Web Page

$$\small{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline \textbf{Year}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum} \\\hline\textbf{1 Mark Count}&1&3&2&3&2&3&1&2.3&3 \\\hline\textbf{2 Marks Count}&4&2&3&1&4&3&1&2.8&4 \\\hline\textbf{Total Marks}&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline \end{array}}}$$

# Recent questions in Computer Networks

1 vote
1
Given a mask, M=255.255.255.248. How many subnet bits are required for given mask M? (A) 2 (B) 3 (C) 4 (D)5
2
Start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication
3
Repeaters function in Physical layer Data link layer Network layer Both (A) and (B)
4
What are the primary characteristics that distinguish a cell from a packet? cells are generally smaller that packets cells do not incorporate physical address all cells have the same fixed length packet cannot be switched
5
In networking terminology UTP means Unshielded Twisted pair Ubiquitious Teflon port Uniformly Terminating port Unshielded T- connector port
6
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals? $5$ $6$ $7$ $46$
7
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
8
The address of a class $B$ Host is to be split into subnets with a $3$-bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet? $8$ subnets and $262142$ hosts $6$ subnets and $262142$ hosts $6$ subnets and $1022$ hosts $8$ subnets and $1024$ hosts
9
The maximum data rate of a channel of $3000$-Hz bandwidth and SNR of $30$ db is $60000$ $15000$ $30000$ $3000$
10
Which of the following is minimum error code? Octal Code Binary Code Gray Code Excess-$3$ Code
11
If the original size of data is $40$ then after adding error detection redundancy bit the size of data length is $26$ $36$ $46$ $56$
12
Which of the following would not be specified in a communication protocol? Header contents Trailer contents Error Checking Data content of message
13
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
14
If the channel is band limited to $6\;kHz$ and signal to noise ratio is $16,$ what would be the capacity of channel? $16.15$ kbps $23.24$ kbps $40.12$ kbps $24.74$ kbps
15
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
16
Closed - Loop control mechanism try to : Remove congestion after it occurs Remove congestion after sometime Prevent congestion before it occurs Prevent congestion before sending packets
17
In classless addressing, there are no classes but addresses are still granted in : Codes Blocks IPs Sizes
Which multiple access technique is used by $\text{IEEE } 802.11$ standard for wireless $\text{LAN}$ ? $\text{CDMA}$ $\text{CSMA/CA}$ $\text{ALOHA}$ None of the options
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
A subnet mask in class $C$ can have _____________ $1$’s with the remaining bits $0$’s. $10$ $24$ $12$ $7$