Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
0
votes
0
answers
2011
ISRO 2011-ECE COmputer Networks
The critical angle of an optical fiber is given by __________ where n1 is refractive index of medium 1 and n2 is the refractive index of medium 2 a) $sin^{-1} $(n2/n1) b) $sin^{-1} $(n1/n2) c) $sin^{-1} $(n2*n1) d) $sin^{-1} $ n2
The critical angle of an optical fiber is given by __________ where n1 is refractive index of medium 1 and n2 is the refractive index of medium 2a) $sin^{-1} $(n2/n1)b) $...
sh!va
301
views
sh!va
asked
Feb 28, 2017
Computer Networks
isro-ece
isro2011-ece
computer-networks
+
–
0
votes
0
answers
2012
ISRO 2011-ECE Computer networks
The modulation normally used with digital data is a) AM b) FM c) SSB d) QPSK
The modulation normally used with digital data isa) AMb) FMc) SSBd) QPSK
sh!va
1.9k
views
sh!va
asked
Feb 28, 2017
Computer Networks
isro-ece
isro2011-ece
computer-networks
+
–
0
votes
0
answers
2013
ISRO 2011-ECE Computer Networks
In satellite communication, frequency modulation is used because satellite channel has a. High Modulation index b. Small bandwith and negligible noise c. Large bandwidth and severe noise d. Maximum Bandwidth and Minimum noise
In satellite communication, frequency modulation is used because satellite channel hasa. High Modulation indexb. Small bandwith and negligible noisec. Large bandwidth and...
sh!va
381
views
sh!va
asked
Feb 28, 2017
Computer Networks
computer-networks
isro-ece
isro2011-ece
+
–
0
votes
0
answers
2014
ISRO 2011-ECE Networks
The channel capacity under the Gaussian noise environment for a discrete memory less channel with a bandwidth of 4 MHz and SNR 31 is a. 20 Mbps b. 4 Mbps c. 8 Kbps d. 4 Kbps
The channel capacity under the Gaussian noise environment for a discrete memory less channel with a bandwidth of 4 MHz and SNR 31 isa. 20 Mbpsb. 4 Mbpsc. 8 Kbpsd. 4 Kbps
sh!va
543
views
sh!va
asked
Feb 28, 2017
Computer Networks
computer-networks
isro2011-ece
isro-ece
+
–
0
votes
1
answer
2015
Teaching Recruitment Board, Tamilnadu
A system send 15 packets, each of size 1000 bits over a 1Mbps channel with 20ms RTT. The utilization percentage of the channel is:
A system send 15 packets, each of size 1000 bits over a 1Mbps channel with 20ms RTT. The utilization percentage of the channel is:
sivan
544
views
sivan
asked
Feb 27, 2017
Computer Networks
computer-networks
+
–
1
votes
0
answers
2016
ISRO2012-ECE Networks
Following constellation diagram represents: $16$ PSK $16$ QAM $16$ APSK All the above
Following constellation diagram represents:$16$ PSK$16$ QAM$16$ APSKAll the above
sh!va
596
views
sh!va
asked
Feb 27, 2017
Computer Networks
isro-ece
isro2012-ece
computer-networks
+
–
1
votes
1
answer
2017
ISRO2014-ECE : Network
In satellite communication, scrambling is mainly used for: Clock recovery Encryption limiting power spectral density bandwidth efficiency
In satellite communication, scrambling is mainly used for:Clock recoveryEncryptionlimiting power spectral densitybandwidth efficiency
sh!va
1.0k
views
sh!va
asked
Feb 27, 2017
Computer Networks
isro-ece
isro2014-ece
computer-networks
+
–
0
votes
0
answers
2018
Stop and Wait
In calculating efficiency of stop and wait protocol, if its given that the information frame is, say 80 bytes and overhead data(header?) is 20 bytes, then we'll calculate transmission time of 100 bytes or 80 bytes, as part of the process? I am asking coz this *is* bringing a difference in numerical value of my answer.
In calculating efficiency of stop and wait protocol, if its given that the information frame is, say 80 bytes and overhead data(header?) is 20 bytes, then we'll calculate...
