Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions and answers in Computer Networks
0
votes
1
answer
1
Computer networks
Is it possible for an organization’s Web server and mail server to have the same alias for a hostname (for example, foo.com)? What would be the type for the RR that contains the hostname of the mail server?
Sagnick12
answered
in
Computer Networks
13 hours
ago
by
Sagnick12
51
views
computer-networks
1
vote
1
answer
2
DRDO CSE 2022 Paper 2 | Question: 27
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext: $\text{X 2! H M E S S S E 2 Y T A 2 I I A}$ The key used was: $5 \; 2 \; 6 \; 3 \; 4 \; 1.$ What was the plaintext used (in English)?
chandira
answered
in
Computer Networks
15 hours
ago
by
chandira
50
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
0
votes
1
answer
3
unacademy AIMT 2
In go back 5, if every 7th packet that is being transmitted is lost and if we have to send 10 packets, then how many transmissions are required____. I’m getting 15 but the given answer is 14
chandira
answered
in
Computer Networks
17 hours
ago
by
chandira
213
views
computer-networks
go-back-n
0
votes
0
answers
4
#computernetwork, #privateipaddress
private ip address like Class A, Private IP Address: 10.0.0.0 to 10.255.255.255 Class B, Private IP Address: 172.16.0.0 to 172.31.255.255 Class C, Private IP Address: 192.168.0.0 to 192.168.255.255 why not use this private ip address?, please explain in brief… thanks you !
DHRUVITKUMAR YADAV
asked
in
Computer Networks
1 day
ago
by
DHRUVITKUMAR YADAV
17
views
computer-networks
ip-addressing
0
votes
1
answer
5
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field ? It can be used to prioritize packets It can be used to reduce delays It can be used to optimize throughput It can be used to prevent packet looping
psk2024
answered
in
Computer Networks
3 days
ago
by
psk2024
67
views
computer-networks
ip-packet
0
votes
1
answer
6
#tokenring
In a token ring access control method ,if we want to calculate total time as it's used in efficiency calculation, what's the use of a data packet moving in the ring and coming back to same point again and so that we can calculate the total time. I'm bit confused of what's the point of moving in the same ring
chandira
answered
in
Computer Networks
Mar 21
by
chandira
23
views
computer-networks
token-ring
0
votes
0
answers
7
#computer-networks #token-ring
In a token ring access control method ,if we want to calculate total time as it's used in efficiency calculation, what's the use of a data packet moving in the ring and coming back to same point again and so that we can calculate the total time. I'm bit confused of what's the point of moving in the same ring
Srken
asked
in
Computer Networks
Mar 21
by
Srken
21
views
computer-networks
token-ring
4
votes
1
answer
8
GATE CSE 2023 | Question: 42
Suppose in a web browser, you click on the $\textsf{www. gate-2023.in}\; \text{URL}$. The browser cache is empty. The $\text{IP address}$ for this $\text{URL}$ is not cached in your local host, so a $\text{DNS}$ lookup is triggered (by the ... $5$ parallel $\text{TCP}$ connections. $6\; \text{RTT}$s, in case of persistent $\text{HTTP}$ with pipelining.
nihal_chourasiya
answered
in
Computer Networks
Mar 21
by
nihal_chourasiya
2.2k
views
gatecse-2023
computer-networks
ip-address
multiple-selects
2-marks
0
votes
2
answers
9
Computer Networks
Answer given is d (Question From PW)
Mr_Engineer
answered
in
Computer Networks
Mar 16
by
Mr_Engineer
152
views
computer-networks
test-series
1
vote
1
answer
10
Subnets
Consider the following table with subnets Subnet Subnet Id Subnet Mask $ A$ 150.60.160.0 255.255.240.0 $B $ 150.60.164.0 255.255.252.0 $C $ 150.160.168.0 255.255.252.0 Can we say subnet C exists inside subnet A?
Mr_Engineer
answered
in
Computer Networks
Mar 16
by
Mr_Engineer
108
views
subnetting
computer-networks
1
vote
1
answer
11
DRDO CSE 2022 Paper 2 | Question: 25
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ ... with key $\mathrm{K}$ in counter mode (with initial counter value $=0):$ $\text{C}=100110000$ What was the plaintext?
