Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
2
votes
2
answers
961
fast retransmit and fast recovery mechanism
Consider the following plot of TCP window size as a function of time. Assume TCP is operating with slow start, congestion avoidance, fast retransmit and fast recovery mechanism. What is the time interval where the slow start ... value of threshold. It starts congestion avoidance phase again. Please explain in more details about the concept underlying?
Consider the following plot of TCP window size as a function of time. Assume TCP is operating with slow start, congestion avoidance, fast retransmit and fast recovery mec...
Sandy Sharma
2.0k
views
Sandy Sharma
asked
Jan 6, 2019
Computer Networks
computer-networks
tcp
congestion-control
+
–
1
votes
1
answer
962
me test
Consider two stations communicates via 1 Mbps satellite link with propagation delay of 270 msec. The satellite serves merely to retransmit data received from one station to another, with negligible switch delay. If Ethernet frame size is 1024 bits with 3 bits sequence number, then the maximum possible data throughput is ___(upto 2 decimal places).
Consider two stations communicates via 1 Mbps satellite link with propagation delay of 270 msec. The satellite serves merely to retransmit data received from one station ...
newdreamz a1-z0
590
views
newdreamz a1-z0
asked
Jan 5, 2019
Computer Networks
throughput
sliding-window
computer-networks
+
–
1
votes
2
answers
963
me test
If a datagram of size 4000 bytes from transport layer arrives at network layer and it has to be forwarded through a link with maximum capacity of 800 bytes. Then calculate the number of fragments needed if the header size is 20 bytes. Also calculate the data size of the last fragment. 5 fragments ,100 bytes 5 fragments ,104 bytes 6 fragments ,100 bytes 6 fragments ,104 bytes
If a datagram of size 4000 bytes from transport layer arrives at network layer and it has to be forwarded through a link with maximum capacity of 800 bytes. Then calculat...
newdreamz a1-z0
651
views
newdreamz a1-z0
asked
Jan 5, 2019
Computer Networks
fragmentation
computer-networks
+
–
1
votes
1
answer
964
MadeEasy Test Series: Computer Networks -Sliding Window
I am unable to understand their explanation,can anyone explain it in a better way?
I am unable to understand their explanation,can anyone explain it in a better way?
sripo
568
views
sripo
asked
Jan 5, 2019
Computer Networks
computer-networks
sliding-window
go-back-n
made-easy-test-series
+
–
0
votes
0
answers
965
UPPCL AE 2018:49
If you are running a website, you purchase a digital certificate from a certification authority, and send your digital certificate to any web-client connecting to your website in order to: Provide your password to access your website Provide ... your website Announce that you actually guarantee security of the website Provide your private key to users connecting to your website
If you are running a website, you purchase a digital certificate from a certification authority, and send your digital certificate to any web-client connecting to your we...
admin
203
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
cryptography
+
–
0
votes
0
answers
966
UPPCL AE 2018:48
Which of the following always happens during the $\text{SSL/TLS}$ handshake? The server and client already use a fixed set of cryptographic algorithms that are pre-decided by the system administrators The client sends client hello with a set of ... distribution and fixing of algorithms are done offline so there is no need for any exchange of algorithm or key during the handshake
Which of the following always happens during the $\text{SSL/TLS}$ handshake?The server and client already use a fixed set of cryptographic algorithms that are pre-decided...
admin
342
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
cryptography
+
–
0
votes
0
answers
967
UPPCL AE 2018:43
Which of the following must be done in order to ensure the integrity of your electronic communication? None of the above Hash the message without any key, digitally sign the hash, and then send it to the recipient along with the message Encrypt the ... message Hash the message with the public key of the recipient, and send the hash value of the message along with the message
Which of the following must be done in order to ensure the integrity of your electronic communication?None of the aboveHash the message without any key, digitally sign th...
admin
210
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
encryption-decryption
+
–
0
votes
0
answers
968
UPPCL AE 2018:42
What key(s) are used by the sender of an encrypted message in an asymmetric-key cipher? Private key of the sender Public or private key of the sender Neither public nor private key of the receiver Public key of the receiver
What key(s) are used by the sender of an encrypted message in an asymmetric-key cipher?Private key of the senderPublic or private key of the senderNeither public nor priv...
admin
192
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
encryption-decryption
+
–
0
votes
2
answers
969
UPPCL AE 2018:40
If in $\text{CIDR}$ notation an $\text{IP}$ address is written as $172.26.17.1/25$, the subnet mask is: $255.255.255.192$ $255.255.255.0$ $255.255.240.0$ $255.255.255.128$
If in $\text{CIDR}$ notation an $\text{IP}$ address is written as $172.26.17.1/25$, the subnet mask is:$255.255.255.192$$255.255.255.0$$255.255.240.0$$255.255.255.128$
admin
734
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
ip-address
subnetting
+
–
0
votes
1
answer
970
UPPCL AE 2018:29
Which of the following best describes the usage of the $\text{TTL}$ (Time to Live) field of an $\text{IP}$ packet? Improve throughput Prevent packet from wandering around forever Reduce packet transmission delay Detect whether any error has been introduced in the packet
Which of the following best describes the usage of the $\text{TTL}$ (Time to Live) field of an $\text{IP}$ packet?Improve throughputPrevent packet from wandering around f...
