Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Questions by Shubhanshu
3
votes
1
answer
101
Identify Tokens
Calculate total no of Tokens and also determine there types:- a) a9997.7b884.cddf2.77 b) 74>><<2gfh0012 c) a>=ab.785!lklk d) a9997.b884.100intcddfloat2.77 Q2) Differentiate between Tokens, Lexeme and Pattern with the help of example Eg. int a;
Calculate total no of Tokens and also determine there types:-a) a9997.7b884.cddf2.77b) 74>><<2gfh0012c) a>=ab.785!lklkd) a9997.b884.100intcddfloat2.77Q2) Differentia...
592
views
asked
Aug 29, 2017
Compiler Design
compiler-design
compiler-tokenization
+
–
2
votes
0
answers
102
Prefix property and DPDA
Construct the DPDA with empty stack and final state method for the language L = ${ a^n b^n / n>= 0}$.
Construct the DPDA with empty stack and final state method for the language L = ${ a^n b^n / n>= 0}$.
2.6k
views
asked
Aug 28, 2017
Theory of Computation
theory-of-computation
pushdown-automata
context-free-language
+
–
2
votes
1
answer
103
Computer Networks: Split horizon with Poisson Reverse Frouzan
As soon as I have studied I got that count to infinity problem will not occur if A advertise its window first to B before B can. As a result B gets information that X is un reachable now, and system will be in stable state. ... horizon. In the line saying: "Node B can still advertise the value for X......." till last line.
As soon as I have studied I got that count to infinity problem will not occur if A advertise its window first to B before B can. As a result B gets information that X is ...
824
views
asked
Aug 27, 2017
Computer Networks
computer-networks
routing
network
split-horizon
distance-vector-routing
+
–
0
votes
2
answers
104
Token Bucket
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 4 Mbps. It is initially filled to capacity with 15 Megabits. How long can the computer transmit at the full 8 Mbps (in seconds) upto two decimal places? a. 3.75 sec b. 3.55 sec c. 4.20 sec d. 3.46 sec
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 4 Mbps. It is initially filled to capacity with 15 Megabits. How ...
2.9k
views
asked
Aug 25, 2017
Computer Networks
token-bucket
congestion-control
computer-networks
+
–
1
votes
1
answer
105
Computer Network: Throughput and Efficiency on SWP
How to calculate window size in Stop and Wait, Select and Repeat, GBN. Some where I have seen window size as w = 1+2a where a = PT/TT. and some where it is calculated as: if we have RTT = 160msec BW = ... follow. And how to calculate Throughput and Efficiency ib all three protocol u can take above configuration to derive result. Please explian it.
How to calculate window size in Stop and Wait, Select and Repeat, GBN.Some where I have seen window size as w = 1+2awhere a = PT/TT.and some where it is calculated as:if ...
2.6k
views
asked
Aug 25, 2017
Computer Networks
computer-networks
network
data-link-layer
sliding-window
+
–
0
votes
3
answers
106
While TCP is a connection oriented service then why its segment follows different path.
I am reading Forouzan in that I have stuck here, I know that. TCP is connection oriented service, means it all segments follow same path, and segments are in order delivered. But it says that TCP ... . How it is happening. Consider this screen shot of Forouzan:- Please explain the proper reason behind it.
I am reading Forouzan in that I have stuck here, I know that.TCP is connection oriented service, means it all segments follow same path, and segments are in order deliver...
2.2k
views
asked
Aug 23, 2017
Computer Networks
computer-networks
tcp
ip-packet
+
–
5
votes
1
answer
107
Congestion Control
Q1 Let the size of the congestion window of a TCP connection be 64KB when a timeout occurs. The RTT of the connection is 50m sec and maximum segment size is 2 KB. The time taken by the TCP to get back to 64KB congestion window is _________. I am getting difficulty in finding the RTT's of the connection.
Q1 Let the size of the congestion window of a TCP connection be 64KB when a timeout occurs. The RTT of the connection is 50m sec and maximum segment size is 2 KB. The tim...
3.1k
views
asked
Aug 23, 2017
Computer Networks
computer-networks
congestion-control
tcp
+
–
6
votes
1
answer
108
Fragmentation
Which of the following statements is/ are true about the fragmentation which is done at network layer. (I) The offset of 1st fragment is always offset of parent. (II) The MF of last fragment is always same MF of parent. I think I is true and II is false: Explanation for II :- Host ... MF = 1 packet 1.3 <20,40> MF = 0 packet 1.3's MF != MF of packet 1 In A-R1. is it correct.
Which of the following statements is/ are true about the fragmentation which is done at network layer.(I) The offset of 1st fragment is always offset of parent.(II) The M...
3.8k
views
asked
Aug 22, 2017
Computer Networks
computer-networks
fragmentation
network-layering
+
–
5
votes
2
answers
109
Fragmentation
Suppose a network:- Suppose a TCP message contains 492 B of data and TCP header is of size 20B then deliver it to IP. IP header is 20 B. Assume link A-R1 has the maximum frame size of 700 B including a frame size of 14 B, link R1-R2 can support a ... of 256 B including a 12 B frame header. Then calculate the no of fragments at each link and show the format of fragments in each link.
Suppose a network:-Suppose a TCP message contains 492 B of data and TCP header is of size 20B then deliver it to IP. IP header is 20 B.Assume link A-R1 has the maximum fr...
2.4k
views
asked
Aug 19, 2017
Computer Networks
fragmentation
computer-networks
network-layering
tcp
+
–
2
votes
2
answers
110
Block Nested Loop Join
Consider a relation R with 2000 records and relation S with 500 records. Size of each record is 5 Byte and block size is 100 Byte, then minimum number of block access that are needed block nested loop join. I think its answer should be 2525.
