Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
3
votes
0
answers
1801
CN: Distance Vector Routing
Consider the above network uses Distance vector routing with split horizon. Assume that all the routing tables are stabilized and after sometime link C->D is broken. Now what will be the entry in the routing table of D regarding C?Assume ... Intermediate node is a node to which the source is connected directly and using that node,the source reaches the destination.
Consider the above network uses Distance vector routing with split horizon. Assume that all the routing tables are stabilized and after sometime link C->D is broken. Now ...
rahul sharma 5
1.3k
views
rahul sharma 5
asked
Aug 17, 2017
Computer Networks
computer-networks
distance-vector-routing
count-to-infinity
+
–
1
votes
0
answers
1802
Access control method
please tell me name of access control method in data link layer which are needed for gate 2018?
please tell me name of access control method in data link layer which are needed for gate 2018?
Arjun Kumar 1
629
views
Arjun Kumar 1
asked
Aug 16, 2017
Computer Networks
data
layer
computer-networks
+
–
1
votes
0
answers
1803
IP v6 Flow label size
What is the size of flow label in IPV6 header? In forouzan it is 24 bits but in tanenbaum it is 20 bits.Please some confirm?
What is the size of flow label in IPV6 header? In forouzan it is 24 bits but in tanenbaum it is 20 bits.Please some confirm?
rahul sharma 5
464
views
rahul sharma 5
asked
Aug 16, 2017
Computer Networks
computer-networks
ipv6
+
–
7
votes
2
answers
1804
CN: TCP Window Size
Consider TCP congestion control. Assuming RTT as 4 seconds and segment size as 3KB, if bandwidth is 500kbps, what is the smallest window size for which there is no stalling in this case?
Consider TCP congestion control. Assuming RTT as 4 seconds and segment size as 3KB, if bandwidth is 500kbps, what is the smallest window size for which there is no stalli...
rahul sharma 5
1.7k
views
rahul sharma 5
asked
Aug 16, 2017
Computer Networks
computer-networks
tcp
+
–
2
votes
1
answer
1805
Cn: Transport layer protocol
Which of the following transport layer protocols used to support email? a:) SMTP b:) TCP c::)UDP d) both b and c
Which of the following transport layer protocols used to support email?a:) SMTPb:) TCPc::)UDPd) both b and c
rahul sharma 5
2.2k
views
rahul sharma 5
asked
Aug 15, 2017
Computer Networks
computer-networks
transport-layer
tcp
udp
+
–
7
votes
3
answers
1806
Cn: Optimal windows size
The round trip delay between x and y is given as 60 ms and bandwidth of link between X and Y is 512 KBps. What is the optimal window size (in packets) if the packet size is 64 bytes and channel is full duplex
The round trip delay between x and y is given as 60 ms and bandwidth of link between X and Y is 512 KBps. What is the optimal window size (in packets) if the packet size...
rahul sharma 5
3.5k
views
rahul sharma 5
asked
Aug 15, 2017
Computer Networks
computer-networks
sliding-window
+
–
2
votes
1
answer
1807
computer Network gate 2018
is Token Passing in gate 2018?
is Token Passing in gate 2018?
Nitesh Choudhary
1.4k
views
Nitesh Choudhary
asked
Aug 15, 2017
Computer Networks
computer-networks
gatecse-2018
study-resources
preparation
+
–
1
votes
2
answers
1808
Computer Networks: Basic doubt in TCP operation
When we have a segment of say 100 bytes and my last ACK number is assume 4000, Now my current sequence number will be (4000-4099) for 100 bytes segment. This is what we generally use a notation. But in one segment we have only one field as sequence number.So how can we specify Range? Ip has length fields in Ipv4/V6/UDP but why not in TCP?
When we have a segment of say 100 bytes and my last ACK number is assume 4000,Now my current sequence number will be (4000-4099) for 100 bytes segment. This is what we ge...
rahul sharma 5
641
views
rahul sharma 5
asked
Aug 15, 2017
Computer Networks
computer-networks
network
+
–
4
votes
2
answers
1809
Circuit switching vs packet switching
Suppose that x bit of message is transmitted over a k -hop path in a network.The circuit set up time is s seconds,the propagation delay is d seconds per hop.The packet size is p bits and data rate is b bps.At what time user will receive the message if a.) Circuit switching is used b:) Packet switching is used
Suppose that x bit of message is transmitted over a k -hop path in a network.The circuit set up time is s seconds,the propagation delay is d seconds per hop.The packet ...
rahul sharma 5
5.4k
views
rahul sharma 5
asked
Aug 15, 2017
Computer Networks
computer-networks
network-switching
+
–
1
votes
1
answer
1810
Cn Linear block code
Which of the following are linear block codes?Remember exor of two valid linear block codes is a valid codeword a) CRC b) Hamming code c) Simple parity d)All e)None
Which of the following are linear block codes?Remember exor of two valid linear block codes is a valid codeworda) CRCb) Hamming codec) Simple parityd)Alle)None
rahul sharma 5
881
views
rahul sharma 5
asked
Aug 14, 2017
Computer Networks
computer-networks
hamming-code
+
–
2
votes
1
answer
1811
Cn : Calculate number of transmissions in SR and GBN
Station A needs to send a message consisting of 10 packets to station B using a sliding window of size 4. All packets are ready and can be transferred immediately.Selective repeat and GBN are used at 2 different times and every 5th ... make in selective repeat and GBN respectively to ensure safe delivery to B.Then what are the values of x and y?
