search
Log In

Recent questions tagged computer-networks

0 votes
3 answers
1
Suppose there are $n$ stations in a slotted $LAN$. Each station attempts to transmit with a probability $P$ in each time slot. The probability that only one station transmits in a given slot is $nP(1-P)^{n-1}$ $nP$ $P(1-P)^{n-1}$ $n^{P}(1-P)^{n-1}$
asked Mar 24 in Computer Networks jothee 106 views
0 votes
4 answers
2
Station $A$ uses $32$ byte packets t transmit messages to station $B$ using sliding window protocol. The round trip delay between $A$ and $B$ is $40$ milliseconds and the bottleneck bandwidth on the path between $A$ and $B$ is $64$ kbps. The optimal window size of $A$ is $20$ $10$ $30$ $40$
asked Mar 24 in Computer Networks jothee 120 views
0 votes
1 answer
3
Let $G(x)$ be generator polynomial used for CRC checking. The condition that should be satisfied by $G(x)$ to correct odd numbered error bits, will be: $(1+x)$ is factor of $G(x)$ $(1-x)$ is factor of $G(x)$ $(1+x^{2})$ is factor of $G(x)$ $x$ is factor of $G(x)$
asked Mar 24 in Computer Networks jothee 75 views
0 votes
2 answers
4
In a packet switching network, if the message size is $48$ bytes and each packet contains a header of $3$ bytes. If $24$ packets are required to transmit the message, the packet size is $2$ bytes $1$ byte $4$ bytes $5$ bytes
asked Mar 24 in Computer Networks jothee 102 views
0 votes
1 answer
5
In RSA public key cryptosystem suppose $n=p*q$ where $p$ and $q$ are primes. $(e,n)$ and $(d,n)$ are public and private keys respectively. Let $M$ be an integer such that $o< M< n$ and $\phi(n)=(p-1)(q-1)$ ... I and II I and III II and III I and IV
asked Mar 24 in Computer Networks jothee 71 views
0 votes
2 answers
6
A node $X$ on a $10$ Mbps network is regulated by a token bucket. The token bucket is filled at a rate of $2$ Mbps. Token bucket is initially filled with $16$ megabits. The maximum duration taken by $X$ to transmit at full rate of $10$ Mbps is ______secs. $1$ $2$ $3$ $4$
asked Mar 24 in Computer Networks jothee 68 views
0 votes
3 answers
7
0 votes
2 answers
8
The maximum size of the data that the application layer can pass on to the $TCP$ layer below is ________. $2^{16}$ bytes $2^{16}$ bytes + $TCP$ header length $2^{16}$ bytes – $TCP$ header length $2^{15}$ bytes
asked Mar 24 in Computer Networks jothee 77 views
0 votes
4 answers
9
A packet whose destination is outside the local $TCP/IP$ network segment is sent to ________. File server $DNS$ server $DHCP$ server Default gateway
asked Mar 24 in Computer Networks jothee 85 views
0 votes
3 answers
10
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated __________. automatically by server by exchanging information with neighbour nodes with back up database
asked Mar 24 in Computer Networks jothee 76 views
0 votes
3 answers
11
In link state routing algorithm after construction of link state packets, new routes are computed using : DES algorithm Dijkstra's algorithm RSA algorithm Packets
asked Mar 24 in Computer Networks jothee 69 views
2 votes
4 answers
12
Consider the following statements about the functionality of an IP based router. A router does not modify the IP packets during forwarding. It is not necessary for a router to implement any routing protocol. A router should reassemble IP fragments if the MTU of the outgoing link is ... the incoming IP packet. Which of the above statements is/are TRUE? I and II only I only II and III only II only
asked Feb 12 in Computer Networks Arjun 1.6k views
4 votes
4 answers
13
Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images.The minimum number of TCP connections required to display the web page completely in your browser is__________.