Newplayerr
466
views
Newplayerr
asked
Feb 26, 2017
Computer Networks
stop-and-wait
computer-networks
+
–
1
votes
1
answer
2019
ISRO2014-ECE Computer Networks
In a fiber-optic cable, which phenomenon occurs for signal to propagate along the inner core: Modulation Reflection Refraction All of the above
In a fiber-optic cable, which phenomenon occurs for signal to propagate along the inner core:ModulationReflectionRefractionAll of the above
sh!va
1.0k
views
sh!va
asked
Feb 22, 2017
Computer Networks
computer-networks
isro2014-ece
isro-ece
+
–
1
votes
1
answer
2020
ISRO2014-EC Computer Network
Match the following: A Gaussian distribution 1 Calls on a telephone channel B Rayleigh distribution 2 Random number C Poisson distribution 3 Thermal noise D Uniform distribution 4 Fading channel in wireless communication $\text{A-3, B-1, C-4, D-2}$ $\text{A-3, B-4, C-2, D-1}$ $\text{A-1, B-4, C-3, D-2}$ $\text{A-3, B-4, C-1, D-2}$
Match the following:AGaussian distribution1Calls on a telephone channelBRayleigh distribution 2Random numberCPoisson distribution3Thermal noiseDUniform distribution4Fadin...
sh!va
486
views
sh!va
asked
Feb 22, 2017
Computer Networks
isro-ece
isro2014-ece
computer-networks
+
–
2
votes
1
answer
2021
ISRO2015-EC Computer networks
A communication channel is having a bandwidth of $3000$ Hz. The transmitted power is such that the received Signal-to-Noise ratio is $1023.$ The maximum data rate that can be transmitted error-free through the channel is: $3$ Kbps $3$ Mbps $30$ Kbps $300$ Kbps
A communication channel is having a bandwidth of $3000$ Hz. The transmitted power is such that the received Signal-to-Noise ratio is $1023.$ The maximum data rate that ca...
sh!va
1.5k
views
sh!va
asked
Feb 22, 2017
Computer Networks
isro2015-ece
computer-networks
isro-ece
+
–
1
votes
2
answers
2022
Broadcast MAC Address
Which of the following frames would be flooded on a switch port? Frame with source address as FF-FF-FF-FF-FF-FF Frame with destination mac-address as FF-FF-FF-FF-FF-FF. Frames which do not have the destination mac-address known in the mac-address table of the switch. None of the above.
Which of the following frames would be flooded on a switch port?Frame with source address as FF-FF-FF-FF-FF-FFFrame with destination mac-address as FF-FF-FF-FF-FF-FF.Fram...
sh!va
787
views
sh!va
asked
Feb 22, 2017
Computer Networks
computer-networks
subnetting
+
–
0
votes
1
answer
2023
FTP vs HTTP: Computer networks
A user clicks on a link on a website to download a file. Which application layer protocol is/are being used FTP HTTP a. 1 only b. 2 only c. both 1 and 2 d. neither 1 nor 2
A user clicks on a link on a website to download a file. Which application layer protocol is/are being usedFTPHTTPa. 1 onlyb. 2 onlyc. both 1 and 2d. neither 1 nor 2
sh!va
490
views
sh!va
asked
Feb 22, 2017
Computer Networks
computer-networks
+
–
1
votes
1
answer
2024
ISRO2015-ECE Networks
A signal transmitted from an Earth station bounces back from a geostationary satellite, with an altitude of $35864$ km from the Earth surface. The range from the Earth station, is $38200$ km. The round trip time is about: (excluding processing delays and assuming $c= 3 \times 10^8\;\text{m/s})$ $255$ ms $127$ ms $239$ ms $120$ ms
A signal transmitted from an Earth station bounces back from a geostationary satellite, with an altitude of $35864$ km from the Earth surface. The range from the Earth st...