Station A needs to send a message consisting of 10 packets to station B using a sliding window of size 4. All packets are ready and can be transferred immediately.Selecti...
rahul sharma 5
1.6k
views
rahul sharma 5
asked
Aug 14, 2017
Computer Networks
computer-networks
sliding-window
+
–
1
votes
0
answers
1812
CN Network Security
Message digest provides only message authentication or can it provide user authentication also? MDC is a digest for message authentication.Can i also say MAC is also a digest for sender authentication?Please explain this
Message digest provides only message authentication or can it provide user authentication also?MDC is a digest for message authentication.Can i also say MAC is also a dig...
rahul sharma 5
299
views
rahul sharma 5
asked
Aug 13, 2017
Computer Networks
computer-networks
computer
rsa-security-networks
+
–
2
votes
2
answers
1813
forouzan 5th edition chapter2 Q2-3
A router connects three links (networks). How many of each of the following layers can the router be involved with? a.physical layer b. data-link layer c. network layer
A router connects three links (networks). How many of each of the followinglayers can the router be involved with?a.physical layer b. data-link layer c. network layer
harishkumar
4.5k
views
harishkumar
asked
Aug 13, 2017
Computer Networks
computer-networks
+
–
2
votes
2
answers
1814
foruozan 5th edition chapter1 Q1-13
How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN?
How many point-to-point WANs are needed to connect n LANs if each LANshould be able to directly communicate with any other LAN?
harishkumar
4.5k
views
harishkumar
asked
Aug 13, 2017
Computer Networks
computer-networks
+
–
2
votes
1
answer
1815
Forouzan 5th edition ch01 Q1-12
In a LAN with only a single link-layer switch Host 1 wants to send a message to Host 2. Since communication is through the link-layer switch, does the switch need to have an address? Explain.
In a LAN with only a single link-layer switch Host 1 wants to send a messageto Host 2. Since communication is through the link-layer switch, does theswitch need to have ...
harishkumar
548
views
harishkumar
asked
Aug 13, 2017
Computer Networks
computer-networks
+
–
7
votes
2
answers
1816
CN ARQ Protocol
True / False? Selective repeat ARQ requires more number of bits in sequence number as compared to Go Back n ARQ.
True / False?Selective repeat ARQ requires more number of bits in sequence number as compared to Go Back n ARQ.
rahul sharma 5
1.6k
views
rahul sharma 5
asked
Aug 13, 2017
Computer Networks
computer-networks
go-back-n
sliding-window
+
–
4
votes
2
answers
1817
CN SMTP Protocol
SMTP is state full or stateles?
SMTP is state full or stateles?
rahul sharma 5
1.5k
views
rahul sharma 5
asked
Aug 13, 2017
Computer Networks
computer-networks
+
–
3
votes
1
answer
1818
CN Slow Start Throughput
R.T.T=10 microsec. M.S.S=100 Bytes Slow start protocol used to send data.Sender needs to send data till it completes sending window size 8MSS.Find:- a. Total Time taken b. Throughput for 1st RTT c. Total Throughput d. Average Throughput
R.T.T=10 microsec.M.S.S=100 BytesSlow start protocol used to send data.Sender needs to send data till it completes sending window size 8MSS.Find:-a. Total Time takenb....
rahul sharma 5
1.1k
views
rahul sharma 5
asked
Aug 13, 2017
Computer Networks
congestion-control
computer-networks
tcp
+
–
0
votes
1
answer
1819
Computer Network
Can anyone explain both the question don't give any random answer
Can anyone explain both the question don't give any random answer
Nitesh Choudhary
356
views
Nitesh Choudhary
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
0
votes
0
answers
1820
CN Match the following
Match A with B List A A. Data | 240.255.255.255 | 40.40.40.40 B.Data | 22.21.23.34 | 255.255.255.255 C.Data | 24.23.22.21 | 24.22.23.24 List B 1.Unicast packet with in network. 2. This packet will never exist 3. Limited broadcasting address. Code.:- A B C 1 2 3 2 3 1 1 3 2 2 1 3
Match A with BList AA. Data | 240.255.255.255 | 40.40.40.40B.Data | 22.21.23.34 | 255.255.255.255C.Data | 24.23.22.21 | 24.22.23.24 List B1.Unicast packet with in network...
rahul sharma 5
645
views
rahul sharma 5
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
0
votes
0
answers
1821
CN Calculate Number of hosts
The Internet is roughly doubling in size every 18 months. Approximate estimates put the number of hosts on it at 7 million in January 1996. Use this data to compute the expected number of Internet users in the year 2008. Can i apply compound interst formula here?
