search
Log In

Web Page

Concept of layering. LAN technologies (Ethernet).Flow and error control techniques, Swithing. IPv4/ IPv6, Routers and routing algorithms (distance vector, link state). TCP/UDP and Sockets, Congestion control. Application layer protocols (DNS, SMTP, POP, FTP, HTTP). Basics of Wi-Fi. Network security: authentication, basics of public key and private key cryptography, digital signatures and certificates, Firewalls.

$$\small{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count}&1&3&2&3&2&3&1&2.3&3
\\\hline\textbf{2 Marks Count}&4&2&3&1&4&3&1&2.8&4
\\\hline\textbf{Total Marks}&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

1 vote
5 answers
1
Given a mask, M=255.255.255.248. How many subnet bits are required for given mask M? (A) 2 (B) 3 (C) 4 (D)5
asked Jul 18 in Computer Networks Sanjay Sharma 446 views
0 votes
1 answer
2
0 votes
1 answer
4
What are the primary characteristics that distinguish a cell from a packet? cells are generally smaller that packets cells do not incorporate physical address all cells have the same fixed length packet cannot be switched
asked Apr 2 in Computer Networks Lakshman Patel RJIT 44 views
0 votes
1 answer
5
0 votes
2 answers
7
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
asked Apr 1 in Computer Networks Lakshman Patel RJIT 174 views
0 votes
1 answer
8
The address of a class $B$ Host is to be split into subnets with a $3$-bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet? $8$ subnets and $262142$ hosts $6$ subnets and $262142$ hosts $6$ subnets and $1022$ hosts $8$ subnets and $1024$ hosts
asked Apr 1 in Computer Networks Lakshman Patel RJIT 111 views
0 votes
2 answers
13
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
asked Apr 1 in Computer Networks Lakshman Patel RJIT 81 views
0 votes
1 answer
14
0 votes
2 answers
15
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
asked Mar 31 in Computer Networks Lakshman Patel RJIT 241 views
0 votes
1 answer
16
0 votes
1 answer
18
0 votes
2 answers
19
...