GATE CSE Computer Network Previous Year Solutions
Q1➡ | GATE 2021 Set-1 Consider the following two statements. S1: Destination MAC address of an ARP reply is a broadcast address. S2: Destination MAC address of an ARP request is a broadcast address. Which of the following choices is correct? |
i ➥ S1 is true and S2 is false. |
ii ➥ Both S1 and S2 are false. |
iii ➥ Both S1 and S2 are true. |
iv ➥ S1 is false and S2 is true. |
Show Answer With Best Explanation
Answer: IV
Explanation:
ARP: ARP is Address Resolution Protocol, it is used to map IP Address to MAC Address.
Let’s understand it with exmaple:
Suppose, we have an Ethernet. Each machine on an Ethernet has unique physical (or MAC) Address Labelled E1 through E5 and each machine has unique Logical (or IP) Address Labelled I1 through I5 .
Let’s suppose, Host 1 want to communicate with Host 4 and Host1 knows the destination IP Address (i.e. I4 ).
Now, Upper Layer of Host 1 sent a packet to Host 4 using IP Address But Lower Layer(DLL) of Host 1 need MAC Address of Host 4 to sent a frame. For this purpose, ARP comes into picture.
An ARP request Packet sent from Host 1 to all other Host on an Ethernet. That’s why ARP Request is Broadcast Packet. The Broadcast packet will arrive at every machine on an Etherent & each one will check it’s IP Address. Host 4 alone will respond with it’s MAC Address (or E4). That’s why
ARP reply is unicast.
Statement 1: Destination MAC Address of an ARP reply is Broadcast address.(False)
ARP reply packet has:
• Source MAC Address (E4 in this example)
• Destination MAC Address (E1 in this example)
So, Destination MAC address of ARP reply is unicast Address.
Statement 2: Destination MAC Address of ARP request is Broadcast Address.(True)
ARP Request packet has:
• Source MAC Address.(E1 in this example)
• Destination MAC Address.( E2, E3, E4, E5 in this example)
So, Option(IV) is correct.
More Discussion | Explanation On YouTube | Network Protocols | Help-Line |
Q2➡ | GATE 2021 Set-1 Consider two hosts P and Q connected through a router R. The maximum transfer unit (MTU) value of the link between P and R is 1500 bytes, and between R and Q is 820 bytes. A TCP segment of size 1400 bytes was transferred from P to Q through R, with IP identification value as 0x1234. Assume that the IP header size is 20 bytes. Further, the packet is allowed to be fragmented, i.e., Don’t Fragment (DF) flag in the IP header is not set by P. Which of the following statements is/are correct? |
i ➥ If the second fragment is lost, R will resend the fragment with the IP identification value 0x1234. |
ii ➥ TCP destination port can be determined by analysing only the second fragment. |
iii ➥ Two fragments are created at R and the IP datagram size carrying the second fragment is 620 bytes. |
iv ➥ If the second fragment is lost, P is required to resend the whole TCP segment. |
Show Answer With Best Explanation
Answer: III, IV
Explanation:
Given,
The maximum transfer unit (MTU) value of the link between P and R = 1500 bytes
The maximum transfer unit (MTU) value of the link between R and Q = 820 bytes.
Segment of size = 1400 bytes
IP identification value = 0x1234
IP header size = 20 bytes
Don’t Fragment (DF) flag value = 0
Logic
Since Segment size is 1400 B and MTU value of the link between P and R is 1500 bytes. So, Segment is successfully arrive at router R. MTU value of the link between R and Q is 820 bytes. Now here at router R, Fragmentation is required.
Segment size 1400 Byte is divided into two parts or two fragment
1400 = 800 + 600
1st fragment size = Data + Header = 800 + 20 = 820 Bytes
2nd fragment size = Data + Header = 600 + 20 = 620 Bytes
Option(I): If the second fragment is lost, R will resend the fragment with the IP identification value 0x1234.(False)
If second or any fragment is lost, then whole TCP segment or entire fragment has to be sent again. If any fragment is lost, the sender need to retransmit, But sender does not know about any fragment. Because fragmentation is done at intermediate router. So, sender has to retransmit entire fragment or whole TCP segment and for the next time in fragmentation, IP identification value will be changed.
Option(II): TCP destination port can be determined by analysing only the second fragment.(False)
Each fragment of TCP Segement is send seperately.Each fragment contains TCP destination port. So, TCP destination port can be determined by analysing any fragment.