Consider a relation R with 2000 records and relation S with 500 records. Size of each record is 5 Byte and block size is 100 Byte, then minimum number of block access tha...
1.4k
views
asked
Aug 18, 2017
Databases
databases
natural-join
block-nested-loop-join
+
–
0
votes
2
answers
111
TCP 3 Way Handshaking
In TCP 3 way handshaking mechanism why the data is not started being transmitting from the 3rd step itself I.e. 1. A-> B / SYN FROM A 2. A<-B / SYN AND ACK FROM B 3. A-> B / ACK FROM A.
In TCP 3 way handshaking mechanism why the data is not started being transmitting from the 3rd step itself I.e.1. A- B / SYN FROM A2. A<-B / SYN AND ACK FROM B3. A- B / A...
1.1k
views
asked
Aug 18, 2017
Computer Networks
computer-networks
tcp
+
–
5
votes
0
answers
112
Computer Networks: AIMD and Slow Start
Consider a system, where sender sends 50 packets to the receiver, and suppose during the transmission packet no 10, 25, 34, 45 are lost, then calculate the through put(in bits/sec) of the system, using i) AIMD ii) Slow Start 1 RTT = 100ms. Packet size = 1024 B = 1 KB.
Consider a system, where sender sends 50 packets to the receiver, and suppose during the transmission packet no 10, 25, 34, 45 are lost, then calculate the through put(in...
877
views
asked
Aug 18, 2017
Computer Networks
congestion-control
computer-networks
tcp
+
–
8
votes
1
answer
113
Deadlock and Unsafe state
Why unsafe state not leads to deadlock? Please don't redirect to any other link. Explain it by taking an example.
Why unsafe state not leads to deadlock?Please don't redirect to any other link. Explain it by taking an example.
6.0k
views
asked
Aug 17, 2017
Operating System
operating-system
deadlock-prevention-avoidance-detection
+
–
1
votes
0
answers
114
OS: Function of Dispatcher
Q1) Is it true that dispatcher always have one process to dispatch on to the cpu. Q2) Dispatcher function - "Jumping to the proper location in the user program to reatart that program". What does it mean?
Q1) Is it true that dispatcher always have one process to dispatch on to the cpu.Q2) Dispatcher function - "Jumping to the proper location in the user program to reatart ...
1.1k
views
asked
Aug 17, 2017
Operating System
operating-system
scheduling
dispatching
+
–
2
votes
2
answers
115
Operating System: UNIX Inode
Q1> Consider the Unix file node which maintains 12 direct disk block addresses, 1 single indirect, 1 double indirect, and 1 triple indirect disk block addresses. The disk block address requires 32 bits and DB size is 1 KB then calculate 1. ... byte no. 10000000 Byte in the file, location comprises of <In which direct/ indirect pointers branch the address is>
Q1 Consider the Unix file node which maintains 12 direct disk block addresses, 1 single indirect, 1 double indirect, and 1 triple indirect disk block addresses. The disk ...
3.0k
views
asked
Aug 16, 2017
Operating System
operating-system
unix
inode
+
–
2
votes
1
answer
116
Deadlock Conditions
Q1> What are necessary and what are sufficient conditions for Deadlock? Q2> What is the difference between deadlock preventions, deadlock avoidance, and deadlock detection?
Q1 What are necessary and what are sufficient conditions for Deadlock?Q2 What is the difference between deadlock preventions, deadlock avoidance, and deadlock detection?
2.9k
views
asked
Aug 15, 2017
Operating System
operating-system
deadlock-prevention-avoidance-detection
+
–
1
votes
1
answer
117
Real World Example of Paging
Processor:- 32 bit with 4 KB page size. RAM: - 4 GB with 220 frames in the RAM. Process:- > Process Name - MOTO GP > Process Size - 1GB > Frame Size - 4 KB // As frame size is always equal to page size. > Number of ... for other processes like NFS Shift 2 which is approx of 7 GB, I think which introduces the concept of virtual memory but don't know how?
Processor:- 32 bit with 4 KB page size.RAM: - 4 GB with 220 frames in the RAM.Process:- Process Name - MOTO GP Process Size - 1GB Frame Size - 4 KB // As frame size is ...
1.7k
views
asked
Aug 14, 2017
Operating System
operating-system
paging
multilevel-paging
+
–
5
votes
1
answer
118
SPU Scheduling
What is the correct sequence of the functions -Scheduling, dispatching, and context switching.
What is the correct sequence of the functions -Scheduling, dispatching, and context switching.
1.7k
views
asked
Aug 12, 2017
Operating System
operating-system
process-scheduling
+
–
2
votes
0
answers
119
CO: William Stalling: Write Through and Write Back, which is more efficient.
According to my calculation, the time required in write back is 240ns and for write through it should be 1920ns. Is it correct or not?
According to my calculation, the time required in write back is 240ns and for write through it should be 1920ns. Is it correct or not?
784
views
asked
Aug 5, 2017
CO and Architecture
co-and-architecture
cache-memory
write-through
+
–
3
votes
1
answer
120
CO: Working of multiplexer, comparator and encoder in 2-way set associative mapping
Draw the diagram which shows the mechanism of fetching the data in 2-way set associative mapping using multiplexer, comparator, and encoder?
Draw the diagram which shows the mechanism of fetching the data in 2-way set associative mapping using multiplexer, comparator, and encoder?
1.0k
views
asked
Aug 5, 2017
CO and Architecture
co-and-architecture
cache-memory
multiplexer
+
–
Page:
« prev
1
2
3
4
5
6
7
8
9
10
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register