1200 III. 7 is acceptable choice for eWhich of the following is true ? A. Only I B. Only I and II C. Only I and II...
Ayush Upadhyaya
638
views
Ayush Upadhyaya
asked
Nov 27, 2018
Computer Networks
computer-networks
network-security
+
–
1
votes
0
answers
1090
GATEBOOK_CN4_18
The Diffie-Hellman key exchange is being used to establish a secret key, k, between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice's secret number, x, is 12, and Bob's secret number, y, is 3. The secret key value k is I worked like ... so $82^3mod \,227=212(=Secret\,Key\,K)$ But the answer is given to be 155. Please help me know where I am going wrong?
The Diffie-Hellman key exchange is being used to establish a secret key, k, between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret...
Ayush Upadhyaya
368
views
Ayush Upadhyaya
asked
Nov 27, 2018
Computer Networks
computer-networks
+
–
0
votes
0
answers
1091
IP protocol sum
Error Correcting and Detecting Codes: The IP protocol implements Internet checksum over just the IP header. As the packet passes through the routers, one field called Time To Live (TTL) (8-bits long) in the IP header is decremented at each router. So ... checksum in the header. Is there a way to update the checksum without having to recalculate the checksum over the entire header?
Error Correcting and Detecting Codes: The IP protocol implements Internet checksum over just the IP header. As the packet passes through the routers, one field called Tim...
sujitgargate
554
views
sujitgargate
asked
Nov 27, 2018
Computer Networks
computer-networks
+
–
1
votes
2
answers
1092
Subnetting
An organization has a class C network and wishes to from subnet for 32 departments. The subnet mask would be:- $255.255.255.248$ $255.255.255.252$
An organization has a class C network and wishes to from subnet for 32 departments. The subnet mask would be:-$255.255.255.248$$255.255.255.252$
Shubhanshu
1.0k
views
Shubhanshu
asked
Nov 26, 2018
Computer Networks
subnetting
computer-networks
ip-address
+
–
1
votes
1
answer
1093
TCP congestion control
Suppose you are using TCP to transfer a 4 MB file over a network. The receiver advertises a receive window of 4 MB. Assume that the retransmission timers expire after 5 RTTs. (a) If TCP sends 4KB segments, how many RTTs does it take ... implements fast retransmit and fast recovery. How many RTTs are saved by the fact that your TCP implements fast retransmit and fast recovery?
Suppose you are using TCP to transfer a 4 MB file over a network. The receiver advertises a receive window of 4 MB. Assume that the retransmission timers expire after 5 R...
akmishra_1947
812
views
akmishra_1947
asked
Nov 26, 2018
Computer Networks
tcp
congestion-control
transport-layer
computer-networks
+
–
1
votes
0
answers
1094
MadeEasy Subject Test 2019: Computer Networks - Congestion Control
Consider an instance of TCP's Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of slow start phase is 2 MSS and the threshold at the start is 1st transmission is 12 MSS. ... of 7th transmission . The congestion window size at the end of 12th transmission is _________ (in MSS).
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of slow start phase is 2 MSS and the thresho...
jatin khachane 1
552
views
jatin khachane 1
asked
Nov 26, 2018
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
0
votes
0
answers
1095
MadeEasy Subject Test 2019: Computer Networks - Application Layer protocols
jatin khachane 1
689
views
jatin khachane 1
asked
Nov 26, 2018
Computer Networks
made-easy-test-series
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
1096
#CN SMTP MCQ
Which one of the following protocol is used to receive mail messages? a) smtp b) post office protocol c) internet message access protocol d) all of the mentioned Doubt : Do SMTP also able to receive mail messages?
Which one of the following protocol is used to receive mail messages?a) smtpb) post office protocolc) internet message access protocold) all of the mentioned Doubt : Do S...
iarnav
4.6k
views
iarnav
asked
Nov 25, 2018
Computer Networks
computer-networks
application-layer-protocols
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
1097
#CN Application Layer MCQ
Application layer offers _______ service a) End to end b) Process to process c) Both End to end and Process to process d) None of the mentioned
Application layer offers _______ servicea) End to endb) Process to processc) Both End to end and Process to processd) None of the mentioned
iarnav
2.4k
views
iarnav
asked
Nov 25, 2018
Computer Networks
computer-networks
application-layer-protocols
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
1098
#CN HTTP MCQ
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
iarnav
741
views
iarnav
asked
Nov 25, 2018
Computer Networks
computer-networks
+
–
1
votes
0
answers
1099
ME: TOPICWISE : COMPUTER NETWORKS-1 (GATE - 2019) Q5
Which of the following risk may arise, when same key is used to encrypt directions of a communication channel, that are not present if using different keys in both direction? A Reflection attack B Denial of service C Eavesdropping attack D None of these
Which of the following risk may arise, when same key is used to encrypt directions of a communication channel, that are not present if using different keys in both direct...
Sandy Sharma
395
views
Sandy Sharma
asked
Nov 25, 2018
Computer Networks
computer-networks
+
–
0
votes
1
answer
1100
Fragmentation overhead
Suppose a 1500 Byte datagram were to be sent over a link with MTU size of 296. We define IP control overhead as the ratio of control information you add in the form of IP header(s) to the IP payload length. What is the IP ... 1500 Byte datagram? Express answer as a percentage. What is IP control overhead associated with all the fragments? Express overhead in percentage.
Suppose a 1500 Byte datagram were to be sent over a link with MTU size of 296. We define IP control overhead as the ratio of control information you add in the form of IP...