AGNIDEB MUKHERJEE
answered
in
Computer Networks
Mar 15
by
AGNIDEB MUKHERJEE
84
views
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
44
votes
5
answers
12
GATE CSE 2003 | Question: 27
Which of the following assertions is FALSE about the Internet Protocol (IP)? It is possible for a computer to have multiple IP addresses IP packets from the same source to the same destination can take different routes in the network IP ensures that a ... set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
GauravRajpurohit
answered
in
Computer Networks
Mar 12
by
GauravRajpurohit
12.6k
views
gatecse-2003
computer-networks
ip-addressing
normal
0
votes
1
answer
13
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200- kbps bandwidth. Find the throughput if the system (all stations together) produces a. 1000 frames per second b. 500 frames per second c. 250 frames per second
Bharat Bhushan
answered
in
Computer Networks
Mar 11
by
Bharat Bhushan
119
views
computer-networks
0
votes
2
answers
14
Which of the following is the broadcast address for a Class B network ID using the default subnetmask? (a) 172.16.10.255 (b) 255.255.255.255 (c) 172.16.255.255 (d) 172.255.255.255
Bharat Bhushan
answered
in
Computer Networks
Mar 10
by
Bharat Bhushan
195
views
computer-networks
subnetting
normal
0
votes
2
answers
15
An organization is requires 8 subnet each having at least 63 hosts. If the allotted IP address is 193.1.1.0 determine the class of IP address, default mask, subnet mask, number of subnet id bits, and the broadcast address of the subnets.
Bharat Bhushan
answered
in
Computer Networks
Mar 10
by
Bharat Bhushan
430
views
computer-networks
subnetting
0
votes
2
answers
16
Suppose an ISP owns the block of addresses of the form 131.210.16.0/21. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. i. What are the prefixes (of form a.b.c.d/x) for the four subnets? ii. What is the number of host address that can be supported per subnet?
Bharat Bhushan
answered
in
Computer Networks
Mar 10
by
Bharat Bhushan
312
views
computer-networks
subnetting
numerical-answers
0
votes
1
answer
17
Which of the following describe the DHCP Discover message? 1) It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. I uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer 2 destination address. [A]. 1 only [B]. 1 and 2 @ [C]. 3 and 4 [D]. 4 only
Bharat Bhushan
answered
in
Computer Networks
Mar 9
by
Bharat Bhushan
156
views
udp
transport-layer
tcp
0
votes
1
answer
18
Get command is found in a) tcp/ip b) ftp c) mac d) asp
Bharat Bhushan
answered
in
Computer Networks
Mar 9
by
Bharat Bhushan
86
views
tcp
computer-networks
1
vote
1
answer
19
DRDO CSE 2022 Paper 2 | Question: 19
Both the payload and $2\text{D}$ (even) parity bits are shown below. Some of these bit(s) have been flipped. Indicate the row and column of the flipped bit(s) in format (col, row); e.g., top left bit is $(0,0)$. \[\begin{array}{l} 1000 \; 0001 \; 1111 \; ... 0100 \; 0011 \; 0011 \text { | } 0 \\ \overline{0110 \;0111\; 0101\; 1001 \text { | } 1} \\ \end{array}\]
GauravRajpurohit
answered
in
Computer Networks
Mar 6
by
GauravRajpurohit
110
views
drdocse-2022-paper2
computer-networks
crc-polynomial
3-marks
descriptive
0
votes
1
answer
20
Computer Networks - Andrew Tanenbaum - The Data Link Layer
Consider a bidirectional link that uses Selective Repeat ARQ with a window size of N = 7. Suppose that all frames are one unit long and use a time-out value of 2. Assume that the one-way propagation delay is 0.5 time unit, the ... A sends 8 frame in a row, starting at t = 0. All frames are received correctly, except frame 3 is lost.
Bharat Bhushan
answered
in
Computer Networks
Mar 4
by
Bharat Bhushan
212
views
data-link-layer
selective-repeat
0
votes
3
answers
21
How segmentation and fragmentation is different in computer networks
How segmentation and fragmentation are different in computer networks Please help!
Bharat Bhushan
answered
in
Computer Networks
Mar 4
by
Bharat Bhushan
569
views
computer-networks
0
votes
1
answer
22
Computer Networks
Question From PW Given :8 th answer is d : 9 th answer is b (Answer seems to be incorrect (I don’t know exactly)).