sh!va
811
views
sh!va
asked
Feb 21, 2017
Computer Networks
computer-networks
isro2015-ece
+
–
1
votes
0
answers
2025
ISRO2015-ECE Networks
Which of the following modulation scheme requires minimum power for transmission? QPSK $16$-QAM $8$-PSK $64$-QAM
Which of the following modulation scheme requires minimum power for transmission?QPSK$16$-QAM$8$-PSK$64$-QAM
sh!va
590
views
sh!va
asked
Feb 21, 2017
Computer Networks
isro2015-ece
computer-networks
+
–
1
votes
2
answers
2026
ISRO2016-ECE Networks
A typical optical fiber has high refractive index core & low refractive index cladding Low refractive index core & high refractive index cladding Uniform refractive index core surrounded by variable refractive index cladding None of the above
A typical optical fiber hashigh refractive index core & low refractive index claddingLow refractive index core & high refractive index claddingUniform refractive index co...
sh!va
564
views
sh!va
asked
Feb 21, 2017
Computer Networks
isro2016-ece
computer-networks
+
–
1
votes
1
answer
2027
ISRO2016-ECE Networks
Hamming codes are used for Burst error correction Signal error correction Both (a) and (b) None of the above
Hamming codes are used forBurst error correctionSignal error correctionBoth (a) and (b)None of the above
sh!va
525
views
sh!va
asked
Feb 21, 2017
Computer Networks
isro2016-ece
computer-networks
+
–
1
votes
1
answer
2028
ISRO2016-ECE Networks
An FM signal at $10.7$ MHz IF needs to be digitized for demodulation in a digital domain. If the bandwidth of this signal is $200$ kHz, the maximum usable sampling frequency is $200$ kHz $600$ kHz $400$ kHz $800$ kHz
An FM signal at $10.7$ MHz IF needs to be digitized for demodulation in a digital domain. If the bandwidth of this signal is $200$ kHz, the maximum usable sampling freque...
sh!va
739
views
sh!va
asked
Feb 21, 2017
Computer Networks
isro2016-ece
computer-networks
+
–
1
votes
1
answer
2029
Datagram switching and Virtual circuit
I. Datagram switching does not have set up and tear down phases. hence it is faster than virtual circuit approach II. Virtual circuit approach uses simple VC ID to decide next hope rather than complete addressing information. hence it is faster than datagram ... I only b) II only c) I is correct but reason is wrong d) II is correct, but reason is wrong
I. Datagram switching does not have set up and tear down phases. hence it is faster than virtual circuit approachII. Virtual circuit approach uses simple VC ID to decide ...
sh!va
1.2k
views
sh!va
asked
Feb 20, 2017
Computer Networks
computer-networks
+
–
4
votes
4
answers
2030
Congestion avoidance in TCP
During Congestion avoidance(Additive Increase) in tcp when 3 duplicate ACKs arrived then during that arrival phase by which algorithm did the sender window adopt increment procedure? a) Sender window uses additive increase b)Sender window uses slow start which option is correct?
During Congestion avoidance(Additive Increase) in tcp when 3 duplicate ACKs arrived then during that arrival phase by which algorithm did the sender window adopt increme...
Shubham Sharma 2
2.5k
views
Shubham Sharma 2
asked
Feb 19, 2017
Computer Networks
computer-networks
tcp
congestion-control
+
–
21
votes
5
answers
2031
GATE CSE 2017 Set 2 | Question: 35
Consider two hosts $X$ and $Y$, connected by a single direct link of rate $10^6\; \text{bits/sec}$. The distance between the two hosts is $10,000\;\text{km}$ and the propagation speed along the link is $2 \times 10^8 \;\text{m/sec}$. Host $X$ ... $p$ and $q$ are $p=50$ and $q=100$ $p=50$ and $q=400$ $p=100$ and $q=50$ $p=400$ and $q=50$
Consider two hosts $X$ and $Y$, connected by a single direct link of rate $10^6\; \text{bits/sec}$. The distance between the two hosts is $10,000\;\text{km}$ and the prop...
Madhav
8.1k
views
Madhav
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set2
computer-networks
network-flow
+
–
44
votes
3
answers
2032
GATE CSE 2017 Set 2 | Question: 20
The maximum number of $\textsf{IPv4}$ router addresses that can be listed in the record route (RR) option field of an $\textsf{IPv4}$ header is______.
