Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
0
votes
1
answer
1591
TCP RTT
Parshu gate
1.2k
views
Parshu gate
asked
Dec 5, 2017
Computer Networks
computer-networks
tcp
+
–
2
votes
2
answers
1592
Do we have token ring in Gate 2018 syllabus
Do we have token ring in Gate 2018 syllabus
Do we have token ring in Gate 2018 syllabus
Sikki Tikki
1.3k
views
Sikki Tikki
asked
Dec 4, 2017
Computer Networks
computer-networks
token-ring
+
–
1
votes
1
answer
1593
Stanford(Computer Networks)
You just turned on a four port Ethernet switch (it hasn't learned any addresses yet) and connected a host to each port. You send packet #1 from 00:11:22:33:44:55 to 66:77:88:99:00:11 which arrives at port 1 of your switch. Next, packet #2 is sent from 22: ... 66:77:88:99:00:11 with port 1 Packet #2 is only sent out on port 1 Packet #2 is sent out on ports 1, 2, 4
You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send packet #1 from 00:11:22:33:44:55 to 66:...
vijay_jr
926
views
vijay_jr
asked
Dec 4, 2017
Computer Networks
computer-networks
network-switching
+
–
0
votes
0
answers
1594
Stanford(Quiz)
Network A consists of a hub with twenty ports, each connected to exactly one end host. Network B is identical, except the hub is replaced by a switch. Which of the following are true? If the end hosts in both networks try to send the same ... can be successfully transferred simultaneously between the end hosts. The nodes in Network B can be further apart than the nodes in Network A.
Network A consists of a hub with twenty ports, each connected to exactly one end host. Network B is identical, except the hub is replaced by a switch. Which of the follow...
vijay_jr
919
views
vijay_jr
asked
Dec 4, 2017
Computer Networks
computer-networks
network-switching
routers-bridge-hubs-switches
+
–
0
votes
1
answer
1595
Made easy test series
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB respectively. Sender side threshold is set to 18 KB. After 8 transmission a time-out occurs, ... to send first full window of 18 KB is____________ (in msec). Assume window size at the start of slow start phase is 2 KB.
Consider the effect of using slow start on a line with 10 msec round trip time. The receiver window and the size of congestion window are set to 38 KB and 36 KB respectiv...
Appu B
210
views
Appu B
asked
Dec 3, 2017
Computer Networks
computer-networks
+
–
0
votes
0
answers
1596
Made easy test series
A simple network consist of two nodes X and Y. Each node has a single frame of F = 1500 bits (including all header and preambles) to send to each other. Both nodes attempt to transmit at t = 0'. In case that a node executes the exponential Back-off algorithm. In ... and Y draws k = 2. The time taken by X's packet (from t = 0) to be completely delivered to Y is ________ μs.
A simple network consist of two nodes X and Y. Each node has a single frame of F = 1500 bits (including all header and preambles) to send to each other. Both nodes attemp...
Appu B
351
views
Appu B
asked
Dec 3, 2017
Computer Networks
computer-networks
+
–
2
votes
1
answer
1597
Made easy
Consider the two hosts A and B are connected Via a Router R which is having a queuing delay of 7 μsec is as shown below : The Router R has two links Link1 and Link2, connected to A and B respectively. Each link is 250 meters long and has a bandwidth of ... speed is 500,000 km/sec. The total transfer delay for 2 KB packet from A to B is __________ μsec. (ignore the processing delay).
Consider the two hosts A and B are connected Via a Router R which is having a queuing delay of 7 μsec is as shown below :The Router R has two links Link1 and Link2, conn...
Appu B
1.8k
views
Appu B
asked
Dec 3, 2017
Computer Networks
computer-networks
+
–
0
votes
1
answer
1598
MadeEasy Test Series: Computer Networks - Network Security
Consider the following statements with respect to digital signatures: S1: Digital signature ensures authenticity of the sender but not integrity of the message. S2: A single secret key can be used by the sender to sign multiple ... Both RSA cryptosystem and RSA digital signature scheme uses same set of keys. Which of the following is true?
Consider the following statements with respect to digital signatures:S1: Digital signature ensures authenticity of the sender but not integrity of the message.S2: A singl...
