Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
0
votes
1
answer
301
Aloha | Computer Networks
Consider a network uses the slotted ALOHA medium access control protocol and network have 5 active nodes. Assume, each node attempts to transmit a frame in each slot with probability 0.2 and this frame can be new or old collided frame. The probability of ... of a frame from any node in a given slot is (Rounded off upto two decimal places) Ans : 0.4096 Please Explain
Consider a network uses the slotted ALOHA medium access control protocol and network have 5 active nodes. Assume, each node attempts to transmit a frame in each slot with...
abhinowKatore
848
views
abhinowKatore
asked
Dec 29, 2022
Computer Networks
slotted-aloha
computer-networks
network
+
–
0
votes
1
answer
302
unacademy AIMT 2
In go back 5, if every 7th packet that is being transmitted is lost and if we have to send 10 packets, then how many transmissions are required____. I’m getting 15 but the given answer is 14
In go back 5, if every 7th packet that is being transmitted is lost and if we have to send 10 packets, then how many transmissions are required____.I’m getting 15 but t...
TusharKumar
574
views
TusharKumar
asked
Dec 22, 2022
Computer Networks
computer-networks
go-back-n
+
–
1
votes
1
answer
303
CN | ACE Test Series
Which of the following is/are TRUE? In virtual circuit switching, the scope of VCI(Virtual Circuit Identifier) is not the entire network. In datagram switching, packets are traveled in different paths. In Internet, we use virtual circuit switching technique. In circuit switching, the message is not break down into small pieces. MSQ
Which of the following is/are TRUE?In virtual circuit switching, the scope of VCI(Virtual Circuit Identifier) is not the entire network.In datagram switching, packets are...
anupamsworld
640
views
anupamsworld
asked
Dec 20, 2022
Computer Networks
computer-networks
test-series
ace-test-series
+
–
1
votes
2
answers
304
IPV4 Harder Numerical from Computer Networks
An IPv4 datagram has arrived with the following information in the header (in hexadecimal): Ox45 00 00 54 00 03 58 50 20 06 00 00 7C 4E 03 02 B4 OE OF 02 a. Is the packet corrupted? b. Are there any options? c. Is the packet ... many more routers can the packet travel to? f. What is the identification number of the packet? g. What is the type of service?
An IPv4 datagram has arrived with the following information in the header (in hexadecimal): Ox45 00 00 54 00 03 58 50 20 06 00 00 7C 4E 03 02 B4 OE OF 02a. Is the packet ...
vashbhi
8.0k
views
vashbhi
asked
Dec 18, 2022
Computer Networks
computer-networks
ip-addressing
ip-packet
+
–
1
votes
1
answer
305
DRDO CSE 2022 Paper 2 | Question: 16
Suppose the $\text{IP}$ addresses of $\text{A}$ and $\text{B}$ are $10.105.1.113$ and $10.105.1.91,$ respectively. They both use the same netmask $\mathrm{N}$. Which of the following values of $\mathrm{N}$ given below should not be used if $\text{A}$ ... to the same network, and why? $255.255 .255 .0$ $255.255 .255 .128$ $255.255 .255 .192$ $255.255 .255 .224$
Suppose the $\text{IP}$ addresses of $\text{A}$ and $\text{B}$ are $10.105.1.113$ and $10.105.1.91,$ respectively. They both use the same netmask $\mathrm{N}$. Which of t...
admin
499
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
ip-address
3-marks
descriptive
+
–
1
votes
1
answer
306
DRDO CSE 2022 Paper 2 | Question: 17
$1020$ bytes long packet must be routed through an interface with $\text{MTU}$ of $256$ bytes. Asssuming the smallest possible $\text{IPv4}$ header size, fragmentation will be required for the transmission. For the second fragment created in this ... (in binary), Fragment Offset field (in decimal), and Total Length field (in decimal) of $\text{IPv4}$ header.
$1020$ bytes long packet must be routed through an interface with $\text{MTU}$ of $256$ bytes. Asssuming the smallest possible $\text{IPv4}$ header size, fragmentation wi...
