Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
5
votes
4
answers
2671
ISRO2008-5
In Ethernet, the source address field in the MAC frame is the _______ address. original sender's physical previous station's physical next destination's physical original sender's service port
In Ethernet, the source address field in the MAC frame is the _______ address.original sender's physicalprevious station's physicalnext destination's physicaloriginal sen...
go_editor
6.5k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2008
computer-networks
ethernet
+
–
7
votes
2
answers
2672
ISRO2008-3
The subnet mask $255.255.255.192$ extends the network portion to $16$ bits extends the network portion to $26$ bits extends the network portion to $36$ bits has no effect on the network portion of an IP address
The subnet mask $255.255.255.192$extends the network portion to $16$ bitsextends the network portion to $26$ bitsextends the network portion to $36$ bitshas no effect on ...
go_editor
5.0k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2008
computer-networks
subnetting
+
–
10
votes
5
answers
2673
ISRO2007-75
When a host on network A sends a message to a host on network B, which address does the router look at? Port IP Physical Subnet mask
When a host on network A sends a message to a host on network B, which address does the router look at?PortIPPhysicalSubnet mask
go_editor
6.9k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-layering
+
–
5
votes
3
answers
2674
ISRO2007-74
$\textsf{IEEE 802.11}$ is standard for Ethernet Bluetooth Broadband Wireless Wireless LANs
$\textsf{IEEE 802.11}$ is standard forEthernetBluetoothBroadband WirelessWireless LANs
go_editor
2.6k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
wireless-networks
+
–
8
votes
5
answers
2675
ISRO2007-73
Range of IP Address from $224.0.0.0$ to $239.255.255.255$ are Reserved for loopback Reserved for broadcast Used for multicast packets Reserved for future addressing
Range of IP Address from $224.0.0.0$ to $239.255.255.255$ areReserved for loopbackReserved for broadcastUsed for multicast packetsReserved for future addressing
go_editor
4.6k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
subnetting
+
–
8
votes
2
answers
2676
ISRO2007-71
Hashed message is signed by a sender using his public key his private key receiver’s public key receiver’s private key
Hashed message is signed by a sender usinghis public keyhis private keyreceiver’s public keyreceiver’s private key
go_editor
5.4k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
5
votes
1
answer
2677
ISRO2007-70
The standard for certificates used on internet is $\textsf{X.25}$ $\textsf{X.301}$ $\textsf{X.409}$ $\textsf{X.509}$
The standard for certificates used on internet is$\textsf{X.25}$$\textsf{X.301}$$\textsf{X.409}$$\textsf{X.509}$
go_editor
3.4k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
5
votes
2
answers
2678
ISRO2007-68
SSL is not responsible for Mutual authentication of client & server Secret communication Data Integrity protection Error detection and correction
SSL is not responsible forMutual authentication of client & serverSecret communicationData Integrity protectionError detection and correction
go_editor
4.3k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
7
votes
2
answers
2679
ISRO2007-66
Silly Window Syndrome is related to Error during transmission File transfer protocol Degrade in TCP performance Interface problem
Silly Window Syndrome is related toError during transmissionFile transfer protocolDegrade in TCP performanceInterface problem
go_editor
4.5k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
tcp
+
–
11
votes
3
answers
2680
ISRO2007-26
If there are five routers and six networks in intranet using link state routing, how many routing tables are there? $1$ $5$ $6$ $11$
If there are five routers and six networks in intranet using link state routing, how many routing tables are there?$1$$5$$6$$11$
go_editor
7.4k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
routing
link-state-routing
+
–
7
votes
2
answers
2681
ISRO2007-22
Phase transition for each bit are used in Amplitude modulation Carrier modulation Manchester encoding NRZ encoding
Phase transition for each bit are used inAmplitude modulationCarrier modulationManchester encodingNRZ encoding
go_editor
4.0k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
communication
+
–
8
votes
2
answers
2682
ISRO2007-21
An Ethernet hub functions as a repeater connects to a digital PBX connects to a token-ring network functions as a gateway
An Ethernet hubfunctions as a repeaterconnects to a digital PBXconnects to a token-ring networkfunctions as a gateway
go_editor
3.8k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
ethernet
+
–
0
votes
1
answer
2683
What should be the Token Holding Time
Can anyone explain why the answer is infinite time?
Can anyone explain why the answer is infinite time?
ShiveshRoy
1.4k
views
ShiveshRoy
asked
Jun 8, 2016
Computer Networks
computer-networks
token-ring
+
–
3
votes
2
answers
2684
UGC NET CSE | June 2014 | Part 2 | Question: 05
Match the following $:$ ... $\text{a-i; b-iii; c-ii; d-v; e-iv}$ $\text{a-i; b-ii; c-iv; d-iii; e-v}$
Match the following $:$$\begin{array}{cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Physical layer} & \text{i.} & \text{Allow resources to net...
makhdoom ghaya
4.1k
views
makhdoom ghaya
asked
Jun 8, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
network-layering
+
–
0
votes
0
answers
2685
Question on the effects of alteration in the cost of link onto the routing tables.