GauravRajpurohit
answered
in
Computer Networks
Mar 3
by
GauravRajpurohit
85
views
computer-networks
test-series
3
votes
3
answers
23
NIELIT 2018-68
_____ IP address can be used in WAN $256.0.0.1$ $172.16.0.10$ $15.1.5.6$ $127.256.0.1$
dutta18
answered
in
Computer Networks
Mar 3
by
dutta18
5.6k
views
nielit-2018
computer-networks
ip-addressing
4
votes
4
answers
24
GATE CSE 2023 | Question: 7
Suppose two hosts are connected by a point-to-point link and they are configured to use $\textsf{Stop-and-Wait}$ protocol for reliable data transfer. Identify in which one of the following scenarios, the utilization of the ... Longer link length and higher transmission rate Shorter link length and lower transmission rate Shorter link length and higher transmission rate
Saiteja529
answered
in
Computer Networks
Feb 17
by
Saiteja529
2.3k
views
gatecse-2023
computer-networks
stop-and-wait
1-mark
1
vote
3
answers
25
GATE CSE 2023 | Question: 55
The forwarding table of a router is shown below. ... to a destination address $200.150 .68 .118$ arrives at the router. It will be forwarded to the interface with $\text{ID}$ __________.
Hira Thakur
answered
in
Computer Networks
Feb 16
by
Hira Thakur
1.5k
views
gatecse-2023
computer-networks
subnetting
numerical-answers
2-marks
2
votes
1
answer
26
GATE CSE 2023 | Question: 15
Which of the following statements is/are $\text{INCORRECT}$ about the $\textsf{OSPF (Open Shortest Path First)}$ routing protocol used in the Internet? $\textsf{OSPF}$ implements Bellman-Ford algorithm to find shortest paths. $\textsf{OSPF}$ ... path routing. $\textsf{OSPF}$ is used as an inter-domain routing protocol. $\textsf{OSPF}$ implements hierarchical routing.
himanshu2021
answered
in
Computer Networks
Feb 15
by
himanshu2021
1.2k
views
gatecse-2023
computer-networks
routing
multiple-selects
1-mark
1
vote
2
answers
27
GATE CSE 2023 | Question: 40
Suppose you are asked to design a new reliable byte-stream transport protocol like $\text{TCP}.$ This protocol, named $\textsf{myTCP}$, runs over a $100 \mathrm{~Mbps}$ network with Round Trip Time of $150$ ... lengths of the Sequence Number field in the $\textsf{myTCP}$ header? $30$ bits $32$ bits $34$ bits $36$ bits
Shoto
answered
in
Computer Networks
Feb 15
by
Shoto
1.2k
views
gatecse-2023
computer-networks
tcp
multiple-selects
2-marks
0
votes
1
answer
28
Networking
Consider the following Statements Statement 1: POP3 server maintains state information between a user agent and the mail server, during a POP3 session. Statement 2: POP3 server does not maintain state information across sessions. 1 Statement 1 is true. 2 Statement 2 is true. 3 Statement 1 is false 4 Statement 2 is false
Sunit Kumar
answered
in
Computer Networks
Feb 11
by
Sunit Kumar
60
views
computer-networks
0
votes
2
answers
29
Peterson Davie 2.18a
Suppose we want to transmit the message $11100011$ and protect it from errors using the CRC polynomial $x^{3}+1$. (a) Use polynomial long division to determine the message that should be transmitted.
GauravRajpurohit
answered
in
Computer Networks
Feb 11
by
GauravRajpurohit
276
views
peterson-davie
0
votes
1
answer
30
pls can u aswer this question
Suppose a source device need to send an IP message with 21,000 bytes. Suppose that a local connection has a MTU of 576 bytes. How many fragments are required to send the message over the network?
Shoto
answered
in
Computer Networks
Feb 10
by
Shoto
156
views
computer-networks
ip-addressing
3
votes
1
answer
31
GATE CSE 2023 | Memory Based Question: 46
A link is point-to-point connected and using stop and wait protocol, which of the following correctly states lowest link utilization. Lower link length and lower transmission rate. Lower link length and higher transmission rate. Higher link length and lower transmission rate. Higher link length and higher transmission rate.
closed
khushitshah
answered
in
Computer Networks
Feb 9
by
khushitshah
676
views
memorybased-gatecse2023
goclasses
computer-networks
stop-and-wait
1
vote
1
answer
32
GATE CSE 2023 | Memory Based Question: 48
3 DNS iterative queries each has RTT time. One HTTP server sending 10 small objects, HTTP server to clieent also takes RTT time. 9 in nonpersistent with 5 parallel connection 7 in non persistent with 5 parallel connection 5 in persistent pipelined 6 in persistent pipelined
closed
kathan Mistry
answered
in
Computer Networks
Feb 7
by
kathan Mistry
821
views
memorybased-gatecse2023
goclasses
computer-networks
stop-and-wait
1
vote
0
answers
33
GATE CSE 2023 | Memory Based Question: 47
Which of the following is incorrect in the case of OSPF protocol? OSPF uses the Dijkstra algorithm shortest path algorithm to implement the least cost path routing OSPF uses the Bellman-Ford algorithm to determine the shortest path. OSPF uses an inter-domain routing protocol OSPF employs hierarchical routing
closed
GO Classes
asked
in
Computer Networks
Feb 6
by
GO Classes
524
views
memorybased-gatecse2023
goclasses
computer-networks
link-state-routing
multiple-selects
2
votes
0
answers
34
MADEEASY
Why B is wrong?
