Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
4
votes
4
answers
2701
ISRO2009-74
Use of IPSEC in tunnel mode results in IP packet with same header IP packet with new header IP packet without header No changes in IP packet
Use of IPSEC in tunnel mode results inIP packet with same headerIP packet with new headerIP packet without headerNo changes in IP packet
Anuanu
3.4k
views
Anuanu
asked
May 30, 2016
Computer Networks
isro2009
computer-networks
ip-packet
+
–
3
votes
4
answers
2702
ISI2015-PCB-CS-4a
Consider the use of Cyclic Redundancy Code (CRC) with generator polynomial $G(x)$ for error detection. Recall that error detection with a CRC works by appending the CRC value to the bit sequence to make it a multiple of $G(x)$. Calculate the CRC value of the bit ... burst error of length $5$ in such a way that the error cannot be detected by the CRC with the $G(x)$ given above.
Consider the use of Cyclic Redundancy Code (CRC) with generator polynomial $G(x)$ for error detection. Recall that error detection with a CRC works by appending the CRC v...
go_editor
2.2k
views
go_editor
asked
May 29, 2016
Computer Networks
descriptive
isi2015-pcb-cs
computer-networks
error-detection
crc-polynomial
+
–
0
votes
1
answer
2703
Lectures for Basics of Wi-Fi and Network security
Does anyone has any online resource that contains good lectures on Basics of Wi-Fi and Network security? Thanks in advance .
Does anyone has any online resource that contains good lectures on Basics of Wi-Fi and Network security? Thanks in advance .
Aakash Das
372
views
Aakash Das
asked
May 28, 2016
Computer Networks
computer-networks
+
–
3
votes
3
answers
2704
ISRO2015-44
The DNS maps the IP address to A binary address as strings A n alphanumeric address A hierarchy of domain names A hexadecimal address
The DNS maps the IP address toA binary address as stringsA n alphanumeric addressA hierarchy of domain namesA hexadecimal address
Desert_Warrior
5.9k
views
Desert_Warrior
asked
May 24, 2016
Computer Networks
isro2015
computer-networks
dns
+
–
0
votes
1
answer
2705
Ccna
Is the ccna r&s coaching is beneficial to get good knowledge for networks basics? What are the good coaching for ccna in Delhi?
Is the ccna r&s coaching is beneficial to get good knowledge for networks basics?What are the good coaching for ccna in Delhi?
Sourabh Kumar
457
views
Sourabh Kumar
asked
May 23, 2016
Computer Networks
computer-networks
+
–
7
votes
2
answers
2706
ISRO2009-6
$\textsf{SHA-1}$ is a encryption algorithm decryption algorithm key exchange algorithm message digest function
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
suryaji
2.3k
views
suryaji
asked
May 13, 2016
Computer Networks
isro2009
computer-networks
network-security
+
–
0
votes
1
answer
2707
Assume that source S and destination D are connected through two intermediate routers labeled R.
Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.
Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.
Vivek Jain
3.0k
views
Vivek Jain
asked
May 10, 2016
Computer Networks
computer-networks
+
–
1
votes
1
answer
2708
UGC NET CSE | December 2012 | Part 2 | Question: 37
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three different configurations. ______ rounds with a key size of 128-bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 –bits 5, 7, 15 10, 12, 14 5, 6, 7 20, 12, 14
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three different configurations. ______ rounds with a key size of 128-b...
Sanjay Sharma
2.5k
views
Sanjay Sharma
asked
May 9, 2016
Computer Networks
ugcnetcse-dec2012-paper2
computer-networks
network-security
+
–
0
votes
1
answer
2709
UGC NET CSE | June 2012 | Part 2 | Question: 28
Mobile IP provides two basic functions Route discovery and registration Agent discovery and registration IP binding and registration None of the above
Mobile IP provides two basic functionsRoute discovery and registrationAgent discovery and registrationIP binding and registrationNone of the above
Sanjay Sharma
2.1k
views
Sanjay Sharma
asked
May 7, 2016
Computer Networks
ugcnetcse-june2012-paper2
computer-networks
mobile-communication
wireless-communication
+
–
5
votes
2
answers
2710
total address space
For a computer address,if we reduce the no of bits by 2 and if we double the addressability then total address space will be 1) Doubled 2) halved 3) Remain Same 4) None What is meant by Addressablity???