Option(III): Two fragments are created at R and the IP datagram size carrying the second fragment is 620 bytes.(True)
1st fragment size = Data + Header = 800 + 20 = 820 Bytes
2nd fragment size = Data + Header = 600 + 20 = 620 Bytes
Option(IV): If the second fragment is lost, P is required to resend the whole TCP segment. (True)
If second or any fragment is lost, then whole TCP segment or entire fragment has to be sent again.
So, Option(III) and Option(IV)are correct.
More Discussion | Explanation On YouTube | Fragmentaion | Help-Line |
Q3➡ | GATE 2021 Set-1 A TCP server application is programmed to listen on port number P on host S. A TCP client is connected to the TCP server over the network. Consider that while the TCP connection was active, the server machine S crashed and rebooted. Assume that the client does not use the TCP keep alive timer. Which of the following behaviours is/are possible? |
i ➥ If the client sends a packet after the server reboot, it will receive a FIN segment. |
ii ➥ The TCP server application on S can listen on P after reboot. |
iii ➥ If the client sends a packet after the server reboot, it will receive a RST segment. |
iv ➥ If the client was waiting to receive a packet, it may wait indefinitely. |
Show Answer With Best Explanation
Answer: II, III, IV
Explanation: Upload Soon
Q4➡ | GATE 2021 Set-1 Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following: • The time taken for processing the data frame by the receiver is negligible. • The time taken for processing the acknowledgement frame by the sender is negligible. • The sender has an infinite number of frames available for transmission. • The size of the data frame is 2,000 bits and the size of the acknowledgment frame is 10 bits. • The link data rate in each direction is 1 Mbps (=106bits per second). • One way propagation delay of the link is 100 milliseconds. The minimum value of the sender’s window size in terms of the number of frames, (rounded to the nearest integer) needed to achieve a link utilization of 50% is _____. |
Show Answer With Best Explanation
Answer: 50 to 52
Explanation:
Given,
Processing delay of data frame = 0
Processing delay of Acknowledge frame = 0
Size of Data frame = 2000 bits
Size of Acknowledge frame = 10 bits
Data rate (or Bandwidth) = 106 bits per second
Propogation Delay (Tp) = 100 ms
Efficiency (or Link utilization) = 50% or 1/2
Ask,
Sender window sizr (N) = ?
Formula,
where,
N= window size
Tt (data) = Transmission Delay for Data Frame
Tt (Ack) = Transmission Delay for Acknowledge Frame
Tp = Propogation Delay
Let’s Calculate,
Note: 1 second = 1000 millisecond
So, The minimum value of the sender’s window size is 51.
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q5➡ | GATE 2021 Set-2 Consider the three-way handshake mechanism followed during TCP connection established between hosts P and Q. Let X and Y be two random 32-bit starting sequence numbers chosen by P and Q respectively. Suppose P sends a TCP connection request message to Q with a TCP segment having SYN bit = 1, SEQ number = X, and ACK bit = 0. Suppose Q accepts the connection request. Which one of the following choices represents the information present in the TCP segment header that is sent by Q to P? |
i ➥ SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X, FIN bit = 0 |
ii ➥ SYN bit = 1, SEQ number = X+1, ACK bit = 0, ACK number = Y, FIN bit = 0 |
iii ➥ SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X+1, FIN bit = 0 |
iv ➥ SYN bit = 0, SEQ number = X+1, ACK bit = 0, ACK number = Y, FIN bit = 1 |
Show Answer With Best Explanation
Answer: III
Explanation:
Given,
Random Sequence number chosen by P is X.
Random Sequence number chosen by Q is Y.
P sends a TCP connection request to Q with TCP Segment having,
SYN bit = 1, SEQ (Sequence) number = X, ACK bit = 0
Let’s briefly understand some terms,
Sequence Number: The Sequence Number for each segment is the number of the 1st Byte carried in that segment. Host can choose any Random Sequence Number.
SYN bit: It is used during connection to synchronize the connection. First TCP segment send by any Host have SYN bit =1.
TCP is full Duplex protocol. So, 1st Segment sent by Host P to Host Q and 1st Segment sent by Host Q to Host P contain SYN bit = 1.
ACK bit:
The ACK bit =1, indicate the segment contains Acknowledge.
The ACK bit =0, indicate the segment does not contain Acknowledge.
ACK(Acknowledge) number: ACK number is the Byte Number expected next.
If the receiver of the segment has successfully received Byte Number x from other party, if defines X+1 as the Acknowledge Number.
TCP Segment Header that is sent by Q to P have :
SYN = 1 , Because it is 1st Segment sent from Q to P, it is used to Synchronize the connection.
Seq number = y , It is given that y be Sequence number chosen by Q.
Ack number = X+1 , SYN flag consume one Sequence number. Byte number X is consume by Q. So, Q expect X+1 next Byte number.