The Internet is roughly doubling in size every 18 months. Approximate estimates put the number of hosts on it at 7 million in January 1996. Use this data to compute the e...
rahul sharma 5
775
views
rahul sharma 5
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
1
votes
1
answer
1822
CN Topology
The internet is a collection of redundant high speed wide area links.Which network topology does the internet use? 1. Star 2. Ring 3.Mesh 4.Bus Please give valid reason to supprt your answer.
The internet is a collection of redundant high speed wide area links.Which network topology does the internet use? 1. Star2. Ring3.Mesh4.BusPlease give valid reason to su...
rahul sharma 5
1.8k
views
rahul sharma 5
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
2
votes
1
answer
1823
CN Boot P Protocol
In bootp protocol client puts all 0 in source IP and broadcast the packet.Then relay agent encapsulate that in a unicast packet and send to boot p server. How does boot p server know the Mac address of the client to which it is assigning the address ?
In bootp protocol client puts all 0 in source IP and broadcast the packet.Then relay agent encapsulate that in a unicast packet and send to boot p server.How does boot p ...
rahul sharma 5
395
views
rahul sharma 5
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
3
votes
2
answers
1824
CN ARP RARP
At which layer,ARP and RARP works?
At which layer,ARP and RARP works?
rahul sharma 5
1.2k
views
rahul sharma 5
asked
Aug 12, 2017
Computer Networks
computer-networks
+
–
1
votes
0
answers
1825
CN Leaky bucket
Assume the following configuration:- Bucket capacity = 1Mbps O/p Rate:- 8 Mbps Token rate:- 6 Mbps Now by using C+PS=MS formulae i can see that the burst of .5 can be handled by this. But can some one show me mathematically what will happen if a burst of 1 sec will come?
Assume the following configuration:-Bucket capacity = 1MbpsO/p Rate:- 8 MbpsToken rate:- 6 MbpsNow by using C+PS=MS formulae i can see that the burst of .5 can be handled...
rahul sharma 5
1.5k
views
rahul sharma 5
asked
Aug 11, 2017
Computer Networks
computer-networks
leaky-bucket
token-bucket
+
–
3
votes
2
answers
1826
CN Data link layer
True/False:- 1. The communication between Network layer and Mac sublayer is contention less. 2. The communication between Network layer and LLC sublayer is contention less.
True/False:-1. The communication between Network layer and Mac sublayer is contention less.2. The communication between Network layer and LLC sublayer is contention less....
rahul sharma 5
984
views
rahul sharma 5
asked
Aug 11, 2017
Computer Networks
computer-networks
link
layer
data
+
–
2
votes
1
answer
1827
CN Maximum sender window Size
In every sliding window protocol,the maximum sender window size is the number of frames that can be transferred by sender in RTT? Is this statement true?
In every sliding window protocol,the maximum sender window size is the number of frames that can be transferred by sender in RTT?Is this statement true?
rahul sharma 5
1.5k
views
rahul sharma 5
asked
Aug 10, 2017
Computer Networks
computer-networks
sliding-window
+
–
1
votes
1
answer
1828
Computer Networks Supernetting
If I need to have a network of 509 hosts using class C,then do i need to join 2 Class c networks or 3? One class C gives us 256-2=254 hosts in case of subnetting.Does the same hold in case of super netting also?Or does in super netting one class c can give 256 hosts?
If I need to have a network of 509 hosts using class C,then do i need to join 2 Class c networks or 3? One class C gives us 256-2=254 hosts in case of subnetting.Does th...
rahul sharma 5
1.4k
views
rahul sharma 5
asked
Aug 9, 2017
Computer Networks
computer-networks
network
+
–
1
votes
0
answers
1829
Computer Networking ip address questions
What will be the ip address-A, subnet mask-B, default gateway-C for the router A given in the below diagram Find A,B,C?
What will be the ip address-A, subnet mask-B, default gateway-C for the router A given in the below diagramFind A,B,C?
Pavan Kumar Munnam
1.6k
views
Pavan Kumar Munnam
asked
Aug 8, 2017
Computer Networks
computer-networks
network-addressing
ip-addressing
+
–
2
votes
3
answers
1830
computer network Subnet Mask
A class C network is assigned with a subnet mask of 255.255.255.248 . The total number of hosts possible in all the sub networks together in the above network is ....... Please help me to find the answer...
A class C network is assigned with a subnet mask of 255.255.255.248 . The total number of hosts possible in all the sub networks together in the above network is .......P...
mystylecse
6.5k
views
mystylecse
asked
Aug 6, 2017
Computer Networks
subnetting
computer-networks
+
–
Page:
« prev
1
...
56
57
58
59
60
61
62
63
64
65
66
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register