DAWID15
asked
in
Computer Networks
Feb 1
by
DAWID15
138
views
computer-networks
subnetting
made-easy-test-series
0
votes
1
answer
35
Testbook CN question
Which of the following statement is/are incorrect about the Routing Information Protocol (RIP) protocol and Open Shortest Path First (OSPF) protocol? RIP packets are sent using TCP. OSPF packets are sent using TCP. RIP is an Network Layer protocol OSPF is an Application Layer protocol
amruta_solves
answered
in
Computer Networks
Jan 31
by
amruta_solves
108
views
computer-networks
network-layer
application-layer
shortest-path
21
votes
5
answers
36
GATE CSE 2022 | Question: 45
Consider routing table of an organization's router shown below: ... of the subnets in the routing table? $12.20.164.0/20$ $12.20.164.0/22$ $12.20.164.0/21$ $12.20.168.0/22$
Arjit Gupta
answered
in
Computer Networks
Jan 31
by
Arjit Gupta
7.9k
views
gatecse-2022
computer-networks
subnetting
multiple-selects
2-marks
0
votes
1
answer
37
TCP question
Consider the slow start phase for a congestion control in a TCP connection. Initially, the window size is 4 MSS and the threshold is 36 MSS. After which transmission window size reached the threshold limit? 3 4 5 7
Pranavpurkar
answered
in
Computer Networks
Jan 31
by
Pranavpurkar
51
views
computer-networks
tcp
0
votes
3
answers
38
In stop and wait protocol , every 4th packet is lost.Find number of packets ?
In stop and wait protocol , every 4th packet is lost.If 8 packets are being sent, Find number of packets ? Answer given is : 10 Shouldn't Acknowledgements considered as well , in such case answer should be 18 , Right ?
Sahil_Lather
answered
in
Computer Networks
Jan 27
by
Sahil_Lather
2.9k
views
0
votes
0
answers
39
Tcp questions
Consider a client has established TCP connection with a server and sending data. The propagation delay is 5 ms and there are no timeouts and errors during transmission. The size of the receiver advertised window is 128 KB, the slow-start threshold at the client is 64 ... = 10 ms. What is the size of the congestion window (in KB) at time 90 ms after all acknowledgements are processed?
Sahil_Lather
asked
in
Computer Networks
Jan 27
by
Sahil_Lather
85
views
computer-networks
tcp
0
votes
0
answers
40
RTO in TCP question
A host sends two packets and receives two acknowledgments. The time is shown as hour:minute:seconds. Segment 1 was sent at 0:0:00. Segment 2 was sent at 0:0:07. ACK for segments 1 and 2 received at 0:0:09. Calculate the value of RTO.
Sahil_Lather
asked
in
Computer Networks
Jan 27
by
Sahil_Lather
60
views
computer-networks
tcp
To see more, click for all the
questions in this category
.
Subscribe to GATE CSE 2023 Test Series
Subscribe to GO Classes for GATE CSE 2023
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Central Pollution Control Board CPCB Various Post Recruitment 2023
MP Rajya Sahkari Apex Bank Various Post Recruitment 2023
NITIE MUMBAI throgh GATE
PGCIL recruitment 2023 – Apply Online For 138 Posts through GATE
Admission guidance for GATE CSE 2023
Subjects
All categories
General Aptitude
(2.6k)
Engineering Mathematics
(9.4k)
Digital Logic
(3.3k)
Programming and DS
(5.9k)
Algorithms
(4.6k)
Theory of Computation
(6.7k)
Compiler Design
(2.3k)
Operating System
(5.0k)
Databases
(4.6k)
CO and Architecture
(3.8k)
Computer Networks
(4.7k)
Non GATE
(1.3k)
Others
(2.5k)
Admissions
(655)
Exam Queries
(847)
Tier 1 Placement Questions
(17)
Job Queries
(77)
Projects
(9)
Unknown Category
(866)
Recent questions and answers in Computer Networks
Recent Blog Comments
Please see the updated link.
Unfortunately there won't be a hardcopy coming...
this book is not available on amazon now, i want...
Yes
Hi! @AnkitMazumder14 bhaiya,Is python...