FIN bit = 0 , when FIN bit = 1, Host want to terminate connection. when FIN bit = 0, Host does not want to terminate connection.
So, Option(III) is correct.
Q6➡ | GATE 2021 Set-2 Consider the cyclic redundancy check (CRC) based error detecting scheme having the generator polynomial X3+X+1. Suppose the message m4m3m2m1m0=11000 is to be transmitted. Check bits c2c1c0 are appended at the end of the message by the transmitter using the above CRC scheme. The transmitted bit string is denoted by m4m3m2m1m0c2c1c0. The value of the checkbit sequence c2c1c0 is |
i ➥ 110 |
ii ➥ 100 |
iii ➥ 111 |
iv ➥ 101 |
Show Answer With Best Explanation
Answer: II
Explanation:
Given,
Generator Polynomial = X3+X+1
The message m4m3m2m1m0=11000
Ask,
Checkbit sequence c2c1c0 = ?
Concept,
Generator Polynomial = X3+X+1
Generator Polynomial bits = 1. X3 + 0.X2 + 1.X1 + 1.X0 = 1011
Generator Polynomial consists of 4 bits. So, 3 bits of zeros will be append to the message.
Now, Message bits = m4m3m2m1m0c2c1c0 = 11000000
Let’s Solve,
100 will be appended to message bits.
c2c1c0 = 100
So, Option(II) is correct.
More Discussion | Explanation On YouTube | Error Control | Help-Line |
Q7➡ | GATE 2021 Set-2 Consider a computer network using the distance vector routing algorithm in its network layer. The partial topology of the network is as shown below: The objective is to find the shortest-cost path from the router R to routers P and Q. Assume that R does not initially know the shortest routes to P and Q. Assume that R has three neighbouring routers denoted as X, Y and Z. During one iteration, R measures its distance to its neighbours X, Y and Z as 3, 2 and 5, respectively. Router R gets routing vectors from its neighbours that indicate that the distance to router P from routers X, Y and Z are 7, 6 and 5, respectively. The routing vector also indicates that the distance to router Q from routers X, Y and Z are 4, 6 and 8, respectively. Which of the following statement(s) is/are correct with respect to the new routing table of R, after updation during this iteration |
i ➥ The distance from R to P will be stored as 10. |
ii ➥ The next hop router for a packet from R to Q is Z. |
iii ➥ The next hop router for a packet from R to P is Y. |
iv ➥ The distance from R to Q will be stored as 7. |
Show Answer With Best Explanation
Answer: III, IV
Explanation:
Given,
During one iteration, R measures its distance to its neighbours X, Y and Z as 3, 2 and 5, respectively.
The distance to router P from routers X, Y and Z are 7, 6 and 5, respectively.
The distance to router Q from routers X, Y and Z are 4, 6 and 8, respectively.
Combine all the above three diagram:
Ask,
The miinimum Distance from R to P =?
The miinimum Distance from R to Q =?
Calculation,
The minimum Distance from R to P = min{ R->X->P, R->Y->P, R->Z->P }
= min{ 3+7, 2+6, 5+5 }
= min{ 10, 8, 10 }
= 8
The minimum Distance from R to P is 8 and the next hop router for a packet from R to P is Y.
The minimum Distance from R to Q = min{ R->X->Q, R->Y->Q, R->Z->Q }
= min{ 3+4, 2+6, 5+8 }
= min{ 7, 8, 13 }
= 7
The minimum Distance from R to Q is 6 and the next hop router for a packet from R to Q is X.
So, Option(III) and Option(IV) are correct.
More Discussion | Explanation On YouTube | Routing Algorithm | Help-Line |
Q8➡ | GATE 2021 Set-2 Consider a network using the pure ALOHA medium access control protocol, where each frame is of length 1,000 bits. The channel transmission rate is 1 Mbps (= 106bits per second). The aggregate number of transmissions across all the nodes (including new frame transmissions and retransmitted frames due to collisions) is modelled as a Poisson process with a rate of 1,000 frames per second. Throughput is defined as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is _______. |
Show Answer With Best Explanation
Answer: 130 to 140
Explanation:
Given,
Frame size = 1000 bits
Transmission rate (or Bandwidth) = 1Mbps = 106 bps
System produces (or Poission Process) = 1000 Frame per second
Ask,
Throughput of the System = ?
Formula,
The Efficiency of the pure ALOHA = G * e-2G
The maximum Throughput = 0.184 (or 18.4%), when G =1.
where, G is the average number of Frame produced by the System during one Frame Transmission time.
