Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
0
votes
0
answers
1141
#Self Doubt
Consider the following statements: S1: Packet switching is faster than circuit switching. S2: In synchronous serial transfer synchronous bits are treated as part of data. a) S1 is true and S2 is false. b) S1 is false and S2 is true. c) both S1 and S2 are true. d) both S1 and S2 are false.
Consider the following statements:S1: Packet switching is faster than circuit switching.S2: In synchronous serial transfer synchronous bits are treated as part of data.a)...
Parth Shah
181
views
Parth Shah
asked
Nov 1, 2018
Computer Networks
computer-networks
+
–
0
votes
0
answers
1142
Computer Networks - Csma Cd
If CSMA transmits 8 stations network data in single channel whats is the chip code for station 5 {Assume that W1=[+1]} how to solve it solution given is. 1111-1-1-1-1.
If CSMA transmits 8 stations network data in single channel whats is the chip code for station 5 {Assume that W1=[+1]}how to solve itsolution given is. 1111-1-1-1-1.
Divyanshum29
286
views
Divyanshum29
asked
Oct 30, 2018
Computer Networks
computer-networks
csma-cd
+
–
0
votes
1
answer
1143
#CN Subnetting Self Doubt.
Given Subnet mask is 255.255.31.0 then how can one conclude that The subnet mask 255.255.x.x belongs to class B type(IP address range will be from 128.1.0.1 to 191.255.255.254) I get that from 255.255 N/w id = 16 bits but then how can we write range of ip addresses? @Shaik Brother can you see this?
Given Subnet mask is 255.255.31.0 then how can one conclude that The subnet mask 255.255.x.x belongs to class B type(IP address range will be from 128.1.0.1 to 191.255.2...
iarnav
453
views
iarnav
asked
Oct 30, 2018
Computer Networks
subnetting
computer-networks
internet
ip-address
+
–
0
votes
0
answers
1144
Low pass channel with wide bandwidth and low pass channel with limited band width
Help me to understand these two concepts Thabks
Help me to understand these two conceptsThabks
Fida
643
views
Fida
asked
Oct 27, 2018
Computer Networks
computer-networks
signals
+
–
0
votes
0
answers
1145
jamming signal
Consider two node A and B on the same ethernet segment and suppose the propagation delay between the node is 225-bit times. Suppose at the time both node A and B begin to transmit a frame. Assume both nodes transmit a 50-bit jam signal after detecting a collision. For 10^7 bits per sec ethernet, the time at which both nodes A and B sense an idle channel is __microsec
Consider two node A and B on the same ethernet segment and suppose the propagation delay between the node is 225-bit times. Suppose at the time both node A and B begin to...
shubham6596
815
views
shubham6596
asked
Oct 27, 2018
Computer Networks
computer-networks
jamming-signal
csma-cd
+
–
3
votes
0
answers
1146
Difference between efficency and throughput?
I am confused with this silly doubt.. someone please help me. To calculate efficiency of sliding window protocol we use formula Efficiency = 1/1+2a ------Formula1 i understood how this formula derived by series of steps. And the we ... I am not trying to mug up formulas but trying to understand how they are derived and how each term have its significance
I am confused with this silly doubt.. someone please help me.To calculate efficiency of sliding window protocol we use formulaEfficiency = 1/1+2a Formula1i understood...
vupadhayayx86
5.4k
views
vupadhayayx86
asked
Oct 26, 2018
Computer Networks
computer-networks
sliding-window
self-doubt
+
–
0
votes
0
answers
1147
self doubt
At which layer this commands works and what protocol does they use 1) ipconfig/ifconfig 2) netstat 3) nslookup
At which layer this commands works and what protocol does they use 1) ipconfig/ifconfig2) netstat 3) nslookup
kd.....
332
views
kd.....
asked
Oct 25, 2018
Computer Networks
computer-networks
+
–
1
votes
1
answer
1148
UDP Socket
Why UDP cannot communicate with multiple peers simultaneously, while it can connect twice to an already connected UDP socket?
