search
Log In

Web Page

Concept of layering. LAN technologies (Ethernet).Flow and error control techniques, Swithing. IPv4/ IPv6, Routers and routing algorithms (distance vector, link state). TCP/UDP and Sockets, Congestion control. Application layer protocols (DNS, SMTP, POP, FTP, HTTP). Basics of Wi-Fi. Network security: authentication, basics of public key and private key cryptography, digital signatures and certificates, Firewalls.

$$\small{\overset{{\large{\textbf{Mark Distribution in Previous GATE}}}}{\begin{array}{|c|c|c|c|c|c|c|c|}\hline
\textbf{Year}&\textbf{2019}&\textbf{2018}&\textbf{2017-1}&\textbf{2017-2}&\textbf{2016-1}&\textbf{2016-2}&\textbf{Minimum}&\textbf{Average}&\textbf{Maximum}
\\\hline\textbf{1 Mark Count}&1&3&2&3&2&3&1&2.3&3
\\\hline\textbf{2 Marks Count}&4&2&3&1&4&3&1&2.8&4
\\\hline\textbf{Total Marks}&9&7&8&5&10&9&\bf{5}&\bf{8}&\bf{10}\\\hline
\end{array}}}$$

Recent questions in Computer Networks

0 votes
0 answers
1
0 votes
0 answers
2
0 votes
0 answers
3
0 votes
0 answers
4
If the sender window size is 128 using selective repeat arq,then the sequence no. of the frame to be send after sending 400th frames is_?
asked Jan 5, 2019 in Computer Networks BHOJARAM 48 views
0 votes
1 answer
5
0 votes
0 answers
6
Can we set the conditon like: block all the incoming tcp packets from 4:00 am to 6:00 am using a “PACKET BASED FIREWALL”?
asked Jan 5, 2019 in Computer Networks Nandkishor3939 51 views
0 votes
0 answers
7
To deny access to any administration’s n/w by outsider, the firewall should be set as ? protocol source port dest port flag bit a)TCP > 1023 80 any b)TCP 80 > 1023 ACK c)UDP > 1023 53 — d)UDP 53 > 1023 —
asked Jan 5, 2019 in Computer Networks Nandkishor3939 65 views
1 vote
1 answer
8
A link has transmission speed of 500*10^6 bps and one way prob delay of 2sec.If data pacjet size is 10^7 bits then efficiency of Gb7 is % Anyone getting 3.48 answer given is 63.18
asked Jan 5, 2019 in Computer Networks Aravind Adithya 1 88 views
0 votes
0 answers
9
The maximum length of the cable (in km) for transmitting data at a rate of 100 Mbps in ethernet LAN with frame size of 1000 bits (take signal speed as 2 × 10) is _______
asked Jan 5, 2019 in Computer Networks VikramRB 88 views
0 votes
0 answers
11
which of the timer is responsible for keeping the window size information flowing even if the other end closes its receiver window? Retransmission Timer persistence Timer Keep Alive Timer Time Wait Timer
asked Jan 4, 2019 in Computer Networks kavya kamish upadhya 185 views
0 votes
0 answers
12
Sliding Window Protocols are Half Duplex or Full duplex ?
asked Jan 4, 2019 in Computer Networks jatin khachane 1 37 views
0 votes
1 answer
13
where Theta(n) = 216 can someone please tell me how 31 is calculated Please some one help me in this
asked Jan 4, 2019 in Computer Networks mehul vaidya 62 views
1 vote
1 answer
14
How many bits can a 2-dimensional parity detect and correct? Is there any general formula for no of bit detection and correction for N-dimensional parity?
asked Jan 4, 2019 in Computer Networks vinay chauhan 443 views
0 votes
0 answers
15
Why propagation time(Tp) is negligible in Polling ? (Access control methods)
asked Jan 3, 2019 in Computer Networks Srinivas_Reddy_Kotla 53 views
1 vote
1 answer
16
In the network 202.10.4.230/27 the last but one valid IP which can be assigned to a host from the last subnet is ___________.
asked Jan 3, 2019 in Computer Networks Shadan Karim 100 views
0 votes
1 answer
17
asked Jan 3, 2019 in Computer Networks Shadan Karim 69 views
0 votes
0 answers
18
A Only S1 and S2 are true B Only S2 and S3 are true C Only S1 is true D All are true
asked Jan 3, 2019 in Computer Networks Shadan Karim 68 views
2 votes
1 answer
19
A token bucket scheme is used for traffic shaping. A new token is put into the bucket at every 10 $\mu$sec. Assume each token picks one packet which contains 2 bytes of data. It is observed that initial capacity of the bucket is 10 Mbits. The computer can transmit ... 8 Mbps for _________ (in seconds upto 2 decimal places) Answer is 1.56. Need the step by step procedure to go about this question
asked Jan 3, 2019 in Computer Networks `JEET 1.4k views
1 vote
3 answers
20
True / False ) LSR uses dijkstra algorithm ? ) LSR working is similar to dijkstra algorithm ? ) DVR uses bellman algorithm for finding the shortest distance to other routers/hops?
asked Jan 2, 2019 in Computer Networks Gurdeep Saini 436 views
...