For a computer address,if we reduce the no of bits by 2 and if we double the addressability then total address space will be1) Doubled 2) halved 3) Remain Same 4) NoneWh...
bad_engineer
1.1k
views
bad_engineer
asked
May 1, 2016
Operating System
computer-networks
memory-management
operating-system
address
+
–
2
votes
2
answers
2711
ISRO-2013-45
A packet filtering firewall can Deny certain users from accessing a service Block worms and viruses from entering the network Disallow some files from being accessed through FTP Block some hosts from accessing the network
A packet filtering firewall canDeny certain users from accessing a serviceBlock worms and viruses from entering the networkDisallow some files from being accessed through...
makhdoom ghaya
8.3k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
network-security
+
–
4
votes
2
answers
2712
ISRO-2013-44
Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate? Solid bucket algorithm Spanning tree algorithm Hocken helm algorithm Leaky bucket algorithm
Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate?Solid bucket algorithmSpanning tree algorithmHocken helm algorith...
makhdoom ghaya
5.2k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
+
–
3
votes
3
answers
2713
ISRO-2013-43
What is IP class and number of sub-networks if the subnet mask is $255.224.0.0$? Class $A$, $3$ Class $A$, $8$ Class $B$, $3$ Class $B$, $32$
What is IP class and number of sub-networks if the subnet mask is $255.224.0.0$?Class $A$, $3$Class $A$, $8$Class $B$, $3$Class $B$, $32$
makhdoom ghaya
5.9k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
subnetting
+
–
7
votes
3
answers
2714
ISRO-2013-42
IPv6 does not support which of the following addressing modes? Unicast addressing Multicast addressing Broadcast addressing Anycast addressing
IPv6 does not support which of the following addressing modes?Unicast addressingMulticast addressingBroadcast addressingAnycast addressing
makhdoom ghaya
5.7k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
ipv6
+
–
7
votes
6
answers
2715
ISRO-2013-41
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is $20$ns and the propagation time is $30$ns? $20$% $25$% $40$% $66$%
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is $20$ns and the propagation time is $30$ns?$20$%$25$%$40$%$66$%
makhdoom ghaya
7.6k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
stop-and-wait
+
–
5
votes
1
answer
2716
ISRO-2013-40
If the frame to be transmitted is $1101011011$ and the CRC polynomial to be used for generating checksum is $x^{4}+x+1$, than what is the transmitted frame? $11010110111011$ $11010110111101$ $11010110111110$ $11010110111001$
If the frame to be transmitted is $1101011011$ and the CRC polynomial to be used for generating checksum is $x^{4}+x+1$, than what is the transmitted frame?$1101011011101...
makhdoom ghaya
6.8k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
crc-polynomial
+
–
5
votes
2
answers
2717
ISRO-2013-39
Ethernet layer- $2$ switch is a network element type which gives. Different collision domain and same broadcast domain. Different collision domain and different broadcast domain. Same collision domain and same broadcast domain. Same collision domain and different broadcast domain.
Ethernet layer- $2$ switch is a network element type which gives.Different collision domain and same broadcast domain.Different collision domain and different broadcast d...
makhdoom ghaya
4.0k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
ethernet
+
–
3
votes
3
answers
2718
ISRO-2013-38
In the Ethernet, which field is actually added at the physical layer and is not part of the frame. Preamble CRC Address Location
In the Ethernet, which field is actually added at the physical layer and is not part of the frame.PreambleCRCAddressLocation
makhdoom ghaya
6.0k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
ethernet
+
–
55
votes
8
answers
2719
GATE CSE 2004 | Question: 57
Consider three IP networks $A, B$ and $C$. Host $H_A$ in network $A$ sends messages each containing $180$ $bytes$ of application data to a host $H_C$ in network $C$. The TCP layer prefixes $20$ byte header to the message. This passes through an intermediate network $B$ ... overheads. $325.5$ $\text{Kbps}$ $354.5$ $\text{Kbps}$ $409.6$ $\text{Kbps}$ $512.0$ $\text{Kbps}$
Consider three IP networks $A, B$ and $C$. Host $H_A$ in network $A$ sends messages each containing $180$ $bytes$ of application data to a host $H_C$ in network $C$. The ...
go_editor
19.0k
views
go_editor
asked
Apr 24, 2016
Computer Networks
gatecse-2004
computer-networks
ip-addressing
tcp
normal
+
–
0
votes
3
answers
2720
Let bandwidth of a token ring is 4 Mbps
Let bandwidth of a token ring is 4 Mbps and THT be 15ms. What is the maximum frame size and maximum payload size
Let bandwidth of a token ring is 4 Mbps and THT be 15ms. What is the maximum frame sizeand maximum payload size
Brij Mohan Gupta
3.1k
views
Brij Mohan Gupta
asked
Apr 23, 2016
Computer Networks
computer-networks
+
–
88
votes
7
answers
2721
GATE CSE 2009 | Question: 58
Frames of $1000\text{ bits}$ are sent over a $10^6$ bps duplex link between two hosts. The propagation time is $25ms$. Frames are to be transmitted into this link to maximally pack them in transit (within the link). Let $I$ be ... before starting transmission of the next frame? (Identify the closest choice ignoring the frame processing time) $16ms$ $18ms$ $20ms$ $22ms$
Frames of $1000\text{ bits}$ are sent over a $10^6$ bps duplex link between two hosts. The propagation time is $25ms$. Frames are to be transmitted into this link to maxi...
go_editor
30.2k
views
go_editor
asked
Apr 23, 2016
Computer Networks
gatecse-2009
computer-networks
sliding-window
normal
+
–
40
votes
8
answers
2722
GATE CSE 2010 | Question: 55
Consider a network with $6$ routers $R1$ to $R6$ connected with links having weights as shown in the following diagram. Suppose the weights of all unused links are changed to $2$ and the distance vector algorithm is used again until all routing tables stabilize. How many links will now remain unused? $0$ $1$ $2$ $3$
Consider a network with $6$ routers $R1$ to $R6$ connected with links having weights as shown in the following diagram.Suppose the weights of all unused links are changed...