Why UDP cannot communicate with multiple peers simultaneously, while it can connect twice to an already connected UDP socket?
srestha
428
views
srestha
asked
Oct 25, 2018
Computer Networks
computer-networks
+
–
1
votes
0
answers
1149
Self Doubt
While checking for normal forms Why we only check conditions only on F not on F+ eg R(A,B,C) F = {A->B , B->C} is in 3NF or not ? We will apply defination of 3NF i,e either LHS should be super key or RHS should be prime attribute ON ... if decomposed relation is in particular normal form we apply check on ALL IMPLIED FDs from F ?? In below ex should all implied FDs be checked ??
While checking for normal forms Why we only check conditions only on F not on F+eg R(A,B,C) F = {A->B , B->C} is in 3NF or not ?We will apply defination of 3NF i,e either...
jatin khachane 1
281
views
jatin khachane 1
asked
Oct 23, 2018
Databases
databases
database-normalization
computer-networks
+
–
2
votes
3
answers
1150
Networking-IP
If Direct Broadcast Address of subnet is 201.15.16.31. Which of the following will be subnet mask ? 1. 255.255.255.240 2. 255.255.255.192 3. 255.255.255.198 4. NOTA Explain your answer
If Direct Broadcast Address of subnet is 201.15.16.31. Which of the following will be subnet mask ?1. 255.255.255.2402. 255.255.255.1923. 255.255.255.1984. NOTAExplain yo...
aditi19
3.8k
views
aditi19
asked
Oct 23, 2018
Computer Networks
network-addressing
ip-addressing
computer-networks
subnetting
+
–
1
votes
0
answers
1151
#TCP_timers #tranport layer #computer network #RTO
If initial RTT is 30 sec and new RTT is 40 sec and alpha is0.1 then calculate next two RTO time.
If initial RTT is 30 sec and new RTT is 40 sec and alpha is0.1 then calculate next two RTO time.
Kinjalkkt
475
views
Kinjalkkt
asked
Oct 22, 2018
Computer Networks
tcp
computer-networks
transport-layer
rto
timers
+
–
1
votes
0
answers
1152
Self Doubt
We know that Stop and Wait, Go-Back N, Selective Repeat are the flow control methods. Now, each of these methods incorporates certain strategies for packet loss, duplicate packet detection. We also know that recovery of the lost packet, duplicate packet ... Error control, right? So, can we conclude the statement? -> "Flow control methods are using error control techniques"
We know that Stop and Wait, Go-Back N, Selective Repeat are the flow control methods. Now, each of these methods incorporates certain strategies for packet loss, duplicat...
garvit_vijai
252
views
garvit_vijai
asked
Oct 21, 2018
Computer Networks
computer-networks
sliding-window
+
–
0
votes
2
answers
1153
Ethernet
Consider two Station communicating via 1 Mbps Satellite link with propagation delay of 270 msec. The Satellite merely serves to retransmit data received from one station to another,with negligible switch delay. If Ethernet frame size is 1024 bits with 3 bit sequence number,then max. possible data throughput is.................
Consider two Station communicating via 1 Mbps Satellite link with propagation delay of 270 msec. The Satellite merely serves to retransmit data received from one station ...
Na462
2.1k
views
Na462
asked
Oct 20, 2018
Computer Networks
ethernet
computer-networks
+
–
0
votes
1
answer
1154
Error Control
Error Control is a mandatory service of A) Network Layer B) Transport Layer C) Session Layer D) Data Link Layer As far as I know, error control is mandatorily provided by both Transport Layer and Data Link Layer. Both B and D should be the answer?
Error Control is a mandatory service ofA) Network LayerB) Transport LayerC) Session LayerD) Data Link Layer As far as I know, error control is mandatorily provided by bot...
garvit_vijai
1.2k
views
garvit_vijai
asked
Oct 19, 2018
Computer Networks
computer-networks
error-control
+
–
1
votes
3
answers
1155
MAC address, IP address, transmission of packet from one point to another.
I was studying how the packet is transmitted from source to destination, what i understood is, we need IP address to identify the network in which our destination is present, while MAC address (data link layer address) ... .com/change-mac-address-in-windows). How is it possible if MAC address is present in the NIC?