Let’s Calculate,
Now, System produces 1000 frame per second. Since, Tt (Transmission Time) is 1ms. Then How many Frames are produced by the System in 1 ms.
1 second = 1000 Frame
1000 ms = 1000 Frame
1 ms = 1 Frame
So, Load(G) = 1
Efficiency = G * e-2G
= 1 * e-2
= 0.13534
Throughput: Throughput is defined as the average number of frames successfully transmitted per second.
Throughput = 1000 * 0.13534 = 135.34 = 135(Approximate)
More Discussion | Explanation On YouTube | Access Control | Help-Line |
Q9➡ | GATE 2020 Consider the following statements about the functionality of an IP based router. I. A router does not modify the IP packets during forwarding. II. It is not necessary for a router to implement any routing protocol. III. A router should reassemble IP fragments if the MTU of the outgoing link is larger than the size of the incoming IP packet. Which of the above statements is/are TRUE? |
i ➥ II only |
ii ➥ I and II only |
iii ➥ II and III only |
iv ➥ I only |
Show Answer With Best Explanation
Answer: I
Explanation:
Statement (I): A router does not modify the IP packets during forwarding.(False)
Many of the IP Packets are Modify by the router during forwaring. One of the field is TTL(Time to Leave). During the forwaring, each router on the way decrement TTL value by 1.
Statement (II): It is not necessary for a router to implement any routing protocol.(True)
In order to forward a packet, instead of routing protocol, Flooding Technique can be used. In Flooding, Each packet is forwarded to every direction without know about best Route.
Statement (III): A router should reassemble IP fragments if the MTU of the outgoing link is larger than the size of the incoming IP packet. (False)
Router does not assemble the fragments. Reassembling of IP Fragments is done at Receiver site.
So, Option(I) is correct.
More Discussion | Explanation On YouTube | Routers | Help-Line |
Q10➡ | GATE 2020 Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images. The minimum number of TCP connections required to display the web page completely in your browser is _______. |
Show Answer With Best Explanation
Answer: 6
Explanation:
HTTP have 2 connection:
1) Persistent Connection: In a persistent connection, The server leaves the connection open for more requests after sending a response. The server can close the connection at the request of a client or if a time-out has been reached.
2) Non-Persistent Connection: In a non persistent connection, one TCP connection is made for each request/response. For N different pictures in different files, the connection must be opened and closed N times.
Now, it is gievn that, HTTP request is in non-persistent mode. The web page contains text and five small images.
Total HTTP Connection = one connection for text + 5 connection for 5 images = 6 connection
So, the minimum number of TCP connection required to display the webpage completely in your Browser is 6.
More Discussion | Explanation On YouTube | Application Layer Protocols | Help-Line |
Q11➡ | GATE 2020 An organization requires a range of IP addresses to assign one to each of its 1500 computers. The organization has approached an Internet Service Provider (ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space 202.61.0.0/17. The ISP wants to assign an address space to the organization which will minimize the number of routing entries in the ISP’s router using route aggregation. Which of the following address spaces are potential candidates from which the ISP can allot any one to the organization? A. 202.61.84.0/21 B. 202.61.104.0/21 C. 202.61.64.0/21 D. 202.61.144.0/21 |
i ➥ B and C only |
ii ➥ A and D only |
iii ➥ A and B only |
iv ➥ C and D only |
Show Answer With Best Explanation
Answer: I
Explanation:
Given,
Number of Host = 1500
IP Address space = 202.61.0.0/17
Given the ISP uses CIDR
CIDR (Classless Inter Domain Routing): For Subneting in CIDR, a 32-bits IP address have:
• Network id (to represent network)
• Subnet id (to represent subnet within a network)
• Host id (to represent Host within a subnet)
Data,
IP Address space = 202.61.0.0/17
Network id bits = 17bits
In order to represent 1500 computer we need ceil of(1500)= 11bits, Host id bits = 11bits
Subnet id bits = 32 – (17 + 11) = 4 bits
Logic to solve,
We can allot 16 (24) subnet to any of the organization. To represent 16 subnet:
• Network id(17) bits are fixed.
• Host id(11) bits should be all 0’s.
• Subnet id(4) bits can be any combination between 0 to 15.