Appu B
1.8k
views
Appu B
asked
Dec 3, 2017
Computer Networks
made-easy-test-series
computer-networks
cryptography
network-security
rsa-security-networks
+
–
0
votes
0
answers
1599
TCP Congestion window
Consider Communication channel using the TCP over the channel. In this channel the congestion window varies from (W*MSS)/2 to W*MSS. If only one packet is lost over each period of time. Then what is the lost rate: A) 1/ (3/8 * W*W + 3W/4) B).1/ (3/4 * W + 3W/4) C) 1 / (3/8 * W*W + 3W/8) D) 1 / (3/4 * W*W + 3W/4)
Consider Communication channel using the TCP over the channel. In this channel the congestion window varies from (W*MSS)/2 to W*MSS. If only one packet is lost over each ...
yogi_p
341
views
yogi_p
asked
Dec 3, 2017
Computer Networks
computer-networks
tcp
+
–
0
votes
0
answers
1600
Made easy test series
The best effort delivery services such as an IP does not include (a) error checking (b) datagram acknowledgment (c) error correction (d) All of these
The best effort delivery services such as an IP does not include(a) error checking(b) datagram acknowledgment(c) error correction(d) All of these
Appu B
695
views
Appu B
asked
Dec 3, 2017
Computer Networks
network-protocols
computer-networks
+
–
0
votes
2
answers
1601
Computer Network
please explain the question and provide the detailed answer.
please explain the question and provide the detailed answer.
Harikesh Kumar
334
views
Harikesh Kumar
asked
Dec 3, 2017
Computer Networks
computer-networks
+
–
4
votes
0
answers
1602
Computer Network: Network Congestion
For a host machine that uses the Token Bucket Algorithm for congestion control, the token bucket has a capacity of 1MB and the maximum output rate is 10MBPS, Tokens arrive at a rate to sustain output at a rate of 5MBPS. The token bucket is currently full and the machine ... sent = 8/5 = 1.6 seconds Total time to send 10 MB = 1.6 + 2 = 1.8 Seconds ( correct?)
For a host machine that uses the Token Bucket Algorithm for congestion control, the token bucket has a capacity of 1MB and the maximum output rate is 10MBPS, Tokens arriv...
Manu Thakur
718
views
Manu Thakur
asked
Dec 3, 2017
Computer Networks
computer-networks
congestion-control
+
–
0
votes
1
answer
1603
Computer network network security
Please explain theorem in simplest way and solve example with explanation. Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d = 7 ( if d not given how to find d ).
Please explain theorem in simplest way and solve example with explanation.Using RSA algorithm what is the value of cipher test c if the plain text m=5 and P=3, q=11 & d =...
Harikesh Kumar
778
views
Harikesh Kumar
asked
Dec 2, 2017
Computer Networks
network-security
computer-networks
rsa-security-networks
+
–
0
votes
0
answers
1604
Grade up test
dm4006
152
views
dm4006
asked
Dec 2, 2017
Computer Networks
computer-networks
+
–
0
votes
2
answers
1605
Help with Jacobson Algorithm _ TCP
Osha
1.0k
views
Osha
asked
Dec 1, 2017
Computer Networks
tcp
computer-networks
+
–
–1
votes
1
answer
1606
Dijkstra algorithm
Parshu gate
1.4k
views
Parshu gate
asked
Nov 28, 2017
Computer Networks
dijkstras-algorithm
shortest-path
computer-networks
+
–
1
votes
4
answers
1607
go back n
Assume while transmitting packets using GB5, every 4th packet is lost. Number of transmissions required to transmit 10 packets is ________
Assume while transmitting packets using GB5, every 4th packet is lost. Number of transmissions required to transmit 10 packets is ________
Amitesh Sharma
2.3k
views
Amitesh Sharma
asked
Nov 28, 2017
Computer Networks
computer-networks
sliding-window
+
–
0
votes
2
answers
1608
Sliding window
Compute approximate optimal window size when packet size is 53 bytes, RTT is 60 microseconds and bottleneck bandwidth is 155 Mbps. 21 22 23 24
Compute approximate optimal window size when packet size is 53 bytes, RTT is 60 microseconds and bottleneck bandwidth is 155 Mbps.21222324
Amitesh Sharma
861
views
Amitesh Sharma
asked
Nov 28, 2017
Computer Networks
sliding-window
computer-networks
+
–
0
votes
0
answers
1609
Open Shortest Path First
Parshu gate
717
views
Parshu gate
asked
Nov 28, 2017
Computer Networks
shortest-path
link-state-routing
computer-networks
+
–
2
votes
0
answers
1610
Go-Back-N
The efficiency of a Go-Back-N protocol is $\eta = \frac{N}{1+ 2 *\frac{Propogation Delay}{Transmission Delay}}$ In this equation what is the exact value of N. Is it the one given in Go-Back-N or (2N-1).
The efficiency of a Go-Back-N protocol is $\eta = \frac{N}{1+ 2 *\frac{Propogation Delay}{Transmission Delay}}$In this equation what is the exact value of N. Is it the on...
sumit chakraborty
1.1k
views
sumit chakraborty
asked
Nov 26, 2017
Computer Networks
computer-networks
go-back-n
sliding-window
+
–
0
votes
0
answers
1611
FTP and HTTP
FTP and HTTP need underlying layers for Reliability Service and hence TCP is used at the Transport Layer, what protocol will FTP and HTTP use at Network Layer ? Since IP is an unreliable protocol,it does not guarantee the delivery of a datagram to its destination, how application layer data in ensured reliability @ this Network level ?
