Web Page

$$\small{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline \textbf{Year}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum} \\\hline\textbf{1 Mark Count}&1&3&2&3&2&3&1&2.3&3 \\\hline\textbf{2 Marks Count}&4&2&3&1&4&3&1&2.8&4 \\\hline\textbf{Total Marks}&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline \end{array}}}$$

# Recent questions in Computer Networks

1 vote
1
Consider the three-way handshake mechanism followed during $\text{TCP}$ connection establishment between hosts $P$ and $Q$. Let $X$ and $Y$ be two random $32$-bit starting sequence numbers chosen by $P$ and $Q$ respectively. Suppose $P$ sends a $\text{TCP}$ connection request message to $Q$ with a ... $\text{SEQ}$ number $=Y$, $\text{ACK}$ bit $=1$, $\text{ACK}$ number $=X$, $\text{FIN}$ bit $=0$
2
Consider the cyclic redundancy check $\text{(CRC)}$ based error detecting scheme having the generator polynomial $X^3+X+1$. Suppose the message $m_4m_3m_2m_1m_0=11000$ is to be transmitted. Check bits $c_2c_1c_0$ are appended at the end of the message by the ... bit string is denoted by $m_4m_3m_2m_1m_0c_2c_1c_0$. The value of the checkbit sequence $c_2c_1c_0$ is $101$ $110$ $100$ $111$
1 vote
3
Consider a computer network using the distance vector routing algorithm in its network layer. The partial topology of the network is shown below. The objective is to find the shortest-cost path from the router $R$ to routers $P$ and $Q$. Assume that $R$ does not initially know the shortest routes ... for a packet from $R$ to $P$ is $Y$ The next hop router for a packet from $R$ to $Q$ is $Z$
1 vote
4
Consider a network using the pure $\text{ALOHA}$ medium access control protocol, where each frame is of length $1,000$ bits. The channel transmission rate is $1$ Mbps ($=10^6$ bits per second). The aggregate number of transmissions across all ... as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is ______________
5
Consider the following two statements. $S_1$: Destination $\text{MAC}$ address of an $\text{ARP}$ reply is a broadcast address. $S_2$: Destination $\text{MAC}$ address of an $\text{ARP}$ request is a broadcast address. Which one of the following choices is correct? Both $S_1$ and $S_2$ are true $S_1$ is true and $S_2$ is false $S_1$ is false and $S_2$ is true Both $S_1$ and $S_2$ are false
6
Assume that a $12$-bit Hamming codeword consisting of $8$-bit data and $4$ check bits is $d_8d_7d_6d_5c_8d_4d_4d_3d_2c_4d_1c_2c_1$ ... $0$ $x$ is $0$ and $y$ is $1$ $x$ is $1$ and $y$ is $0$ $x$ is $1$ and $y$ is $1$
1 vote
7
A $\text{TCP}$ server application is programmed to listen on port number $P$ on host $S$. A $\text{TCP}$ client is connected to the $\text{TCP}$ server over the network. Consider that while the $\text{TCP}$ connection was active, the server machine $S$ crashed ... it will receive a $\text{RST}$ segment If the client sends a packet after the server reboot, it will receive a $\text{FIN}$ segment
8
Consider two hosts $P$ and $Q$ connected through a router $R$. The maximum transfer unit $\text{(MTU)}$ value of the link between $P$ and $R$ is $1500$ bytes, and between $R$ and $Q$ is $820$ bytes. A $TCP$ segment of size $1400$ bytes was ... lost, $P$ is required to resend the whole $\text{TCP}$ segment. $\text{TCP}$ destination port can be determined by analysing only the second fragment.
9
Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following: The time taken for processing the data frame by the receiver is negligible. The time taken for processing the ... of the number of frames, (rounded to the nearest integer) needed to achieve a link utilization of $50\%$ is_____________.
1 vote
10
Consider a code with only four valid code words: $0000000000$, $0000011111$, $1111100000$, and $1111111111$. This code has distance $5$. If the code word arrived is $0000000111$ then the original code word must be _______ $0000011111$ $0000000000$ $1111100000$ $1111111111$
11
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
12
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for next frame are called as ______ Simplex protocols Unrestricted simplex protocols Simplex stop and wait protocols Restricted simplex protocols
13
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for distinct messages Choose the correct ... options given below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
14
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regards, which of the following are true? POP has two modes, Delete mode and keep In Delete mode, mail is deleted from mail box after each retrival In Delete mode, mail is deleted from mail box before each ... $(e)$ only $(a)$, $(b)$, $(c)$ and $(d)$ only $(a)$, $(b)$ and $(e)$ only
1 vote
15
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of Source IP address Destination IP address TCP Source Port UDP Source Port TCP Destination Port Choose the correct answer from the options given below: $(a), (b)$ and $(c)$ only $(b)$ and $(e)$ only $(c)$ and $(d)$ only $(a), (b), (c), (d)$ and $(e)$ only
16
Match $\text{List I}$ with $\text{List II}$ ... $A-III, B-IV, C-II, D-I$ $A-II, B-III, C-IV, D-I$ $A-III, B-I, C-IV, D-II$
17
Given below are two statements: Statement $I$: The laws of nature put two fundamental limits on data rate of a channel. The H.Nyquist limit restricts the number of independent samples per second to twice the band-width in a Noiseless channel Statement $II$: Shannon's major ... $II$ are false Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above statements, choose the correct answer ... $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true