A. 202.61.84.0/21: not possible to allotted.
B. 202.61.104.0/21 : possible to allotted.
Network id and Host id bits are all satisfied
C. 202.61.64.0/21 : possible to allotted.
Network id and Host id bits are all satisfied
D. 202.61.144.0/21 : not possible to allotted.
So, Option(I) is correct
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q12➡ | GATE 2020 Consider a TCP connection between a client and a server with the following specifications: the round trip time is 6 ms, the size of the receiver advertised window is 50 KB, slow start threshold at the client is 32 KB, and the maximum segment size is 2 KB. The connection is established at time t=0. Assume that there are no timeouts and errors during transmission. Then the size of the congestion window (in KB) at time t+60 ms after all acknowledgements are processed is ________. |
Show Answer With Best Explanation
Answer: 44
Explanation:
Given Specification,
RTT(Round Trip Time)= 6ms
Advertised window size = 50KB
Thresold = 32KB
MSS(Maximum Segment Size) = 2KB
Ask,
Congestion window size at time t+60 ms after all acknowledgements are processed= ?
Here, t+60 ms is nothing but t +(60/6) = t+10th RTT {After 10thRTT or at 11th RTT}
Logic to solve,
1) Start with given MSS(2KB).
2) Increase the sender window size in multiple of MSS(2KB) and stops when thresold(32KB) reached.
3) Once Thresold reached, increased sender window size by 1MSS(2KB) till timeout occurs.
Let’s Solve,
1st Transmission = 2KB
2nd Transmission = 4KB
3rd Transmission = 8KB
4th Transmission = 16KB
5th Transmission = 32KB {Thresold reached}
Now increase sender window size by 1MSS(2KB)
6th Transmission = 34KB
7th Transmission = 36KB
8th Transmission = 38KB
9th Transmission = 40KB
10th Transmission = 42KB
11th Transmission = 44KB
So, Then the size of the congestion window (in KB) at time t+60 ms after all acknowledgements are processed is 44KB.
Q13➡ | GATE 2019 Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)? |
i ➥ IMAP, POP3 |
ii ➥ IMAP, SMTP |
iii ➥ SMTP, MIME |
iv ➥ SMTP, POP3 |
Show Answer With Best Explanation
Answer: IV
Explanation:
SMTP: SMTP stands for Simple Mail Transfer Protocol and is a TCP/IP protocol used in sending e-mail
. It’s a set of communication rules that allow software to send email over the Internet.
POP3(Post Office Protocol 3) and IMAP(Intractive Mail Access Protocol): POP3 and IMAP are two different protocols used to access email
. POP3 and IMAP function very differently and each has its own advantages. POP3 is useful in checking emails from a computer that is in a specific location. IMAP is the better option when we need to check our emails from multiple locations, such as at work, from home, or on the road, using different computers.
MIME(Multipurpose Internet Mail Extensions): MIME is an Internet Standard that extends the format of e-mail to support-
• Text in character sets other than ASCII
• Non-Text Attachments.
• Message bodies with multiple parts
So, Option(IV) is correct.
More Discussion | Explanation On YouTube | Application Layer Protocols | Help-Line |
Q14➡ | GATE 2019 The value of 351 mod 5 is _______. |
Show Answer With Best Explanation
Answer: 2
Explanation:
Fermat’s Little Theorem:
If p is a prime and a is an integer then
ap-1 ≡ 1 (mod p) , if p does not divide a
else
ap ≡ a (mod p)
Caculation:
351 mod 5
here, p=5, a=3 and p does not divide
≡ 34*12 +3 mod 5
≡ ((34)12 mod 5) * (33 mod 5)
≡ (112 mod 5) * (33 mod 5) {* 35-1 ≡ 1 mod 5 *}
≡ 27 mod 5
≡ 2
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q15➡ | GATE 2019 Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be used for this? |
i ➥ X sends an ARP request packet with broadcast IP address in its local subnet |
ii ➥ X sends an ARP request packet to the local gateway’s MAC address which then finds the MAC address of Y and sends to X |
iii ➥ X sends an ARP request packet with broadcast MAC address in its local subnet |
iv ➥ X sends an ARP request packet to the local gateway’s IP address which then finds the MAC address of Y and sends to X |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Layer Protocol | Help-Line |
Q16➡ | GATE 2019 Consider three machines M, N and P with IP addresses 100.10.5.2, 100.10.5.5, and 100.10.5.6 respectively. The subnet mask is set to 255.255.255.252 for all the three machines. Which one of the following is true? |
i ➥ Only M and N belong to the same subnet |
ii ➥ Only N and P belong to the same subnet |
iii ➥ M, N, and P all belong to the same subnet |
iv ➥ M, N and P belong to three different subnets |
Show Answer With Best Explanation
Answer: II
Explanation:
Given,
IP addresses of M = 100.10.5.2
IP addresses of N = 100.10.5.5
IP addresses of P = 100.10.5.6
Subnet Mask = 255.255.255.252
Logic to solve,
We will find Network Id by X-ORing of IP Address of Machine with Subnet Mask. Same Network Id of Machine belong to same Subnet.Machine M
:
100. 10 . 5 .0000 0010
255.255.255.1111 1100
——————————-
(100.10.5.0)
Machine N
:
100. 10 . 5 .0000 0101
255.255.255.1111 1100
———————————
(100.10.5.4)
Machine P
:
100. 10 . 5 .0000 0110
255.255.255.1111 1100
———————————-
(100.10.5.4)
Machine N and P belong to same subnet.
