Web Page

Concept of layering.OSI and TCP/IP Protocol Stacks; Basics of packet, circuit and virtual circuit-switching; Data link layer: framing, error detection, Medium Access Control, Ethernet bridging; Routing protocols: shortest path, flooding, distance vector and link state routing; Fragmentation and IP addressing, IPv4, CIDR notation, Basics of IP support protocols (ARP, DHCP, ICMP), Network Address Translation (NAT); Transport layer: flow control and congestion controlUDPTCP, sockets; Application layer protocols: DNS, SMTP, HTTP, FTPEmail.

.$$\scriptsize{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}& \textbf{2022} & \textbf{2021-1}&\textbf{2021-2}&\textbf{2020}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count} & 2 &1&1&2&1&3&2&3&2&3&1&2&3
\\\hline\textbf{2 Marks Count} & 4 &4&3&2&4&2&3&1&4&3&1&3&4
\\\hline\textbf{Total Marks} & 10 &9&7&6&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline
\end{array}}}$$

Most viewed questions in Computer Networks

2 votes
1 answer
4111
Asymmetric key cryptrography and digital signature both use the private and public keys of the sender. explain is it true or false
2 votes
0 answers
4113
why a single secret key cannot be used by the sender to sign multiple documents for multiple receiver.please explain
0 votes
0 answers
4114
1 votes
1 answer
4115
2 votes
0 answers
4116
The data link layer provides the host or Mac address. Network layer comes before data link layer at the sender side of OSI reference model. Then how can network layer can...
0 votes
1 answer
4117
What is the meaning of processing time at source and destination? Under processing time what task happens?
0 votes
1 answer
4118
100 Base T refers to(a) Fibre connectivity(b) BNC connectors(c) SONET(d) Twisted pair
0 votes
0 answers
4119
1 votes
1 answer
4120
$$ \begin{array}{|c|c|c|} \hline a & \text{Repeater} & 1 & \text{physical layer} \\ \hline b & \text{Router} & 2 & \text{data link} \\ \hline c & \text{Gateway} & 3 & \te...
1 votes
0 answers
4121
https://gateoverflow.in/?qa=blob&qa_blobid=18152128369856966495
1 votes
1 answer
4122
does GO BACK N ARQ supports individual ACK
0 votes
0 answers
4123
0 votes
0 answers
4124
0 votes
0 answers
4125
what does single slotted aloha means?
1 votes
0 answers
4126
0 votes
0 answers
4128
A leaky Bucket with capacity 200MB is at host network interface. The data rate on the network is 2MBps. If the Host has 450 MB to send on the network and it sends data in...
0 votes
1 answer
4130
Given bandwidth is 128 Gbps. (use giga has 2 power 30), the total time for a complete wrap-around of sequence numbers in TCP