I have a little confusion about some concepts in Distance Vector Routing. Please help. Is it correct to say the following, with regard to Distance Vector routing: 1. Any finite change to the cost of a link will be ... in the next round of exchange, will contain the new values due to the change in cost of the link.
I have a little confusion about some concepts in Distance Vector Routing. Please help. Is it correct to say the following, with regard to Distance Vector routing:1. Any f...
rickeshjohn
530
views
rickeshjohn
asked
Jun 8, 2016
Computer Networks
computer-networks
distance-vector-routing
+
–
1
votes
2
answers
2686
UGC NET CSE | December 2015 | Part 3 | Question: 13
In a classful addressing the IP address with $0$(zero) as network number: refers to the current network refers to broadcast on the local network refers to the broadcast on a distant network refers to loopback testing
In a classful addressing the IP address with $0$(zero) as network number:refers to the current networkrefers to broadcast on the local networkrefers to the broadcast on a...
Alok12
4.0k
views
Alok12
asked
Jun 5, 2016
Computer Networks
computer-networks
network-addressing
ugcnetcse-dec2015-paper3
+
–
4
votes
2
answers
2687
UGC NET CSE | December 2015 | Part 3 | Question: 12
Consider a subnet with $720$ routers. If a three level hierarchy is chosen with $8$ clusters, each containing $9$ regions of $10$ routers, then total number of entries in the routing table is _______ $25$ $27$ $53$ $72$
Consider a subnet with $720$ routers. If a three level hierarchy is chosen with $8$ clusters, each containing $9$ regions of $10$ routers, then total number of entries in...
Alok12
7.2k
views
Alok12
asked
Jun 5, 2016
Computer Networks
computer-networks
routing
ugcnetcse-dec2015-paper3
+
–
0
votes
2
answers
2688
UGC NET CSE | June 2014 | Part 2 | Question: 04
The bit rate of a signal is $3000$ bps. If each signal unit carries $6$ bits, the baud rate of the signal is _________. $500$ baud/sec $1000$ baud/sec $3000$ baud/sec $18000$ baud/sec.
The bit rate of a signal is $3000$ bps. If each signal unit carries $6$ bits, the baud rate of the signal is _________. $500$ baud/sec $1000$ baud/sec $3000$ baud/sec $18...
makhdoom ghaya
5.4k
views
makhdoom ghaya
asked
Jun 5, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
serial-communication
+
–
1
votes
2
answers
2689
UGC NET CSE | June 2014 | Part 2 | Question: 03
The minimum frame length for $10$ Mbps Ethernet is ________ bytes and maximum is _______ bytes. $64$ & $128$ $128$ & $1518$ $1518$ & $3036$ $64$ & $1518$
The minimum frame length for $10$ Mbps Ethernet is ________ bytes and maximum is _______ bytes.$64$ & $128$$128$ & $1518$ $1518$ & $3036$$64$ & $1518$
makhdoom ghaya
9.8k
views
makhdoom ghaya
asked
Jun 5, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
ethernet
+
–
0
votes
2
answers
2690
UGC NET CSE | December 2015 | Part 3 | Question: 11
A network with bandwidth of $10$ Mbps can pass only an average of $15,000$ frames per minute with each frame carrying an average of $8,000$ bits. What is the throughput of this network ? $2$ Mbps $60$ Mbps $120$ Mbps $10$ Mbps
A network with bandwidth of $10$ Mbps can pass only an average of $15,000$ frames per minute with each frame carrying an average of $8,000$ bits. What is the throughput o...
Rohit kumar1
7.5k
views
Rohit kumar1
asked
Jun 4, 2016
Computer Networks
computer-networks
ugcnetcse-dec2015-paper3
+
–
0
votes
1
answer
2691
UGC NET CSE | December 2015 | Part 3 | Question: 10
The combination of an IP address and a port number is known as _____ network number socket address subnet mask number MAC address
The combination of an IP address and a port number is known as _____network numbersocket addresssubnet mask numberMAC address
Rohit kumar1
3.3k
views
Rohit kumar1
asked
Jun 4, 2016
Computer Networks
computer-networks
network-addressing
ugcnetcse-dec2015-paper3
+
–
0
votes
3
answers
2692
What is RTT ? Is it RTT = 2 * Tp + Tt or RTT = 2 * Tp ?
ALSO EXPLAIN THE CASE OF FULL DUPLEX AND HALF DUPLEX .
ALSO EXPLAIN THE CASE OF FULL DUPLEX AND HALF DUPLEX .
dakshgautam
4.4k
views
dakshgautam
asked
Jun 4, 2016
Computer Networks
computer-networks
+
–
5
votes
5
answers
2693
ISRO2009-5
What is the primary purpose of a VLAN? Demonstrating the proper layout for a network Simulating a network To create a virtual private network Segmenting a network inside a switch or device
What is the primary purpose of a VLAN?Demonstrating the proper layout for a networkSimulating a networkTo create a virtual private networkSegmenting a network inside a sw...
