Web Page

Concept of layering.OSI and TCP/IP Protocol Stacks; Basics of packet, circuit and virtual circuit-switching; Data link layer: framing, error detection, Medium Access Control, Ethernet bridging; Routing protocols: shortest path, flooding, distance vector and link state routing; Fragmentation and IP addressing, IPv4, CIDR notation, Basics of IP support protocols (ARP, DHCP, ICMP), Network Address Translation (NAT); Transport layer: flow control and congestion controlUDPTCP, sockets; Application layer protocols: DNS, SMTP, HTTP, FTPEmail.

.$$\scriptsize{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}& \textbf{2024-1} & \textbf{2024-2} & \textbf{2023}&  \textbf{2022} & \textbf{2021-1}&\textbf{2021-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count} & 3&3&2& 2 &1&1&1&2&3
\\\hline\textbf{2 Marks Count} & 3&3&3& 4 &4&3&3&3.33&4
\\\hline\textbf{Total Marks} & 9&9&8& 10 &9&7&\bf{7}&\bf{8.67}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

#4381
6.3k
views
2 answers
1 votes
In class C , if subnet mask is 255.255.255.224 then calculates number of subnet? (A) 6 (B) 8 (C) 4 (D) None of the Above
#4382
446
views
1 answers
0 votes
#4383
520
views
1 answers
0 votes
#4384
10.1k
views
4 answers
2 votes
An organization is granted the block 150.36.0.0/16.The administrator wants to create 512 subnets. Find number of addresses in each subnet. Find the first and last addresses in subnet ... 150.36.0.126 (D) 126, 150.36.0.129 and 150.36.0.254.
#4385
8.0k
views
3 answers
3 votes
IPv6 does not support which of the following addressing modes?a)Unicast addressingb)Multicast addressingc)Broadcast addressingd)Anycast addressing
#4386
6.8k
views
3 answers
4 votes
Which of the following is not a valid multicast MAC address?$\textsf{01:00:5E:00:00:00}$\textsf{01:00:5E:00:00:FF}$\textsf{01:00:5E:00:FF:FF}$\textsf{01:00:5E:FF:FF:FF}$
#4387
8.1k
views
3 answers
5 votes
An organization is granted the block $130.34.12.64/26.$ It needs to have $4$ subnets. Which of the following is not an address of this organization?$130.34.12.124$130.34.12.89$130.34.12.70$130.34.12.132$
#4388
5.3k
views
4 answers
2 votes
A supernet has a first address of $205.16.32.0$ and a supernet mask of $255.255.248.0.$ A router receives $4$ packets with the following destination addresses. Which ... $205.17.32.76$205.16.31.10$205.16.39.44$
#4389
8.1k
views
2 answers
3 votes
Assume the following information.Original timestamp value $= 46$Receive timestamp value $= 59$Transmit timestamp value $= 60$ ... go back by $3$ millisecondsReceive clock should go ahead by $1$ milliseconds
#4390
10.0k
views
4 answers
7 votes
A IP packet has arrived in which the fragmentation offset value is $100,$ the value of $\textsf{HLEN}$ is $5$ and the value of total length field is $200.$ What is the number of the last byte?$194$394$979$1179$
#4391
6.4k
views
3 answers
3 votes
In a system an RSA algorithm with $p=5$ and $q=11$, is implemented for data security. What is the value of the decryption key if the value of the encryption key is $27?$3$7$27$40$
#4392
3.2k
views
1 answers
1 votes
Two stations 'A' and 'B' are connected via a point to point link and exchange frames with m=3 where m is the size of the sequence number field in bits. Station 'A' sends ... of A: 2345670 X=2 Y=3(D) Buffer frames of A: 1234560 X=1 Y=2
#4393
612
views
1 answers
1 votes
A 5-stage pipelined processor has Instruction Fetch (IF), Instruction Decode (ID), Opearnd Fetch (OF), Perform Operation (PO) and Write Operand (WO) stages. The IF, ID, OF and WO ...  (A) 13(B) 15(C) 17(D) 19
#4394
4.5k
views
3 answers
7 votes
Which of the following transmission media is not readily suitable to CSMA operation?RadioOptical fibersCoaxial cableTwisted pair
#4395
5.3k
views
2 answers
7 votes
On a LAN ,where are IP datagrams transported?In the LAN headerIn the application fieldIn the information field of the LAN frameAfter the TCP header
#4396
1.7k
views
1 answers
1 votes
A packet filtering firewall cana)deny certain users from accessing a serviceb)block worms and viruses from entering the networkc)disallow some files from being accessed through FTPd)block some hosts from accessing the network
#4397
2.0k
views
5 answers
0 votes
till which layer the loopback packet goes . i mean to ask that the lowest layer till which packet travel and then come back. I read that it goes to data link ... at network layer . so i m confussed  till which point the packet will go .
#4398
3.8k
views
3 answers
1 votes
The subnet mask for a particular network is 255.255.252.0. Which of the following pairs ofIP addresses could belong to this network?A. 172.57.88.62 and 172.57.87.233B. 10. ... 191.203.31.87 and 191.234.31.88D. 128.8.129.43 and 128.8.131.42
#4399
1.7k
views
2 answers
1 votes
#4400
1.4k
views
1 answers
0 votes
To prevent signal alteration, what is the maximum number of repeaters that can be placed on one 10 Base 5 or 10 Base 2 network?