So, Option(II) is correct.
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q17➡ | GATE 2019 In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that Φ(n) = 2880, where Φ() denotes Euler’s Quotient Function, then the prime factor of n which is greater than 50 is ________. |
Show Answer With Best Explanation
Answer: 97
Explanation:
Given,
n = 3007
ϕ(n) = 2880
Calculation,
Let p and q be two prime number such that n=p*q = 3007
ϕ(n) = ϕ(p*q) = ϕ(p)* ϕ(q) = (p-1)*(q-1) = 2880
=> pq -p-q-1 =2880
=> 3007-p-q-1 =2880
=> p+q =128 ————(1)
=> pq =3007 ————(2)
put value of q in eq(1)
=> p+(3007/p) =128
=> p2 -128p + 3007 =0
The prime factor of n greater than 50 is 97.
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q18➡ | GATE 2019 Consider that 15 machines need to be connected in a LAN using 8-port Ethernet switches. Assume that these switches do not have any separate uplink ports. The minimum number of switches needed is ________. |
Show Answer With Best Explanation
Answer: 3
Explanation:
More Discussion | Explanation On YouTube | LAN Technology | Help-Line |
Q19➡ | GATE 2018 |
i ➥ P-III, Q-IV, R-II, S-I |
ii ➥ P-II, Q-I, R-IV, S-III |
iii ➥ P-IV, Q-I, R-II, S-III |
iv ➥ P-IV, Q-I, R-III, S-II |
Show Answer With Best Explanation
Answer: III
Explanation:
UDP Header’s port number = 16 bits
Ethernet MAC Address = 48 bits
IPV6 Next Header = 8 bits
TCP Header’s Sequence number = 32 bits
So, Option(III) is correct.
More Discussion | Explanation On YouTube | Matching | Help-Line |
Q21➡ | GATE 2018 Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note that cwnd stands for the TCP congestion window and MSS denotes the Maximum Segment Size. (i) The cwnd increase by 2 MSS on every successful acknowledgement. (ii) The cwnd approximately doubles on every successful acknowledgement. (iii) The cwnd increase by 1 MSS every round trip time. (iv) The cwnd approximately doubles every round trip time. Which one of the following is correct? |
i ➥ Only (ii) and (iii) are true |
ii ➥ Only (i) and (iii) are true |
iii ➥ Only (iv) is true |
iv ➥ Only (i) and (iv) are true |
Show Answer With Best Explanation
Answer: III
Explanation:
Statement(I): The cwnd increase by 2 MSS on every successful acknowledgement. (False)
It is False because cwnd increase by 1 MSS on every successful acknowledgement.
Statement(II): The cwnd approximately doubles on every successful acknowledgement. (False)
It is False as the same reason for above.
Statement(III): The cwnd increase by 1 MSS every round trip time. (False)
Statement(IV): The cwnd approximately doubles every round trip time. (True)
There is a confusion between statement(II) and statement(IV).
Let’s understand it example
It is cleared with the diagram that:
The congestion window is increase by 1MSS on every successful acknowledge and
The congestion window approximately doubles every round trip time.
So, Option(III) is correct.
Q22➡ | GATE 2018 Consider a long-lived TCP session with an end-to-end bandwidth of 1 Gbps (= 109 bits/second). The session starts with a sequence number of 1234. The minimum time (in seconds, rounded to the closest integer) before this sequence number can be used again is _______. |
Show Answer With Best Explanation
Answer: 34 To 35
Explanation:
Given,
Bandwidth = 1 Gbps (109 bits/second)
Calculation,
=> 1Gb = 1 sec
=> 109 bits = 1 sec
=> (109 / 8) Byte = 1 sec
=> (109 / 8) Sequence number = 1 sec {*TCP count each Byte*}
=> 1 Sequence number = (8 / 109 ) sec
=> 232 Sequence number = ( 232 * 8)/ 109 sec {*Total 232 sequence number possible* }
=> wrap arround time = 34.55 = 34(aproximate)
The minimum time (in seconds, rounded to the closest integer) before this sequence number can be used again is 34.