Desert_Warrior
6.3k
views
Desert_Warrior
asked
Jun 3, 2016
Computer Networks
isro2009
computer-networks
+
–
6
votes
2
answers
2694
ISRO2009-3
The address resolution protocol (ARP) is used for Finding the IP address from the DNS Finding the IP address of the default gateway Finding the IP address that corresponds to a MAC address Finding the MAC address that corresponds to an IP address
The address resolution protocol (ARP) is used forFinding the IP address from the DNSFinding the IP address of the default gatewayFinding the IP address that corresponds t...
Desert_Warrior
2.2k
views
Desert_Warrior
asked
Jun 3, 2016
Computer Networks
isro2009
computer-networks
network-protocols
+
–
1
votes
0
answers
2695
ISI2012-PCB-CS-6b
A network has $125$ stations attached by a dedicated pair of lines to a hub in a star topology. The distance from each station to the hub is $25$ meters, the speed of the transmission lines is $10$ Mbps, all frames are of length $12500$ bytes, and ... time. Assume that each station can transmit up to a maximum of $k = 2$ frames/token. Find the maximum throughput of the network.
A network has $125$ stations attached by a dedicated pair of lines to a hub in a star topology. The distance from each station to the hub is $25$ meters, the speed of the...
go_editor
663
views
go_editor
asked
Jun 3, 2016
Computer Networks
descriptive
isi2012-pcb-cs
computer-networks
throughput
+
–
5
votes
2
answers
2696
ISRO2009-7
Advanced Encryption Standard (AES) is based on Asymmetric key algorithm Symmetric key algorithm Public key algorithm Key exchange
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
jaiganeshcse94
3.9k
views
jaiganeshcse94
asked
Jun 2, 2016
Computer Networks
isro2009
computer-networks
cryptography
network-security
+
–
2
votes
2
answers
2697
ISI2013-PCB-CS-6a
A block of bits with $n$ rows and $m$ columns uses horizontal and vertical parity bits for error detection. If exactly 4 bits are in error during transmission, derive an expression for the probability that the error will be detected.
A block of bits with $n$ rows and $m$ columns uses horizontal and vertical parity bits for error detection. If exactly 4 bits are in error during transmission, derive an ...
go_editor
1.1k
views
go_editor
asked
Jun 1, 2016
Computer Networks
descriptive
isi2013-pcb-cs
error-detection
computer-networks
+
–
2
votes
2
answers
2698
UGC NET CSE | June 2012 | Part 3 | Question: 60
Radio signals generally propagate according to the following mechanisms: Modulation, Amplification, Scattering Reflection, Diffraction, Scattering Amplification, Diffraction, Modulation Reflection, Amplification, Diffraction
Radio signals generally propagate according to the following mechanisms:Modulation, Amplification, ScatteringReflection, Diffraction, ScatteringAmplification, Diffraction...
Sanjay Sharma
1.7k
views
Sanjay Sharma
asked
Jun 1, 2016
Computer Networks
ugcnetcse-june2012-paper3
computer-networks
transmission-media
mobile-communication
+
–
1
votes
2
answers
2699
ISI2014-PCB-CS-6b
In a LAN, $n^2$ routers are connected in an $n \times n$ mesh such that $R(i, j)$ represents a router in the $i$-th row and $j$-th column of the mesh. Find how many distinct shortest paths exist between two routers $R(i_1, j_1)$ ... how many of these distinct shortest paths will be node disjoint, i.e., with no common node except the source and the destination? Justify your answer.
In a LAN, $n^2$ routers are connected in an $n \times n$ mesh such that $R(i, j)$ represents a router in the $i$-th row and $j$-th column of the mesh.Find how many distin...
go_editor
753
views
go_editor
asked
May 31, 2016
Computer Networks
isi2014-pcb-cs
descriptive
computer-networks
routing
+
–
11
votes
4
answers
2700
ISI2015-PCB-CS-4b
Stations $A$ and $B$ are connected through a line of bandwidth $64$ $\text{kbps}$. Station $A$ uses $16$ $\text{byte}$ packets to transmit messages to $B$ using a sliding window protocol. The round trip propagation delay between $A$ ... use to maximize the line utilization. Assume that the ack frame is of negligible size and processing delay may be ignored. Justify your answer.
Stations $A$ and $B$ are connected through a line of bandwidth $64$ $\text{kbps}$. Station $A$ uses $16$ $\text{byte}$ packets to transmit messages to $B$ using a sliding...
go_editor
1.9k
views
go_editor
asked
May 30, 2016
Computer Networks
descriptive
isi2015-pcb-cs
computer-networks
sliding-window
+
–
Page:
« prev
1
...
85
86
87
88
89
90
91
92
93
94
95
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register