go_editor
13.1k
views
go_editor
asked
Apr 21, 2016
Computer Networks
gatecse-2010
computer-networks
routing
distance-vector-routing
normal
+
–
57
votes
6
answers
2723
GATE CSE 2011 | Question: 53
Consider a network with five nodes, $N1$ to $N5$, as shown as below. The network uses a Distance Vector Routing protocol. Once the routes have been stabilized, the distance vectors at different nodes are as follows. N1: $(0, 1, 7, 8, 4)$ ... the NEXT ROUND of update, what will be the cost to $N1$ in the distance vector of $N3$ ? $3$ $9$ $10$ $\infty$
Consider a network with five nodes, $N1$ to $N5$, as shown as below.The network uses a Distance Vector Routing protocol. Once the routes have been stabilized, the distanc...
go_editor
23.7k
views
go_editor
asked
Apr 21, 2016
Computer Networks
gatecse-2011
computer-networks
routing
distance-vector-routing
normal
+
–
0
votes
2
answers
2724
How to find Modular Arithmetic ?
(a) Compute (7*11*711*777) mod 13 by modular arithmetic. (b) Compute (666^77) mod 11. Please tell me the procedure to solve such a question not just Answer .I know the answer.
(a) Compute (7*11*711*777) mod 13 by modular arithmetic.(b) Compute (666^77) mod 11.Please tell me the procedure to solve such a question not just Answer .I know the ...
shekhar chauhan
833
views
shekhar chauhan
asked
Apr 16, 2016
Mathematical Logic
computer-networks
engineering-mathematics
+
–
0
votes
1
answer
2725
UGC NET CSE | December 2012 | Part 3 | Question: 68
An example of a dictionary-based coding technique is Run-length coding Huffman coding Predictive coding LZW coding
An example of a dictionary-based coding technique isRun-length codingHuffman codingPredictive codingLZW coding
Sanjay Sharma
3.1k
views
Sanjay Sharma
asked
Apr 13, 2016
Computer Networks
ugcnetcse-dec2012-paper3
computer-networks
network-security
encoding
+
–
3
votes
2
answers
2726
from swp
in what protocol or protocols, it is possible for the sender to receive an ack for a packet that falls outside of its current window a. stop and wait b. selective repeat c.gbn d. all of the above
in what protocol or protocols, it is possible for the sender to receive an ack for a packet that falls outside of its current window a. stop and wait b. select...
kvkumar
1.1k
views
kvkumar
asked
Apr 13, 2016
Computer Networks
computer-networks
sliding-window
+
–
0
votes
0
answers
2727
Time taken for the entire message to reach from source to destination
A 64000-byte message is to be transmitted over a 2-hop path in a storeand- forward packet-switching network. The network limits packets to a maximum size of 2032 bytes including a 32-byte header. The transmission lines in the ... + 31*32.512 msec= 1115.398 msec Can anyone confirm this answer. Please help if any error is there .
A 64000-byte message is to be transmitted over a 2-hop path in a storeand- forward packet-switching network. The network limits packets to a maximum size of 2032 bytes in...
vix28
3.6k
views
vix28
asked
Apr 12, 2016
Computer Networks
computer-networks
+
–
0
votes
1
answer
2728
Does TDM affect the bandwidth of the link ?
dakshgautam
525
views
dakshgautam
asked
Mar 23, 2016
Computer Networks
computer-networks
+
–
0
votes
3
answers
2729
Routing Table
We know routing table looks something like this . Network ID Subnet Mask Interface Question : We go with larger subnet mask in case of two matches. !! Why ? I know that's fact and called https://en.wikipedia.org/wiki/Longest_prefix_match !! What is ... some relation with the previous one. If i have to divide a network in 5 unequal subnets. then which is the correct method ?
We know routing table looks something like this . Network ID Subnet MaskInterface Question : We go with larger subnet mask in case of two matches. !! Why ? I know that's ...
Karan Patel 1
1.2k
views
Karan Patel 1
asked
Mar 20, 2016
Computer Networks
computer-networks
routing
ip-addressing
subnetting
+
–
100
votes
21
answers
2730
GATE CSE 2016 Set 1 | Question: 54
For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of $1$ $\text{megabyte}$ and the maximum output rate is $20$ $\text{megabytes}$ per $\text{second}$. Tokens arrive at a rate to ... to send $12$ $\text{megabytes}$ of data. The minimum time required to transmit the data is _____________ $\text{seconds}$.
For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of $1$ $\text{megabyte}$ and the maximum output rate is $2...
Sandeep Singh
42.5k
views
Sandeep Singh
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set1
computer-networks
token-bucket
normal
numerical-answers
+
–
Page:
« prev
1
...
86
87
88
89
90
91
92
93
94
95
96
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register