Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
2
votes
0
answers
1651
subnet mask
Is it possible that for an IP address there are more than one subnet mask? Actually
Is it possible that for an IP address there are more than one subnet mask? Actually
Rudra Pratap
182
views
Rudra Pratap
asked
Nov 10, 2017
Computer Networks
computer-networks
+
–
3
votes
0
answers
1652
Computer Network
What is the maximum bandwidth at which a IP host can send 700 bytes of packets without having the 16 bit Datagram identification field wrap around within 100 seconds? (a) 3.67 Mbps (b) 4.84 Mbps (c) 1.63 Mbps (d) 2.8 Mbps Please read below. ... number?? 2)Is it possible to send datagram without identification number?? AND PLEASE CORRECT MY CONCEPT IF I AM WRONG...thanks in advance
What is the maximum bandwidth at which a IP host can send 700 bytes of packets without having the 16 bit Datagram identification field wrap around within 100 seconds? (a)...
Harsh Mehta
355
views
Harsh Mehta
asked
Nov 10, 2017
Computer Networks
computer-networks
+
–
2
votes
1
answer
1653
subnet mask
For an IP address, how will i calculate the subnet mask or it will be already given??
For an IP address, how will i calculate the subnet mask or it will be already given??
Rudra Pratap
358
views
Rudra Pratap
asked
Nov 10, 2017
Computer Networks
computer-networks
subnetting
+
–
0
votes
1
answer
1654
Exponential Back off Algorithm
Assume that X and Y are the only two stations on an ethernet. Each has a steady queue of frames to send. Both X and Y attempt to transmit a frame, collide and Y wins the first backoff race. At the end of this successful transmission by Y, both X and Y ... X wins the second backoff race is I think it should be 0.03125 or 1/32. But the answer given is 0.125 or 1/8.
Assume that X and Y are the only two stations on an ethernet. Each has a steadyqueue of frames to send. Both X and Y attempt to transmit a frame, collide and Ywins the fi...
Shubhanshu
2.0k
views
Shubhanshu
asked
Nov 10, 2017
Computer Networks
computer-networks
exponential-backoff-algorithm
+
–
0
votes
0
answers
1655
Distance Vector
This is a snapshot from tanenbaum. What i learned from highlighted text is:- " Suppose a node A has Neighbours B and C. B and C will share its Vector with A after a specific duration of time and suppose C's Vector reaches first to A cuz ... ;s Routing vector specifies a field with less distance then what i already have(yea by calculating from my position)" Am i right?
This is a snapshot from tanenbaum.What i learned from highlighted text is:- " Suppose a node A has Neighbours B and C. B and C will share its Vector with A after a specif...
Na462
436
views
Na462
asked
Nov 9, 2017
Computer Networks
computer-networks
distance-vector-routing
+
–
1
votes
0
answers
1656
Self doubt on Ethernet LAN
Are the below formulas for correct w.r.t ethernet LAN? efficiency : PD = propagation delay TD = transmission delay L = frame size $\eta =\frac{1}{1 + 6.44(\frac{ pd }{ td })}$ throughput: $= \frac{L}{RTT}$ If they are wrong please provide correct ones.
Are the below formulas for correct w.r.t ethernet LAN?efficiency :PD = propagation delayTD = transmission delayL = frame size$\eta =\frac{1}{1 + 6.44(\frac{ pd }{ td })}$...
Tuhin Dutta
787
views
Tuhin Dutta
asked
Nov 9, 2017
Computer Networks
computer-networks
ethernet
+
–
0
votes
0
answers
1657
Transmission time
My approach is : I calculated utilization first which is the time when link is active by total time U = transmission/ total time Transmission = 1.048msec Since no ack sort of policy is used so total time = transmission + propagation U = 1.048/51.048 = 0.0205 Throughout = 0.0205 × 1GBps = nearly 161Mbps What's wrong answer is B by the way
My approach is :I calculated utilization first which is the time when link is active by total time U = transmission/ total timeTransmission = 1.048msecSince no ack sort o...
Na462
591
views
Na462
asked
Nov 8, 2017
Computer Networks
computer-networks
+
–
0
votes
0
answers
1658
Transmission
My approach was : Transmission time = 0.214sec Propagation time = 0.0008sec Since transmission time > propagation time we can see that even if the packet reaches the destination the second packet won't even get transmitters completely so we can't go for pipelining structure ... ((0.214+0.0008) 5 + 20microsec)) 10 = nearly 1.074 sec But answer is 2.78sec where i am wrong?
My approach was :Transmission time = 0.214secPropagation time = 0.0008secSince transmission time propagation time we can see that even if the packet reaches the destinat...