admin
519
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
fragmentation
6-marks
descriptive
+
–
1
votes
1
answer
307
DRDO CSE 2022 Paper 2 | Question: 18
For the following two $16$-bit messages, find the Internet checksum: $0001 \; 1000 \; 0001 \; 0010$ $1011 \; 1000 \; 1011 \; 0011$
For the following two $16$-bit messages, find the Internet checksum:$0001 \; 1000 \; 0001 \; 0010$$1011 \; 1000 \; 1011 \; 0011$
admin
621
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
crc-polynomial
3-marks
descriptive
+
–
1
votes
1
answer
308
DRDO CSE 2022 Paper 2 | Question: 19
Both the payload and $2\text{D}$ (even) parity bits are shown below. Some of these bit(s) have been flipped. Indicate the row and column of the flipped bit(s) in format (col, row); e.g., top left bit is $(0,0)$. \[\begin{array}{l} 1000 \; 0001 \; 1111 \; ... 0100 \; 0011 \; 0011 \text { | } 0 \\ \overline{0110 \;0111\; 0101\; 1001 \text { | } 1} \\ \end{array}\]
Both the payload and $2\text{D}$ (even) parity bits are shown below. Some of these bit(s) have been flipped. Indicate the row and column of the flipped bit(s) in format (...
admin
626
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
crc-polynomial
3-marks
descriptive
+
–
2
votes
1
answer
309
DRDO CSE 2022 Paper 2 | Question: 20
An organization is granted the $\text{IPv4}$ address block $130.56.0.0/16.$ The network administrator wants to create $1024$ subnets. Find the first and last addresses in the third subnet.
An organization is granted the $\text{IPv4}$ address block $130.56.0.0/16.$ The network administrator wants to create $1024$ subnets. Find the first and last addresses in...
admin
870
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
subnetting
5-marks
descriptive
+
–
1
votes
0
answers
310
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it securely to edit and modify. What is the one critical security protocol/tool that enables you to connect to your server securely?
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
admin
441
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
+
–
1
votes
1
answer
311
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire ... *' to many 'any'. Action A: Block all traffic to any server on the local network. Write as Rule $1.$
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
admin
349
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
+
–
1
votes
1
answer
312
DRDO CSE 2022 Paper 2 | Question: 25
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ ... with key $\mathrm{K}$ in counter mode (with initial counter value $=0):$ $\text{C}=100110000$ What was the plaintext?
Assume when encrypting $3$-bit plaintext with a block cipher with key $\text{K},$ the following ciphertext is obtained:$$\begin{array}{|c|c|}\hline \text{Plaintext} & \te...
admin
824
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
+
–
1
votes
0
answers
313
DRDO CSE 2022 Paper 2 | Question: 26
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alpha)=6$. If $\text{A}$ chose the private value $\left(X_{A}\right)=5$ ... value $\left(X_{B}\right)=4$. Find the shared secret key $(\mathrm{K})$ between $\mathrm{A}$ and $\mathrm{B}$
Suppose $\mathrm{A}$ and $\mathrm{B}$ use Diffie-Hellnian key exchange. Let the commonly agreed (i.e., global public) prime number $(q)=13$ and the primitive root $(\alph...
admin
391
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
5-marks
descriptive
+
–
1
votes
1
answer
314
DRDO CSE 2022 Paper 2 | Question: 27
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext: $\text{X 2! H M E S S S E 2 Y T A 2 I I A}$ The key used was: $5 \; 2 \; 6 \; 3 \; 4 \; 1.$ What was the plaintext used (in English)?
A transposition cipher (but not a rail-fence cipher) was used to produce the following ciphertext:$\text{X 2! H M E S S S E 2 Y T A 2 I I A}$The key used was: $5 \; 2 \; ...
admin
447
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
cryptography
7-marks
descriptive
+
–
1
votes
0
answers
315
DRDO CSE 2022 Paper 2 | Question: 23 (b)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire network by its ...
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
admin
294
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
subnetting
2-and-half-marks
descriptive
+
–
0
votes
1
answer
316
TCP Congestion Control | Threshold value | cwnd | ssthres
Consider the following Statements: Statement I. If there is no congestion, initially, the ssthres (slow start threshold) is set as high as the advertised window size of the receiver Statement II. The (ssthres)new = (window size ... are correct. None of statement I and II is correct Only statement II is correct. Only statement I is correct.
Consider the following Statements: Statement I. If there is no congestion, initially, the ssthres (slow start threshold) is set as high as the advertised window siz...
Souvik33
956
views
Souvik33
asked
Dec 14, 2022
Computer Networks
congestion-control
tcp
computer-networks
+
–
1
votes
1
answer
317
Fragmentation in Networking
Suppose a 22-byte packet is to be transmitted through a network of MTU = 3byte. The elementary fragment size is 1 byte. Show the segment numbering of the above packet. Packet number is 127.
Suppose a 22-byte packet is to be transmitted through a network of MTU = 3byte. The elementary fragment size is 1 byte. Show the segment numbering of the above packet. Pa...
rayhanrjt
539
views
rayhanrjt
asked
Dec 13, 2022
Computer Networks
computer-networks
fragmentation
+
–
Page:
« prev
1
...
6
7
8
9
10
11
12
13
14
15
16
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register