FTP and HTTP need underlying layers for Reliability Service and hence TCP is used at the Transport Layer, what protocol will FTP and HTTP use at Network Layer ?Since IP i...
Salazar
478
views
Salazar
asked
Nov 25, 2017
Computer Networks
computer-networks
self-doubt
+
–
0
votes
0
answers
1612
Resynchroniation in TCP connection establishment-Andrew S.Tanenbaum
Suppose that the clock-driven scheme for generating initial sequence numbers is used with a 15-bit wide clock counter. The clock ticks once every $100msec$, and the maximum packet lifetime is $60 sec$. How often need resynchronization take place (a) in the worst case? (b) when the data consumes $240$ sequence numbers/min?
Suppose that the clock-driven scheme for generating initial sequence numbers is used with a 15-bit wide clock counter. The clock ticks once every $100msec$, and the maxim...
reena_kandari
226
views
reena_kandari
asked
Nov 25, 2017
Computer Networks
computer-networks
tanenbaum
+
–
0
votes
4
answers
1613
AceTestSeries 2018: Computer Networks - Network Switching
Consider a packet switched network the propagation delay is 20 msec per hop and the packet size is 1000 bits and the data rate is 52 kbps. assuming all packet follow the same 4 hop path, then the delay in sending an 100000 bit message is________
Consider a packet switched network the propagation delay is 20 msec per hop and the packet size is 1000 bits and thedata rate is 52 kbps. assuming all packet follow the ...
rohit vishkarma
1.1k
views
rohit vishkarma
asked
Nov 23, 2017
Computer Networks
ace-test-series
computer-networks
network-switching
+
–
1
votes
0
answers
1614
GATE-CS-2006
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B is 128 kbps. What is the optimal window size that A should ... of packets Then optimal Window size is 40 If the RTT=2*Tp then we get Ws = 41, what is the correct approach ?
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottlene...
Salazar
1.1k
views
Salazar
asked
Nov 22, 2017
Computer Networks
gate-2006
computer-networks
sliding-window
+
–
1
votes
1
answer
1615
Token Ring
If bandwidth of a token ring is 48Mbps and token holding time is 5ms then find the minimum and maximum payload in bytes?
If bandwidth of a token ring is 48Mbps and token holding time is 5ms then find theminimum and maximum payload in bytes?
Salazar
2.7k
views
Salazar
asked
Nov 22, 2017
Computer Networks
computer-networks
token-ring
+
–
2
votes
0
answers
1616
Collision in CSMA
Consider the network with 8 nodes running the carrier sense multiple access MAC protocol. The maximum datarate of network is 10 Mbps. Each node send traffic according to some unknown random process at an average rate of 1 Mbps per node including retries ... nodes experiences a collision are ________ in % (upto 2 decimal places) [Assume no packet dropped except collied packets].
Consider the network with 8 nodes running the carrier sense multiple access MAC protocol. The maximum datarate of network is 10 Mbps. Each node send traffic according to ...
Tuhin Dutta
277
views
Tuhin Dutta
asked
Nov 22, 2017
Computer Networks
computer-networks
+
–
1
votes
0
answers
1617
CSMA/CD
Pawan Kumar 2
270
views
Pawan Kumar 2
asked
Nov 20, 2017
Computer Networks
csma-cd
computer-networks
+
–
4
votes
0
answers
1618
ethernet
Pawan Kumar 2
564
views
Pawan Kumar 2
asked
Nov 20, 2017
Computer Networks
computer-networks
lan-technologies
+
–
0
votes
2
answers
1619
Subnetting
Consider a router that interconnects three subnets: Subnet 1, Subnet 2 and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also, subnet-1 is required to support upto 125 interfaces and subnet-2 and 3 are each required to support upto 60 interfaces Write a feasible set of subnet address / subnet mask pairs?
Consider a router that interconnects three subnets:Subnet 1, Subnet 2 and Subnet 3. Suppose all of the interfaces in each of these three subnets are requiredto have the p...
Tuhin Dutta
6.0k
views
Tuhin Dutta
asked
Nov 20, 2017
Computer Networks
computer-networks
subnetting
+
–
1
votes
2
answers
1620
MadeEasy Subject Test: Computer Networks - Routing
please explain the answer thnx.
please explain the answerthnx.
nikkey123
800
views
nikkey123
asked
Nov 19, 2017
Computer Networks
made-easy-test-series
computer-networks
routing
+
–
Page:
« prev
1
...
49
50
51
52
53
54
55
56
57
58
59
...
102
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register