admin
287
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
ip-packet
+
–
0
votes
0
answers
971
UPPCL AE 2018:14
Suppose that a code has the following four valid codewords: $\begin{array} \\ 11001100 \\ 00110011 \\ 11111111 \\ 00000000 \end{array}$ What is the minimum number of errors that can be detected for this code? $3$ $4$ $2$ $1$
Suppose that a code has the following four valid codewords:$\begin{array} \\ 11001100 \\ 00110011 \\ 11111111 \\ 00000000 \end{array}$What is the minimum number of errors...
admin
348
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
hamming-code
error-detection
+
–
0
votes
0
answers
972
UPPCL AE 2018:9
Consider the following application layer services: Domain names to $\text{IP}$ Address mapping Data communication over the World Wide Web Electronic mail transmission Retrieve e-mail from a remote server Transfer files from one host to another host Which one of the following order of application ... $\text{DNS, FTP, SMTP, POP, FTP}$ $\text{HTTP, FTP, POP, SMTP, DNS}$
Consider the following application layer services:Domain names to $\text{IP}$ Address mappingData communication over the World Wide WebElectronic mail transmissionRetriev...
admin
246
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
973
UPPCL AE 2018:5
Which one of the following fields is present in both $\text{TCP}$ header and $\text{UDP}$ header? Urgent pointer Checksum Sequence number Acknowledgement number
Which one of the following fields is present in both $\text{TCP}$ header and $\text{UDP}$ header?Urgent pointerChecksumSequence numberAcknowledgement number
admin
481
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
tcp
udp
+
–
0
votes
0
answers
974
Self Doubt
Sliding Window Protocols are Half Duplex or Full duplex ?
Sliding Window Protocols are Half Duplex or Full duplex ?
jatin khachane 1
166
views
jatin khachane 1
asked
Jan 4, 2019
Computer Networks
computer-networks
+
–
1
votes
1
answer
975
Parity Check Self Doubt
How many bits can a 2-dimensional parity detect and correct? Is there any general formula for no of bit detection and correction for N-dimensional parity?
How many bits can a 2-dimensional parity detect and correct? Is there any general formula for no of bit detection and correction for N-dimensional parity?
vinay chauhan
1.6k
views
vinay chauhan
asked
Jan 4, 2019
Computer Networks
computer-networks
error-detection
error-correction
+
–
0
votes
1
answer
976
UGC NET CSE | December 2018 | Part 2 | Question: 63
Consider $ISO-OSI$ network architecture reference model. Session layer of this model offers dialog control, token management and ______ as services. Syncronization Asyncronization Flow control Errors
Consider $ISO-OSI$ network architecture reference model. Session layer of this model offers dialog control, token management and ______ as services.SyncronizationAsyncron...
Arjun
726
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
+
–
0
votes
1
answer
977
UGC NET CSE | December 2018 | Part 2 | Question: 86
A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is the Internet the university network the department network the subnet to which the host belongs
A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The larg...
Arjun
925
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
+
–
0
votes
0
answers
978
UGC NET CSE | December 2018 | Part 2 | Question: 87
An Internet Service Provider $(ISP)$ has following chunk of $CIDR-$based $IP$ addresses available with it :$245.248.128.0/20$. The $ISP$ wants to give half of this chunk addresses to organization $A$ and a quarter to organization $B$ while retaining ... $245.248.136.0/24 \text{ and } 245.248.132.0/21$
An Internet Service Provider $(ISP)$ has following chunk of $CIDR-$based $IP$ addresses available with it :$245.248.128.0/20$. The $ISP$ wants to giv...
Arjun
971
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
subnetting
+
–
0
votes
1
answer
979
UGC NET CSE | December 2018 | Part 2 | Question: 89
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted. HTTP GET request, DNS query, TCP SYN ... , HTTP GET request, TCP SYN TCP SYN, DNS query, HTTP GET request DNS query, TCP SYN, HTTP GET request
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming tha...
Arjun
954
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
+
–
0
votes
2
answers
980
UGC NET CSE | December 2018 | Part 2 | Question: 90
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys ... whole to satisfy the confidentiality requirement is $N(N-1)$ $N(N-1)/2$ $2N$ $(N-1)^2$
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between...
Arjun
1.0k
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
network-security
+
–
1
votes
3
answers
981
Link state routing
True / False ) LSR uses dijkstra algorithm ? ) LSR working is similar to dijkstra algorithm ? ) DVR uses bellman algorithm for finding the shortest distance to other routers/hops?
True / False) LSR uses dijkstra algorithm ?) LSR working is similar to dijkstra algorithm ?) DVR uses bellman algorithm for finding the shortest distance to other routers...