Q23➡ | GATE 2018 Consider a simple communication system where multiple nodes are connected by a shared broadcast medium (like Ethernet or wireless). The nodes in the system use the following carrier-sense based medium access protocol. A node that receives a packet to transmit will carrier-sense the medium for 5 units of time. If the node does not detect any other transmission in this duration, it starts transmitting its packet in the next time unit. If the node detects another transmission, it waits until this other transmission finishes, and then begins to carrier-sense for 5 time units again. Once they start to transmit, nodes do not perform any collision detection and continue transmission even if a collision occurs. All transmissions last for 20 units of time. Assume that the transmission signal travels at the speed of 10 meters per unit time in the medium. Assume that the system has two nodes P and Q, located at a distance d meters from each other. P starts transmitting a packet at time t=0 after successfully completing its carrier-sense phase. Node Q has a packet to transmit at time t=0 and begins to carrier-sense the medium. The maximum distance d (in meters, rounded to the closest integer) that allows Q to successfully avoid a collision between its proposed transmission and P’s ongoing transmission is _. |
Show Answer With Best Explanation
Answer: 50
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Ethernet | Help-Line |
Q24➡ | GATE 2018 Consider an IP packet with a length of 4,500 bytes that includes a 20-byte IPv4 header and a 40-byte TCP header. The packet is forwarded to an IPv4 router that supports a Maximum Transmission Unit (MTU) of 600 bytes. Assume that the length of the IP header in all the outgoing fragments of this packet is 20 bytes. Assume that the fragmentation offset value stored in the first fragment is 0. The fragmentation offset value stored in the third fragment is ___________. |
Show Answer With Best Explanation
Answer: 144
Explanation:
Given,
IP Packet Length = 4500 Bytes
IP Header = 20 Bytes
MTU = 600 Bytes
Data,
IP Packet = IP Payload + IP Header
IP Payload = IP Packet – IP Header
IP Payload = 4500 – 20 = 4480 Bytes
MTU Payload = 600 – 20 = 580 Bytes
MTU Payload should be multiple of 8 But 580 is not multiple of 8. So, the nearest value of 580 which is multiple of 8 is 576.
Calculation,
The fragmentation offset value stored in the third fragment is 144.
More Discussion | Explanation On YouTube | Fragmentation | Help-Line |
Q25➡ | GATE 2017 Set-1 A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message. Which of the following are possible security violations? |
i ➥ I only |
ii ➥ I and II only |
iii ➥ II and III only |
iv ➥ II only |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q26➡ | GATE 2017 Set-1 Consider a TCP client and a TCP server running on two different machines. After completing data transfer, the TCP client calls close to terminate the connection and a FIN segment is sent to the TCP server. Server-side TCP responds by sending an ACK, which is received by the client-side TCP. As per the TCP connection state diagram (RFC 793), in which state does the client-side TCP connection wait for the FIN from the server-side TCP? |
i ➥ FIN-WAIT-2 |
ii ➥ LAST-ACK |
iii ➥ TIME-WAIT |
iv ➥ FIN-WAIT-1 |
Show Answer With Best Explanation
Answer: I
Explanation:
TCP connection state diagram (RFC 793)
* FIN-WAIT-1
Client-side TCP is waiting for an acknowledgment of the connection termination request or for a simultaneous connection termination request from Server-side TCP. This state is normally of short duration.
* FIN-WAIT-2
TCP client is sent FIN segment to the TCP server. Server-side TCP responds by sending an ACK, which is received by the client-side TCP.Client-side TCP connection wait for the FIN from the server-side TCP.
* TIME-WAIT
Server side TCP is waiting for enough time to pass to be sure the server side TCP received the acknowledgment of its connection termination request.
* LAST-ACK
Client-side TCP is waiting for an acknowledgment of the connection termination request previously sent to Server. This state is entered when client-side TCP received a termination request before it sent its termination request.
Q27➡ | GATE 2017 Set-1 A computer network uses polynomials over GF(2) for error checking with 8 bits as information bits and uses x3 + x + 1 as the generator polynomial to generate the check bits. In this network, the message 01011011 is transmitted as |
i ➥ 01011011100 |
ii ➥ 01011011010 |
iii ➥ 01011011101 |
iv ➥ 01011011011 |
Show Answer With Best Explanation
Answer: III
Explanation:
Given,
Generator polynomial = x3 + x + 1
Message = 01011011
Calculation,
Generator polynomial = x3 + x + 1
Generator polynomial bits = 1.x3 + 0.x2 + 1.x + 1 = 1011
Generator polynomial consists 4 bits, so 3 zeo’s will be append to message.
The message bits will be: 0101 1011 101
So, Option(III) is correct.