Na462
402
views
Na462
asked
Nov 8, 2017
Computer Networks
computer-networks
+
–
0
votes
1
answer
1659
PTCUL-04
Program threats are A. Trojan Horse B. Trap Door C. Both D. None of them
Program threats areA. Trojan Horse B. Trap Door C. Both D. None of them
rishu_darkshadow
843
views
rishu_darkshadow
asked
Nov 8, 2017
Computer Networks
ptcul-2017
computer-networks
+
–
0
votes
0
answers
1660
techtud
Let G is a graph with n vertices and m edges. Consider following statements : i. In DFS traversal, number of tree edges produced is independent of selection of starting vertex. ii. In BFS traversal, number of tree edges produced is independent of selection of starting vertex. iii. ... B) Only statements (ii) and (iii) are correct (C) Statements (ii) and (iv) both are wrong (D) None of these
Let G is a graph with n vertices and m edges. Consider following statements : i. In DFS traversal, number of tree edges produced is independent of selection of starting v...
Manoja Rajalakshmi A
643
views
Manoja Rajalakshmi A
asked
Nov 7, 2017
Computer Networks
computer-networks
depth-first-search
breadth-first-search
+
–
0
votes
2
answers
1661
TCP HEADER , FRAME SIZE
Parshu gate
628
views
Parshu gate
asked
Nov 6, 2017
Computer Networks
tcp
computer-networks
+
–
0
votes
0
answers
1662
CSMA/CD LAN
Parshu gate
328
views
Parshu gate
asked
Nov 6, 2017
Computer Networks
csma-cd
computer-networks
+
–
1
votes
1
answer
1663
CSMA ALOHA
Parshu gate
389
views
Parshu gate
asked
Nov 6, 2017
Computer Networks
csma-cd
slotted-aloha
computer-networks
+
–
1
votes
2
answers
1664
CSMA / CD
Parshu gate
435
views
Parshu gate
asked
Nov 6, 2017
Computer Networks
csma-cd
computer-networks
+
–
0
votes
2
answers
1665
FLOW CONTROL CN
Parshu gate
499
views
Parshu gate
asked
Nov 6, 2017
Computer Networks
network-flow
computer-networks
+
–
1
votes
1
answer
1666
Tanenbaum
This is a screenshot from tanenbaum my question is, the frame which they are talking about in highlighted text is not an ethernet frame right? as ethernet frame is used in LAN. So which frame they are talking about in here? Is it the frame which is used when we are tansmitting in wireless medium from one network to another?
This is a screenshot from tanenbaum my question is, the frame which they are talking about in highlighted text is not an ethernet frame right? as ethernet frame is used ...
Na462
435
views
Na462
asked
Nov 5, 2017
Computer Networks
computer-networks
tanenbaum
reference-book
+
–
2
votes
1
answer
1667
Sequence number
When we talk of flow control we provide sequence number to our frames so that duplicate is avoided. But in IEEE 802.3 frame consist of PREAMBLE DEST.MAC SOURCE.MAC TYPE/H.LENGHT DATA PAD CRC which field does hold the sequence number ? or its a wrong question? plz tell me what i am missing in here?
When we talk of flow control we provide sequence number to our frames so that duplicate is avoided. But in IEEE 802.3 frame consist of PREAMBLE DEST.MA...
Na462
1.7k
views
Na462
asked
Nov 5, 2017
Computer Networks
computer-networks
sliding-window
sequencenumber
+
–
0
votes
0
answers
1668
csma/cd
Parshu gate
258
views
Parshu gate
asked
Nov 5, 2017
Computer Networks
csma-cd
computer-networks
+
–
2
votes
0
answers
1669
SLOTTED ALOHA
Parshu gate
417
views
Parshu gate
asked
Nov 5, 2017
Computer Networks
slotted-aloha
computer-networks
+
–
0
votes
0
answers
1670
FLOW CONTROL
Consider three nodes A B, C connected in series. Node A is connected to Node B via 3 Gbps link, 500 km length. Node B is connected to Node C via 60 Mbps link, 15 km length. The links are full duplex, but no other traffic on the links. A large file is ... . Assume velocity of propagation as $2 \times 10^8$ m/sec. What is the round trip time?______ msec (correct to two decimal points).
Consider three nodes A B, C connected in series. Node A is connected to Node B via 3 Gbps link, 500 km length. Node B is connected to Node C via 60 Mbps link, 15 km lengt...
Parshu gate
443
views
Parshu gate
asked
Nov 5, 2017
Computer Networks
computer-networks
network-flow
+
–
2
votes
2
answers
1671
UGC NET CSE | November 2017 | Part 3 | Question: 30
Which of the following statements are true? The fragmentation fields in the base header section of $\text{IPv4}$ have moved to the fragmentation extension header in $\text{IPv6}$. The authentication extension header is new in $\text{IPv6}$. The record route option is ... (i) and (ii) Only (ii) and (iii) Only (i) and (iii) Only (i), (ii) and (iii)
Which of the following statements are true?The fragmentation fields in the base header section of $\text{IPv4}$ have moved to the fragmentation extension header in $\text...
