search
Log In

Web Page

Concept of layering. LAN technologies (Ethernet).Flow and error control techniques, Swithing. IPv4/ IPv6, Routers and routing algorithms (distance vector, link state). TCP/UDP and Sockets, Congestion control. Application layer protocols (DNS, SMTP, POP, FTP, HTTP). Basics of Wi-Fi. Network security: authentication, basics of public key and private key cryptography, digital signatures and certificates, Firewalls.

$$\small{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count}&1&3&2&3&2&3&1&2.3&3
\\\hline\textbf{2 Marks Count}&4&2&3&1&4&3&1&2.8&4
\\\hline\textbf{Total Marks}&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

0 votes
0 answers
2
A seven-story office building has 15 adjacent offices per floor. Each office contains a wall socket for a terminal in the front wall, so the sockets form a rectangular grid in the vertical plane, with a separation of 4 m between sockets, both horizontally and vertically. Assuming ... to connect all sockets using (a) A star configuration with a single router in the middle? (b) A classic 802.3 LAN?
asked Mar 15, 2019 in Computer Networks ajaysoni1924 35 views
0 votes
1 answer
3
Consider five wireless stations, A, B, C, D, and E. Station A can communicate with all other stations. B can communicate with A, C and E. C can communicate with A, B and D. D can communicate with A, C and E. E can communicate A, D and B. (a) When ... possible? (b) When B is sending to A, what other communications are possible? (c) When B is sending to C, what other communications are possible?
asked Mar 15, 2019 in Computer Networks ajaysoni1924 92 views
0 votes
0 answers
4
Frames arrive randomly at a 100-Mbps channel for transmission. If the channel is busy when a frame arrives, it waits its turn in a queue. Frame length is exponentially distributed with a mean of 10,000 bits/frame. For each of the following frame arrival rates, give the ... frame, including both queueing time and transmission time. (a) 90 frames/sec. (b) 900 frames/sec. (c) 9000 frames/sec.
asked Mar 15, 2019 in Computer Networks ajaysoni1924 92 views
0 votes
1 answer
5
0 votes
2 answers
6
What is the length of a contention slot in CSMA/CD for (a) a 2-km twin-lead cable (signal propagation speed is 82% of the signal propagation speed in vacuum)?, and (b) a 40-km multimode fiber optic cable (signal propagation speed is 65% of the signal propagation speed in vacuum)?
asked Mar 15, 2019 in Computer Networks ajaysoni1924 619 views
0 votes
0 answers
7
0 votes
1 answer
8
A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec. (a) What is the chance of success on the first attempt? (b) What is the probability of exactly k collisions and then a success? (c) What is the expected number of transmission attempts needed?
asked Mar 15, 2019 in Computer Networks ajaysoni1924 145 views
0 votes
1 answer
10
A group of N stations share a 56-kbps pure ALOHA channel. Each station outputs a 1000-bit frame on average once every 100 sec, even if the previous one has not yet been sent (e.g., the stations can buffer outgoing frames). What is the maximum value of N?
asked Mar 15, 2019 in Computer Networks ajaysoni1924 205 views
0 votes
1 answer
11
The round trip delay between X and Y is given as 60 ms and bottle neck bandwidth of link between X and Y is 512 KBps. What is the optimal window size (in packets) if the packet size is 64 bytes and channel is full duplex. As it is mentioned that channel is full duplex , so will it be changing the approach to solve the question?
asked Mar 14, 2019 in Computer Networks shreys02 73 views
0 votes
0 answers
12
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third party which leases it ... on the other hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
asked Mar 11, 2019 in Computer Networks s_dr_13 63 views
0 votes
0 answers
13
Why Back Off algorithm is also sometimes referred as binary exponential Back off algorithm ?? Correct if there is flaw in my assumption : It is called exponential because it reduces the probability of collisions on retransmission exponentially and also it is called ... ANOTHER QUESTION : - IF IT IS APPLICABLE FOR TWO HOSTS THEN WE'RE ABLE TO DEAL WITH MUTIPLE HOSTS IN PRACTICAL SCENARIO
asked Mar 11, 2019 in Computer Networks s_dr_13 68 views
0 votes
0 answers
14
Pick the true statements among the following Circuit switching is stored and forward technique Packet switching is faster as compared to circuit switching Packet switching wastes less resources as compare to circuit switching Packet switching is not store and forward technique Only 2nd 2nd and 3rd both 1st and 4th both all are correct
asked Mar 10, 2019 in Computer Networks himgta 35 views
1 vote
1 answer
15
in selective repeat(SR) protocol the sender window size is K frames. What is the number of sequence bits required for the communication to take place? $log_2$(k+1) 1+$log_2$k 1+$log_2$(2k) None
asked Mar 10, 2019 in Computer Networks himgta 70 views
2 votes
0 answers
16
Consider the following information HOST IP ADDRESS X : 192.168.1.97 Y : 192.168.1.80 And there are two routers R1 and R2. Host X is connected with these routers and routers are connected with other host Y where Router R1 has IP addresses 192.168.1.135 and ... network is 255.255.255.224. Given the information above, how many distinct subnets are guaranteed to already exist in the network? 3 1 4 5
asked Mar 7, 2019 in Computer Networks saurav raghaw 127 views
0 votes
1 answer
17
What are the important topics in WIFI : It would be very helpful if some one answered this thank you:)
asked Mar 7, 2019 in Computer Networks Nandkishor3939 283 views
0 votes
0 answers
18
Can anyone please explain why do we need x+1 to be a factor of G(x).ie generator polynomial to detect odd no of bit errors ??
asked Mar 6, 2019 in Computer Networks s_dr_13 48 views
1 vote
1 answer
19
In an Internet if we change LAN technology to new one,which layer in TCP/IP protocol suite need to be changed ? Please explain it. It should be either TL or NL please explain ?
asked Feb 26, 2019 in Computer Networks Aks9639 262 views
0 votes
0 answers
20
(Public Key Notation) Alice and Bob are spouses and each making their own wills. They want to send a copy to their attorney Charlie that only Charlie can read and that shows Alice’s will signed by Alice and seen by Bob and Bob’s will signed by Bob and seen by Alice. Using the notation in the slides. What would be the notation of a message that accomplishes this task?
asked Feb 23, 2019 in Computer Networks manisha11 120 views
...