Web Page

Concept of layering.OSI and TCP/IP Protocol Stacks; Basics of packet, circuit and virtual circuit-switching; Data link layer: framing, error detection, Medium Access Control, Ethernet bridging; Routing protocols: shortest path, flooding, distance vector and link state routing; Fragmentation and IP addressing, IPv4, CIDR notation, Basics of IP support protocols (ARP, DHCP, ICMP), Network Address Translation (NAT); Transport layer: flow control and congestion controlUDPTCP, sockets; Application layer protocols: DNS, SMTP, HTTP, FTPEmail.

.$$\scriptsize{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}& \textbf{2022} & \textbf{2021-1}&\textbf{2021-2}&\textbf{2020}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count} & 2 &1&1&2&1&3&2&3&2&3&1&2&3
\\\hline\textbf{2 Marks Count} & 4 &4&3&2&4&2&3&1&4&3&1&3&4
\\\hline\textbf{Total Marks} & 10 &9&7&6&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

1 votes
1 answer
511
Start and stop bits are used in serial communication for error detectionerror correctionsynchronizationslowing down the communication
0 votes
2 answers
512
1 votes
1 answer
513
1 votes
1 answer
514
In networking terminology UTP meansUnshielded Twisted pairUbiquitious Teflon portUniformly Terminating portUnshielded T- connector port
1 votes
2 answers
515
0 votes
2 answers
518
1 votes
4 answers
520
0 votes
1 answer
521
0 votes
2 answers
523
If the channel is band limited to $6\;kHz$ and signal to noise ratio is $16,$ what would be the capacity of channel?$16.15$ kbps$23.24$ kbps$40.12$ kbps$24.74$ kbps
3 votes
1 answer
525
0 votes
2 answers
526
0 votes
1 answer
527
Which multiple access technique is used by $\text{IEEE } 802.11$ standard for wireless $\text{LAN}$ ?$\text{CDMA}$$\text{CSMA/CA}$$\text{ALOHA}$None of the options
0 votes
2 answers
528
$PGP$ encrypts data by using a block cipher called :international data encryption algorithmprivate data encryption algorithminternet data encryption algorithmnone of the ...
1 votes
1 answer
529
0 votes
2 answers
530
What is the value of acknowledgement field in a segmentNumber of previous bytes to receiveTotal number of bytes to receiveNumber of next bytes to receiveSequence of zero'...