I was studying how the packet is transmitted from source to destination, what i understood is, we need IP address to identify the network in which our destination is pres...
Ollie
3.5k
views
Ollie
asked
Oct 19, 2018
Computer Networks
computer-networks
ip-packet
mac-address
message-transmission
+
–
0
votes
0
answers
1156
GB CN - Test 1 - Question 9
A multiple access network with a large number of stations can be analyzed using the Poisson distribution. When there is a limited number of stations in a network, we need to use another approach for this analysis. In a network with N stations, we assume that ... that a station in a pure Aloha network can successfully send a frame during the vulnerable time. A. B. C. D.
A multiple access network with a large number of stations can be analyzed using the Poisson distribution. When there is a limited number of stations in a network, we need...
Sandy Sharma
1.3k
views
Sandy Sharma
asked
Oct 18, 2018
Computer Networks
gatebook
computer-networks
+
–
2
votes
0
answers
1157
Cyclic Redundancy check CRC
How many bits does CRC detect or correct? How does it detect burst error? Questions:- Which of the following CRC generators guarantee the detection of a single bit error ? P. x^4+x^2 Q. x^3+x+1 R. x^2+1 S. 1 A. Only P B. Only P,Q C ... error of size 6 C. The probability of detecting a burst error of size 9 is D. The probability of detecting a burst error of size 15 is
How many bits does CRC detect or correct?How does it detect burst error?Questions:-Which of the following CRC generators guarantee the detection of a single bit error ?P....
Sandy Sharma
2.6k
views
Sandy Sharma
asked
Oct 18, 2018
Computer Networks
computer-networks
+
–
0
votes
0
answers
1158
TestBook Test Series: Computer Networks - Network Flow
monty
554
views
monty
asked
Oct 17, 2018
Computer Networks
computer-networks
testbook-test-series
network-flow
+
–
2
votes
2
answers
1159
MadeEasy Test Series: Computer Networks - Distance Vector Routing
abhishek1995_cse
1.4k
views
abhishek1995_cse
asked
Oct 16, 2018
Computer Networks
computer-networks
distance-vector-routing
made-easy-test-series
+
–
1
votes
1
answer
1160
Subnetting
You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the server? A. 192.168.19.0 B. 192.168.19.33 C. 192.168.19.26 D. 192.168.19.31
You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the se...
vupadhayayx86
1.1k
views
vupadhayayx86
asked
Oct 16, 2018
Computer Networks
subnetting
computer-networks
internet
ip-address
network-protocols
+
–
3
votes
1
answer
1161
Congestion control
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB respectively. Sender side threshold is set to 18 KB. After 8 transmission a timeout occurs, after time out, the time taken to send first full window of 18 KB is ________ (in msec).
Consider the effect of using slow start on a line with 10 msec round trip time. Thereceiver window and the size of congestion window are set to 38 KB and 36 KBrespectivel...
Shivangi Parashar 2
2.2k
views
Shivangi Parashar 2
asked
Oct 16, 2018
Computer Networks
computer-networks
congestion-control
tcp
+
–
1
votes
1
answer
1162
computer networks general
Which book is good for numerical problems for computer networks for GATE?
Which book is good for numerical problems for computer networks for GATE?
sushmita
462
views
sushmita
asked
Oct 15, 2018
Computer Networks
computer-networks
gate-preparation
+
–
0
votes
1
answer
1163
self doubt
CRC can detect any odd number of errors. CRC can detect all burst errors of less than the degree of the polynomial. Please explain and if possible give proof
CRC can detect any odd number of errors.CRC can detect all burst errors of less than the degree of the polynomial.Please explain and if possible give proof
Vegeta
780
views
Vegeta
asked
Oct 15, 2018
Computer Networks
crc-polynomial
computer-networks
error-detection
+
–
2
votes
0
answers
1164
MIT assignment
A geosynchronous satellite has a half-duplex channel with a transmission rate of 10 kbps and a propagation delay of 0.25 sec each way. With a data packet size of 1000 bits and a loss probability p of 0.001 ,(A) what is the expected transmission time of ... parameters are the same as part (a), what is the longest channel propagation delay for which we can still use stop-and-wait?