asked Feb 12 in Computer Networks Arjun 1.7k views
7 votes
3 answers
14
An organization requires a range of IP address to assign one to each of its $1500$ computers. The organization has approached an Internet Service Provider (ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space $202.61.0.0/17$. The ISP wants to assign an ... $202.61.64.0/21$ $202.61.144.0/21$ I and II only II and III only III and IV only I and IV only
asked Feb 12 in Computer Networks Arjun 2.4k views
2 votes
3 answers
15
Consider a TCP connection between a client and a server with the following specifications; the round trip time is $6$ ms, the size of the receiver advertised window is $50$ KB, slow-start threshold at the client is $32$ KB, and the maximum segment size is $2$ KB ... . Then the size of the congestion window (in $\text{KB}$) at time $t+60$ ms after all acknowledgements are processed is _______
asked Feb 12 in Computer Networks Arjun 1.7k views
1 vote
4 answers
16
Checksum field in TCP header is ones complement of sum of header and data in bytes ones complement of sum of header, data and pseudo header in $16$ bit words dropped from $\text{IPv6}$ header format better than $\text{md5}$ or $\text{sh1}$ methods
asked Jan 13 in Computer Networks Satbir 539 views
4 votes
4 answers
17
Remote Procedure Calls are used for communication between two processes remotely different from each other on the same system communication between two processes on the same system communication between two processes on the separate systems none of the above
asked Jan 13 in Computer Networks Satbir 409 views
2 votes
2 answers
18
Avalanche effect in cryptography refers Large changes in cipher text when the keyword is changed minimally Large changes in cipher text when the plain text is changed Large Impact of keyword change to length of the cipher text None of the above
asked Jan 13 in Computer Networks Satbir 398 views
1 vote
2 answers
19
In a columnar transportation cipher, the plain text is the tomato is a plant in the night shade family , keyword is $\text{TOMATO}$ . The cipher text is $\text{ TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$ ... $\text{ EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX }$
asked Jan 13 in Computer Networks Satbir 456 views
2 votes
3 answers
20
The persist timer is used in TCP to To detect crashes from the other end of the connection To enable retransmission To avoid deadlock condition To timeout FIN_Wait$1$ condition
asked Jan 13 in Computer Networks Satbir 432 views
3 votes
1 answer
21
16. In a CDMA/CD network with a data rate of 10 Mbps, the maximum distance between any station pair is found to be 2500 m for the correct operation of the collision detection process. What should be the maximum distance if we increase the data rate to 100 Mbps? To 1 Gbps? To 10 Gbps?
asked Nov 7, 2019 in Computer Networks Mk Utkarsh 306 views
0 votes
1 answer
22
15. In a CDMA/CD network with a data rate of 10 Mbps, the minimum frame size is found to be 512 bits for the correct operation of the collision detection process. What should be the minimum frame size if we increase the data rate to 100 Mbps? To 1 Gbps? To 10 Gbps?
asked Nov 7, 2019 in Computer Networks Mk Utkarsh 173 views
2 votes
1 answer
23
11. We have a pure ALOHA network with 100 stations. If $T_{fr} = 1 \mu s$, what is the number of frames each station can send to achieve the maximum efficiency. 12. Repeat Exercise 11 for slotted ALOHA.
asked Nov 7, 2019 in Computer Networks Mk Utkarsh 228 views
1 vote
1 answer
24
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
asked Jul 2, 2019 in Computer Networks Arjun 402 views
1 vote
1 answer
25
A host has the address 581E: 1456:2314:ABCD::1211. If the node identification is 48 bits, find the address of the subnet to which the host is attached.
asked Jun 10, 2019 in Computer Networks chirudeepnamini 235 views
0 votes
1 answer
26
An organization is granted the block 16.0.0.0/8. The administrator wants to create 500 fixed-length subnets.Find the first and last addresses in subnet 500.
asked Jun 10, 2019 in Computer Networks chirudeepnamini 222 views
0 votes
1 answer
27
Consider a network topology using STOP and WAIT protocol A---------R----------B (here R is STORE and FORWARD ROUTER) Tp=1uS , Tx(data)=1000uS, Tx(ack)=10uS File Size =10000bits, Packet size=1000bits. How long will it take for A to send whole file to B? Dobut ... to A then A will Transmit second packet OR here A will send packet toHost B and B will send ack back to A then A will send second packet
asked Jun 9, 2019 in Computer Networks gourav94240 170 views
0 votes
1 answer
28
Is Time division multiplexing and Polling in syllabus? In the official website they have mentioned only ethernet..
asked May 30, 2019 in Computer Networks Hirak 174 views
0 votes
1 answer
29
0 votes
0 answers
30
How will you send an e-mail to someone when you have neither the recipient's e-mail address nor the e-mail application.
asked May 22, 2019 in Computer Networks shraddha priya 136 views
...