Gurdeep Saini
1.6k
views
Gurdeep Saini
asked
Jan 2, 2019
Computer Networks
computer-networks
routing
link-state-routing
+
–
1
votes
0
answers
982
Previous year question doubt
Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note that cwnd stands for the TCP congestion window and MSS window denotes the Maximum Segments Size: The cwnd increases by 2MSS on every successful ... in RTT time. If that statement is true I will get option 2 Can someone please clarify on above statement
Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note that cwnd stands for the TCP congestion window and MSS wind...
Hemanth_13
412
views
Hemanth_13
asked
Jan 1, 2019
Computer Networks
computer-networks
+
–
0
votes
0
answers
983
Made Easy Question booklet
A 3000 km long trunck operates at 1.536 x 10^6 bps is used to transmit 64 byte frames and uses SWP. If the propagation speed is 6 micro-sec/km then the number of bits in the sequence number are ______ ? Answer:- 7
A 3000 km long trunck operates at 1.536 x 10^6 bps is used to transmit 64 byte frames and uses SWP. If the propagation speed is 6 micro-sec/km then the number of bits in ...
Nandkishor3939
275
views
Nandkishor3939
asked
Jan 1, 2019
Computer Networks
computer-networks
+
–
2
votes
0
answers
984
MadeEasy Test Series: Computer Networks - Sliding Window
Assume 2 computers are connected via a network, The networks use GoBack7 SW protocol for maintaining flow control. It is observed that every $5^{th}$ packet that has been sent through the network is lost. The number of extra packets needs to resend for transmitting 10 such packet through the network is______________________.
Assume 2 computers are connected via a network, The networks use GoBack7 SW protocol for maintaining flow control. It is observed that every $5^{th}$ packet that has been...
Shamim Ahmed
794
views
Shamim Ahmed
asked
Jan 1, 2019
Computer Networks
computer-networks
made-easy-test-series
sliding-window
+
–
1
votes
2
answers
985
LSP Packets
Which of the following is true about link state routing ? A) LSP Packets contains information of the network. B) LSP Packets are forwarded using flooding algorithm. C) Routers in the network converted into tree before forwarding LSP Packet. D) All ... but partially according to me as each LSP packet contains distances only not all network information such as topology etc. explain pls.
Which of the following is true about link state routing ?A) LSP Packets contains information of the network.B) LSP Packets are forwarded using flooding algorithm.C) Route...
Ashwani Yadav
2.9k
views
Ashwani Yadav
asked
Dec 31, 2018
Computer Networks
computer-networks
link-state-routing
+
–
0
votes
0
answers
986
Computer Networks[Ethernet]
In Ethernet ..what should be the right condition for collision detection Tt >= 2Tp OR Tt >= 2Tp + Tjam[Tranmission time for jam signal]
In Ethernet ..what should be the right condition for collision detection Tt >= 2Tp OR Tt >= 2Tp + Tjam[Tranmission time for jam signal]
jatin khachane 1
330
views
jatin khachane 1
asked
Dec 31, 2018
Computer Networks
computer-networks
ethernet
+
–
0
votes
1
answer
987
MadeEasy Test Series: Computer Networks - Lan Technologies
If probability of frame reaching safely is 0.1 then mean number of transmissions of a frame to make it success is _____. what is wrong with the approach given below random variable x is the number of transmission' X 1 2 3 4 so on P(X ... which comes out to be 100. but given the answer is 10 using 1/p. (what is wrong in above aproach?)
If probability of frame reaching safely is 0.1 then mean number of transmissions of a frame to make it success is _____. what is wrong with the approach given below‘ran...
newdreamz a1-z0
524
views
newdreamz a1-z0
asked
Dec 31, 2018
Computer Networks
made-easy-test-series
probability
lan-technologies
computer-networks
+
–
0
votes
0
answers
988
Broadcasting
Hub is broadcasting device- means collision is there and bridge , switch is broadcasting or collision domain separator- means it has no collision is it true? and give some reason why hub still have some collision
Hub is broadcasting device- means collision is there and bridge , switch is broadcasting or collision domain separator- means it has no collisionis it true? and give some...
srestha
144
views
srestha
asked
Dec 31, 2018
Computer Networks
computer-networks
+
–
0
votes
1
answer
989
Multicast Addressing
Consider an $IPV4$ addressing system, where at a same time two multicast group are ongoing, by choosing their multicast group address at random.Then the probability they interfere each other is _________________$\times 10^{9}$ how to solve multicast address?
Consider an $IPV4$ addressing system, where at a same time two multicast group are ongoing, by choosing their multicast group address at random.Then the probability they ...
srestha
606
views
srestha
asked
Dec 30, 2018
Computer Networks
computer-networks
network-addressing
+
–
0
votes
0
answers
990
Security
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
It is impossible to produce a document that differs from the original document with single bit change and valid signatureI am unable to understand, why is it impossible? ...
srestha
233
views
srestha
asked
Dec 30, 2018
Computer Networks
network-security
computer-networks
+
–
Page:
« prev
1
...
28
29
30
31
32
33
34
35
36
37
38
...
102
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register