The maximum number of $\textsf{IPv4}$ router addresses that can be listed in the record route (RR) option field of an $\textsf{IPv4}$ header is______.
khushtak
16.5k
views
khushtak
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set2
computer-networks
ip-addressing
numerical-answers
+
–
39
votes
3
answers
2033
GATE CSE 2017 Set 2 | Question: 34
Consider the binary code that consists of only four valid codewords as given below: $00000, 01011, 10101, 11110$ Let the minimum Hamming distance of the code $p$ and the maximum number of erroneous bits that can be corrected by the code be $q$. Then the values of $p$ and $q$ are $p=3$ and $q=1$ $p=3$ and $q=2$ $p=4$ and $q=1$ $p=4$ and $q=2$
Consider the binary code that consists of only four valid codewords as given below:$00000, 01011, 10101, 11110$Let the minimum Hamming distance of the code $p$ and the ma...
Arjun
15.6k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set2
computer-networks
error-detection
+
–
37
votes
4
answers
2034
GATE CSE 2017 Set 2 | Question: 09
Consider the following statements about the routing protocols. Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) in an $\textsf{IPv4}$ network. RIP uses distance vector routing RIP packets are sent using UDP OSPF packets are sent using TCP OSPF operation ... are CORRECT? I and IV only I, II and III only I, II and IV only II, III and IV only
Consider the following statements about the routing protocols. Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) in an $\textsf{IPv4}$ network.RIP us...
khushtak
12.4k
views
khushtak
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set2
computer-networks
routing
+
–
58
votes
7
answers
2035
GATE CSE 2017 Set 1 | Question: 45
The values of parameters for the Stop-and-Wait ARQ protocol are as given below: Bit rate of the transmission channel $= 1$ Mbps. Propagation delay from sender to receiver $= 0.75$ ms. Time to process a frame $= 0.25$ ms. Number ... (expressed in percentage) of the Stop-and-Wait ARQ protocol for the above parameters is _____________ (correct to $2$ decimal places).
The values of parameters for the Stop-and-Wait ARQ protocol are as given below:Bit rate of the transmission channel $= 1$ Mbps.Propagation delay from sender to receiver $...
Arjun
33.0k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
stop-and-wait
numerical-answers
normal
+
–
39
votes
12
answers
2036
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.9k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
34
votes
3
answers
2037
GATE CSE 2017 Set 1 | Question: 32
A computer network uses polynomials over $GF(2)$ for error checking with $8$ bits as information bits and uses $x^{3}+x+1$ as the generator polynomial to generate the check bits. In this network, the message $01011011$ is transmitted as: $01011011010$ $01011011011$ $01011011101$ $01011011100$
A computer network uses polynomials over $GF(2)$ for error checking with $8$ bits as information bits and uses $x^{3}+x+1$ as the generator polynomial to generate the che...
Arjun
11.8k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
crc-polynomial
normal
+
–
39
votes
3
answers
2038
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
Arjun
12.6k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
+
–
47
votes
3
answers
2039
GATE CSE 2017 Set 2 | Question: 18
Consider socket API on a Linux machine that supports connected UDP sockets. A connected UDP socket is a UDP socket on which connect function has already been called. Which of the following statements is/are CORRECT? A connected UDP socket can be used to communicate with multiple ... $\text{I}$ and $\text{II}$ Neither $\text{I}$ nor $\text{II}$
Consider socket API on a Linux machine that supports connected UDP sockets. A connected UDP socket is a UDP socket on which connect function has already been called. Whic...
Madhav
15.1k
views
Madhav
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set2
computer-networks
udp
+
–
41
votes
7
answers
2040
GATE CSE 2017 Set 1 | Question: 14
Consider a TCP client and a TCP server running on two different machines. After completing data transfer, the TCP client calls close to terminate the connection and a FIN segment is sent to the TCP server. Server-side TCP responds by sending an ACK, which is ... TCP connection wait for the FIN from the server-side TCP? LAST-ACK TIME-WAIT FIN-WAIT-$1$ FIN-WAIT-$2$
Consider a TCP client and a TCP server running on two different machines. After completing data transfer, the TCP client calls close to terminate the connection and a FIN...
yg92
13.9k
views
yg92
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
tcp
+
–
Page:
« prev
1
...
63
64
65
66
67
68
69
70
71
72
73
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register