A geosynchronous satellite has a half-duplex channel with a transmission rate of 10 kbps and a propagation delay of 0.25 sec each way. With a data packet size of 1000 bit...
sushmita
1.0k
views
sushmita
asked
Oct 15, 2018
Computer Networks
computer-networks
network-flow
flow-control-methods
stop-and-wait
data
data-link-layer
+
–
0
votes
0
answers
1165
Ethernet
Consider two nodes A and B on the same ethernet segment, and suppose the propagation delay between the two nodes is 225 bit times. Suppose at time both nodes A and B begin to transmit a frame. Assume both nodes transmit a 50-bit jam signal after detecting a collision. For 107 bits per set ethernet, the time at which both nodes A and B sense an idle channel is ________ μsec
Consider two nodes A and B on the same ethernet segment, and suppose the propagation delay between the two nodes is 225 bit times. Suppose at time both nodes A and B begi...
Shivangi Parashar 2
327
views
Shivangi Parashar 2
asked
Oct 15, 2018
Computer Networks
ethernet
computer-networks
+
–
0
votes
1
answer
1166
https://gateoverflow.in/3838/gate2005-it-75 self doubt
In a TDM medium access control bus LAN, each station is assigned one time slot per cycle for transmission. Assume that the length of each time slot is the time to transmit 100bits plus the end-to-end propagation delay. Assume ... division multiple access as only one station uses the medium in its slot? please if someone can clear this doubt.
In a TDM medium access control bus LAN, each station is assigned one time slot per cycle for transmission. Assume that the length of each time slot is the time to transmi...
sushmita
448
views
sushmita
asked
Oct 14, 2018
Computer Networks
computer-networks
ethernet
transmission-media
+
–
0
votes
1
answer
1167
Tcp AIMD
Consider "Additive -increase multiplicative -decrease "approach of TCP congestion control.one MSS(Maximum Segment Size)is 512B .If the TCP sender doesn't perceive the path as not congested then. What will be the congestion window size after 4RTTS provided the congestion window is assigned 1MSS initially ?
Consider "Additive -increase multiplicative -decrease "approach of TCP congestion control.one MSS(Maximum Segment Size)is 512B .If the TCP sender doesn't perceive the pa...
Shivangi Parashar 2
3.8k
views
Shivangi Parashar 2
asked
Oct 12, 2018
Others
congestion-control
computer-networks
+
–
0
votes
1
answer
1168
Cryptography
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is . a)69 b)49 c)49 d)119
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is .a)69b)49c)49d)119
Shivangi Parashar 2
1.3k
views
Shivangi Parashar 2
asked
Oct 12, 2018
Computer Networks
cryptography
network-security
computer-networks
+
–
0
votes
0
answers
1169
Question:6 from pearson
Find efficiency of the ring where data rate of link is 4mbps, number of stattionsare 20 separated by 100 meters and bit delay in each station is 2.5 bits.(velocity of propagation =2×10^8m/s) (A)60 bits (B)75bits (C)90bits (D)120bits Someone plz explain this question.....
Find efficiency of the ring where data rate of link is 4mbps, number of stattionsare 20 separated by 100 meters and bit delay in each station is 2.5 bits.(velocity of pro...
Tabassum jahan
223
views
Tabassum jahan
asked
Oct 12, 2018
Computer Networks
computer-networks
+
–
3
votes
3
answers
1170
Transport layer
For a network which has maximum packet size is 256 bytes . lifetime of a packet is 20 sec and 8 bit sequence number . Find maximum data rate per connection
For a network which has maximum packet size is 256 bytes . lifetime of a packet is 20 sec and 8 bit sequence number . Find maximum data rate per connection
Jaggi
2.7k
views
Jaggi
asked
Oct 11, 2018
Computer Networks
transport-layer
computer-networks
tcp
sequencenumber
+
–
Page:
« prev
1
...
34
35
36
37
38
39
40
41
42
43
44
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register