Recent questions tagged computer-networks

6 votes
4 answers
2611
Dynamic routing protocol enable routers toDynamically discover and maintain routesDistribute routing updates to other routersReach agreement with other routers about the ...
6 votes
2 answers
2612
A mechanism or technology used in Ethernet by which two connected devices choose common transmission parameters such as speed, duplex mode and flow control is calledAutos...
4 votes
3 answers
2613
Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used?...
0 votes
1 answer
2617
Can anyone please explain me why HTTP is stateless protocol
2 votes
2 answers
2619
4 votes
2 answers
2620
The process of modifying IP address information in IP packet headers while in transit across a traffic routing device is calledPort address translation (PAT)Network addre...
1 votes
1 answer
2623
Match the following with respect to the mobile computing technologies $:$$\begin{array}{cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{GPRS} & \text{i...
1 votes
2 answers
2624
why hash function is used in digital signature and why it is many - to - one??please explain.
4 votes
4 answers
2626
What is routing algorithm used by OSPF routing protocol?Distance vectorFloodingPath vectorLink state
7 votes
1 answer
2628
One SAN switch has $24$ ports. All $24$ supports $8$ Gbps Fiber Channel technology. What is the aggregate bandwidth of that SAN switch?$96$ Gbps$192$ Mbps$512$ Gbps$192$ ...
7 votes
3 answers
2631
The $\textsf{IEEE}$ standard for WiMax technology is$\textsf{IEEE 802.16}$$\textsf{IEEE 802.36}$$\textsf{IEEE 812.16}$$\textsf{IEEE 806.16}$
5 votes
4 answers
2632
An example of poly-alphabetic substitution isP-boxS-boxCaesar cipherVigenere cipher
1 votes
2 answers
2633
0 votes
1 answer
2636
6 votes
2 answers
2637
The network protocol which is used to get MAC address of a node by providing IP address isSMTPARPRIPBOOTP
6 votes
2 answers
2638
Data is transmitted continuously at $2.048$ Mbps rate for $10$ hours and received $512$ bits errors. What is the bit error rate?$\text{6.9 e-9}$$\text{6.9 e-6}$$\text{69 ...
0 votes
1 answer
2639
In _______-key cryptography, everyone has access to all the public keys.A. PRivateB. PublicC. SymmetricD. Certfied
16 votes
3 answers
2640
Which layers of the OSI reference model are host-to-host layers?Transport, session, presentation, applicationSession, presentation, applicationDatalink, transport, presen...