Arjun
2.7k
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
computer-networks
ip-addressing
ipv6
+
–
1
votes
2
answers
1672
UGC NET CSE | November 2017 | Part 3 | Question: 29
The address of a class $B$ host is to be split into subnets with a $6$– bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet? $62$ subnets and $1022$ hosts $64$ subnets and $1024$ hosts $62$ subnets and $254$ hosts $64$ subnets and $256$ hosts
The address of a class $B$ host is to be split into subnets with a $6$– bit subnet number. What is the maximum number of subnets and maximum number of hosts in each sub...
Arjun
1.3k
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
ip-addressing
computer-networks
+
–
1
votes
1
answer
1673
UGC NET CSE | November 2017 | Part 3 | Question: 28
Match the following : ... $\text{(a)-(iv); (b)-(iii); (c)-(ii); (d)-(i)}$
Match the following :$\begin{array}{clcl} & \textbf{List-I} && \textbf{List-II} \\ \text{(a)} & \text{Data Link Layer} & \text{(i)} & \text{Encryption} \\ \text{(b)}...
Arjun
739
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
computer-networks
+
–
1
votes
3
answers
1674
UGC NET CSE | November 2017 | Part 3 | Question: 27
If a file consisting of $50,000$ characters takes $40$ seconds to send, then the data rate is _________ $1$ kbps $1.25$ kbps $2$ kbps $10$ kbps
If a file consisting of $50,000$ characters takes $40$ seconds to send, then the data rate is _________$1$ kbps$1.25$ kbps$2$ kbps$10$ kbps
Arjun
1.0k
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
computer-networks
data-link-layer
+
–
1
votes
1
answer
1675
UGC NET CSE | November 2017 | Part 3 | Question: 26
Quadrature Amplitude Modulation means changing both Frequency and phase of the carrier Frequency and Amplitude of the carrier Amplitude and phase of the carrier Amplitude and Wavelength of the carrier
Quadrature Amplitude Modulation means changing bothFrequency and phase of the carrierFrequency and Amplitude of the carrierAmplitude and phase of the carrierAmplitude and...
Arjun
1.0k
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
computer-networks
modulation
physical-layer
+
–
2
votes
1
answer
1676
UGC NET CSE | November 2017 | Part 3 | Question: 25
Suppose we want to download text documents at the rate of $100$ pages per second. Assume that a page consists of an average of $24$ lines with $80$ characters in each line. What is the required bit rate of the channel? $192$ kbps $512$ kbps $1.248$ Mbps $1.536$ Mbps
Suppose we want to download text documents at the rate of $100$ pages per second. Assume that a page consists of an average of $24$ lines with $80$ characters in each lin...
Arjun
2.3k
views
Arjun
asked
Nov 5, 2017
Computer Networks
ugcnetcse-nov2017-paper3
computer-networks
data-link-layer
+
–
0
votes
1
answer
1677
UGC NET CSE | November 2017 | Part 2 | Question: 49
Which of the given wireless technologies used in IoT, consumes the least amount of power? Zigbee Bluetooth Wi-Fi GSM/CDMA
Which of the given wireless technologies used in IoT, consumes the least amount of power?ZigbeeBluetoothWi-FiGSM/CDMA
Arjun
2.6k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
computer-networks
+
–
0
votes
1
answer
1678
UGC NET CSE | November 2017 | Part 2 | Question: 30
The IP address _________ is used by hosts when they are being booted. $0.0.0.0$ $1.0.0.0$ $1.1.1.1$ $255.255.255.255$
The IP address _________ is used by hosts when they are being booted.$0.0.0.0$$1.0.0.0$$1.1.1.1$$255.255.255.255$
Arjun
2.5k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
computer-networks
ip-addressing
+
–
0
votes
1
answer
1679
UGC NET CSE | November 2017 | Part 2 | Question: 29
Which of the following layer of OSI Reference model is also called end-to-end layer ? Network layer Datalink layer Session layer Transport layer
Which of the following layer of OSI Reference model is also called end-to-end layer ?Network layerDatalink layerSession layerTransport layer
Arjun
861
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
computer-networks
osi-model
+
–
0
votes
1
answer
1680
UGC NET CSE | November 2017 | Part 2 | Question: 28
The number of bits used for addressing in Gigabit Ethernet is __________. $32$ bits $48$ bits $64$ bits $128$ bits
The number of bits used for addressing in Gigabit Ethernet is __________.$32$ bits$48$ bits$64$ bits$128$ bits
Arjun
2.9k
views
Arjun
asked
Nov 5, 2017
Unknown Category
ugcnetcse-nov2017-paper2
computer-networks
ethernet
+
–
Page:
« prev
1
...
51
52
53
54
55
56
57
58
59
60
61
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register