John Doe
1.2k
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
fragmentation
+
–
0
votes
0
answers
1101
Sequence number
Two hosts A and B are communicating with each other using TCP. Assume the sequence number field starts at 0 and the receiver employs cumulative ack. A has successfully sent 465 bytes of data which were also acked by B. Suppose A were now to send 3 ... the first and third segment, what will the ack value be in the ack generated as a consequence of receiving this second segment?
Two hosts A and B are communicating with each other using TCP. Assume the sequence number field starts at 0 and the receiver employs cumulative ack. A has successfully se...
John Doe
1.7k
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
sequencenumber
+
–
1
votes
1
answer
1102
Number of messages in DVRP
In distance vector, suppose we define a round as an interval during which each node exchanges with its neighbor its routing table information. Assume N number of nodes and E number of edges in the graph. How many messages are exchanged in a round as a ... ? Express it as a function of N, E and d. Also assume that the network topology does not change during the rounds.
In distance vector, suppose we define a round as an interval during which each node exchanges with its neighbor its routing table information. Assume N number of nodes an...
John Doe
1.0k
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
distance-vector-routing
+
–
0
votes
0
answers
1103
Distance vector routing protocol
At the beginning each node knows only the distances to its immediate neighbors. In step 1, each node exchanges its routing table with all of its neighbors and all update their routing tables accordingly. In step 2, step 1 repeats. After step 2, at node A, ... minimum cost path to D? What will be the new value of the B-C link. Assume cost values are always >=1.
At the beginning each node knows only the distances to its immediate neighbors. In step 1, each node exchanges its routing table with all of its neighbors and all update ...
John Doe
1.4k
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
distance-vector-routing
routing
+
–
3
votes
1
answer
1104
Packet vs Circuit switching
Suppose Host A is connected to another Host B via a switch. The data rate of the link connecting the hosts to the switch is Rbps. Assume a packet length of L bits. In the calculation below, ignore processing, propagation and queuing delay. A - ... If packet switching was being used, for what fraction of the time (expressed in percentage) can the queue at the switch grow?
Suppose Host A is connected to another Host B via a switch. The data rate of the link connecting the hosts to the switch is Rbps. Assume a packet length of L bits. In the...
John Doe
1.1k
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
network-switching
+
–
0
votes
0
answers
1105
Ethernet Technology
A switch can connect 10Mbps and a 100Mbps link, while a hub cannot. Why? How many Ethernet adaptors can potentially be manufactured? Express it as a power of 2. If the first bit in an Ethernet MAC address is a zero, the address is what type of address? Find the number of collision domains in following two networks.
A switch can connect 10Mbps and a 100Mbps link, while a hub cannot. Why? How many Ethernet adaptors can potentially be manufactured? Express it as a power of 2.If t...
John Doe
789
views
John Doe
asked
Nov 24, 2018
Computer Networks
ethernet
computer-networks
adapters
+
–
0
votes
0
answers
1106
sliding window protocol question on earth and lunar
A colony is set up on moon. The 10 Mbps link from the earth to the lunar colony measures about 242,000 miles. Assume that the signal propagation speed is 186,000 miles per second. Calculate the minimum round trip time for ... . SRP with window size 8 and negligible processing delay. Go Back-n with window size 64 and negligible processing delay.
A colony is set up on moon. The 10 Mbps link from the earth to the lunar colony measures about 242,000 miles. Assume that the signal propagation speed is 186,000 miles pe...
John Doe
406
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
go-back-n
stop-and-wait
error-control
+
–
0
votes
0
answers
1107
Error detecting and error correcting codes
The IP protocol implements Internet checksum over just the IP header. As the packet passes through the routers, one field called Time To Live (TTL) (8-bits long) in the IP header is decremented at each router. So, each router needs ... in the header. Is there a way to update the checksum without having to recalculate the checksum over the entire header?
The IP protocol implements Internet checksum over just the IP header. As the packet passes through the routers, one field called Time To Live (TTL) (8-bits long) in the I...
John Doe
420
views
John Doe
asked
Nov 24, 2018
Computer Networks
error-detection
error-correction
computer-networks
+
–
0
votes
0
answers
1108
Ethernet Transmission
Two stations A, B employing Ethernet standard are competing for access. Suppose, both stations have many frames to send (labelled A1, A2, ... for A and B1, B2, .... for B). Suppose A and B simultaneously transmit their respective first frames ... Now A is attempting A3, while B is still attempting B1. What is the probability that A3's transmission succeeds over B1's?
Two stations A, B employing Ethernet standard are competing for access. Suppose, both stations have many frames to send (labelled A1, A2, ... for A and B1, B2, .... for B...
John Doe
339
views
John Doe
asked
Nov 24, 2018
Computer Networks
computer-networks
ethernet
collision
+
–
0
votes
0
answers
1109
Physical layer
Data Encoding and Modulation. How binary 0 and one are encoded over OC-48, OC-192, OC-256 and OC-768 cables. Which modulation techniques are used by these cables to provide 10 Gbps, 14.271 Gbps and 40 Gbps data transfer rates? Provide the manual ... of encoding, channel capacity, baud rate and modulation techniques used to get 10 Gbps, 14.271 Gbps and 40 Gbps data transfer rates.
Data Encoding and Modulation. How binary 0 and one are encoded over OC-48, OC-192, OC-256 and OC-768 cables. Which modulation techniques are used by these cables to prov...
John Doe
497
views
John Doe
asked
Nov 24, 2018
Computer Networks
data-encoding
computer-networks
modulation
physical-layer
+
–
2
votes
1
answer
1110
made easy test series
amitqy
1.1k
views
amitqy
asked
Nov 21, 2018
Computer Networks
computer-networks
sliding-window
+
–
Page:
« prev
1
...
32
33
34
35
36
37
38
39
40
41
42
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register