Web Page

Concept of layering.OSI and TCP/IP Protocol Stacks; Basics of packet, circuit and virtual circuit-switching; Data link layer: framing, error detection, Medium Access Control, Ethernet bridging; Routing protocols: shortest path, flooding, distance vector and link state routing; Fragmentation and IP addressing, IPv4, CIDR notation, Basics of IP support protocols (ARP, DHCP, ICMP), Network Address Translation (NAT); Transport layer: flow control and congestion controlUDPTCP, sockets; Application layer protocols: DNS, SMTP, HTTP, FTPEmail.

.$$\scriptsize{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}& \textbf{2024-1} & \textbf{2024-2} & \textbf{2023}&  \textbf{2022} & \textbf{2021-1}&\textbf{2021-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count} & 3&3&2& 2 &1&1&1&2&3
\\\hline\textbf{2 Marks Count} & 3&3&3& 4 &4&3&3&3.33&4
\\\hline\textbf{Total Marks} & 9&9&8& 10 &9&7&\bf{7}&\bf{8.67}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

#1581
162
views
0 answers
0 votes
macroscopic description of TCP throughput is in syllabus or not???
#1582
580
views
0 answers
0 votes
What is the value of ssthreshold at the 18th transmission round? ANY WHY PLEASE EXPLAINDuring what transmission round is the 70th segment sent? Assuming a packet ... what will be the values of the congesion-window size and of ssthreshold?
#1583
350
views
1 answers
0 votes
PLEASE FRAME AN EXAMPLE TO EXPLAIN THE CASES MENTIONED IN THIS The third major event that must be handled by the TCP sender is the arrival of anacknowledgment segment ... MSS in size, and that data transfer is in one direction only. */
#1584
318
views
0 answers
0 votes
Alternating Bit Protocol work IS IN SYLLABUS??
#1585
574
views
0 answers
0 votes
I AM NOT GETTING THE UNDERLINED PART ...........THAT IF ACKS ARE NOT RECEIVED THAN HOW DOES THE SENDER WINDOW SLIDE....Consider the Go-Back-N (GBN) protocol with ... senders window is of size 3 and begins somewhere in the range [K −N ,1 ].
#1586
243
views
0 answers
0 votes
https://gateoverflow.in/66837/made-easy-2017 in this question answer for (non persistent - persistant )will be 16 -10 =6 or 18-10=8 please check???????
#1587
460
views
1 answers
0 votes
In slow start, a sender doubles its window size every RTT if all sent packets were acknowledged.IT IS GIVEN AS TRUE BUT WHAT IF THE THRESHOLD OCCURS THEN IT WILL ... LIMIT THEN IT INCREASES ACCORDINGLY ..SO I THINK IT SHOULD BE FASE ?????
#1588
2.5k
views
2 answers
8 votes
If flooding is used to send packets from A to E, then the total number of packets generated in the above network when hop count for A to E is 3 are ________.ANSWER IS ... HOP COUNT FOR A TO E BECZ HERE IN 14 WE COUNTED THE HOP OF LENGTH...
#1589
1.3k
views
1 answers
1 votes
<p>Ramesh buy a new laptop, he connected it to Ethernet and after sometime he wishes to surf the internet, so laptop send a DNS request. What will be the sequence of header packet ... ip tcp dns</p> <p>udp dns Ethernet ip</p> <p>&nbsp;</p>
#1590
453
views
0 answers
0 votes
<p>: In IPv4 Checksum is used as error detecting technique, where as in IPv6 CRC is used.</p> <p>it is true for ipv4 but for ipv6 I have a doubt that ... where in ipv6 header crc is present nd why they are taking case of explicit??</p>
#1591
382
views
2 answers
0 votes
Suppose that the last sampleRTT in a TCP connection is equal to 1 second. Then timeout for the connection will necessarily be set to a value >= 1 second.please also give reason
#1592
889
views
1 answers
0 votes
Ques. Consider the following statements:S1 : Token bucket shapes bursty traffic into fixed-rate traffic by averaging the data rate.S2 : Leaky buckets are more restrictive ... false?A. Only S2B. Only S1C. Both S2 and S3D. All of these
#1593
481
views
0 answers
0 votes
Ques. Which of the following is incorrect?A. In circuit switched network, switches require connection establishment and teardown phases, where as in ... a circuit switched network may prevent some sender from starting new conversation.
#1594
533
views
0 answers
0 votes
its written that The link layer checksum protected the packets only while they traveled across the link and not while they were inside the router. Thus, ... corrupted inside a router(other than the case of crash and vulnerable attacks)?
#1595
339
views
0 answers
0 votes
Suppose that host A is connected to a router R 1, R 1 is connected to another router, R 2, and R 2 is connected to host B. Suppose that a TCP message ... R2-B can support a maximum frame size of 512 bytes including a 12-byte frame header.
#1596
378
views
0 answers
0 votes
Data are transmitted over the Internet in datagrams, which are structured blocks of bits. Each datagram contains header information organized into a maximum of 14 ... length is 20 octets and the total length is as long as possible?
#1597
573
views
2 answers
0 votes
SUPPOSE WE ARE GIVEN TWO BITS FOR SUBNET THEN WHICH ONE WILL BE THE THIRD SUBNET 10 OR 11
#1598
15.7k
views
3 answers
3 votes
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system (all stations put together) produces 250 frames per second:49368149151
#1599
3.6k
views
1 answers
0 votes
The period of a signal is 100 ms. Its frequency is ____$100^3$ Hertz$10^{-2}$ KHz$10^{-3}$ KHz$10^5$ Hertz
#1600
3.1k
views
1 answers
0 votes
The dotted-decimal notation of the following IPV4 address in binary notation is ____10000001 00001011 00001011 11101111111.56.45.239129.11.10.238129.11.11.239111.56.11.239