More Discussion | Explanation On YouTube | Error Control | Help-Line |
Q28➡ | GATE 2017 Set-1 The value of parameters for the Stop-and-Wait ARQ protocol are as given below: Bit rate of the transmission channel = 1 Mbps. Propagation delay from sender to receiver = 0.75 ms. Time to process a frame = 0.25 ms. Number of bytes in the information frame = 1980. Number of bytes in the acknowledge frame = 20. Number of overhead bytes in the information frame = 20. Assume that there are no transmission errors. Then, the transmission efficiency (expressed in percentage) of the Stop-and-Wait ARQ protocol for the above parameters is ________. (correct to 2 decimal places). |
Show Answer With Best Explanation
Answer: 86.5 to 89.5
Explanation:
Formula,
Given Data,
Propagation Delay (Tp) = 0.75 ms
Bit rate = 1Mbps = 106 bits per sec
Number of bytes in the information frame = 1980
Number of overhead bytes in the information frame = 20
Number of bytes in the acknowledge frame = 20
Time to process a frame = 0.25 ms.
Calculation,
Useful Data = information frame + overhead = 1980+20 = 2000 B
Processing Delay( Tprocess ) = Tprocess (Data) + Tprocess (Acknowledge) = 0.25 + 0.25 = 0.5 ms
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q29➡ | GATE 2017 Set-1 In a RSA cryptosystem, a participant A uses two prime numbers p = 13 and q = 17 to generate her public and private keys. If the public key of A is 35, then the private key of A is ____________. |
Show Answer With Best Explanation
Answer: 11
Explanation:
RSA cryptosystem:
1) Select two prime number p and q. p=13, q=17
2) n= p*q
3) Calculate, ϕ(n)=ϕ(p*q)=ϕ(p)*ϕ(q) = (p-1)*(q-1)= 12*16= 192
4) public key (e) = 35
Calculate d,
=> e*d mod ϕ(n)==1
=> 35*d mod 192 ==1
=> 35*11 mod 192 == 1
Private key(d) = 11
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q30➡ | GATE 2017 Set-2 Consider the following statements about the routing protocols, Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) in an IPv4 network. • I: RIP uses distance vector routing • II: RIP packets are sent using UDP • III: OSPF packets are sent using TCP • IV: OSPF operation is based on link-state routing Which of the statements above are CORRECT? |
i ➥ I, II and III only |
ii ➥ II, III and IV only |
iii ➥ I and IV only |
iv ➥ I, II and IV only |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Routing Protocol | Help-Line |
Q31➡ | GATE 2017 Set-2 Consider socket API on a Linux machine that supports connected UDP sockets. A connected UDP socket is a UDP socket on which connect function has already been called. Which of the following statement is/are CORRECT? I. A connected UDP socket can be used to communicate with multiple peers simultaneously. II. A process can successfully call connect function again for an already connected UDP socket. |
i ➥ Both I and II |
ii ➥ Neither I nor II |
iii ➥ II only |
iv ➥ I only |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | UDP | Help-Line |
Q32➡ | GATE 2017 Set-2 The maximum number of IPv4 router addresses that can be listed in the record route (RR) option field of an IPv4 header is ________. |
Show Answer With Best Explanation
Answer: 9
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IPV4 Header | Help-Line |
Q33➡ | GATE 2017 Set-2 Consider two hosts X and Y, connected by a single direct link of rate 106bits/sec. The distance between the two hosts is 10,000 km and the propagation speed along the link is 2×108m/sec. Host X sends a file of 50,000 bytes as one large message to host Y continuously. Let the transmission and propagation delays be p milliseconds and q milliseconds, respectively. Then the values of p and q are |
i ➥ p=400 and q=50 |
ii ➥ p=100 and q=50 |
iii ➥ p=50 and q=400 |
iv ➥ p=50 and q=100 |
Show Answer With Best Explanation
Answer: I
Explanation:
Given,
Data rate (or Bandwidth) = 106 bits/sec
Distance = 10,000 km
Speed = 2×108 m/sec
Data Length = 50,000 Bytes
Ask,
Transmission Delay = ?
Propagation Delay = ?
Formula,
Calculation,
So,Option(I) is correct.
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q34➡ | GATE 2016 Set-1 Which one of the following protocols is NOT used to resolve one form of address to another one? |
i ➥ RARP |
ii ➥ DHCP |
iii ➥ ARP |
iv ➥ DNS |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Protocols | Help-Line |
Q35➡ | GATE 2016 Set-1 Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 |
i ➥ (iv) only |
ii ➥ (ii) and (iv) only |
iii ➥ (ii) and (iii) only |
iv ➥ (i) and (ii) only |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Application Layer Protocols | Help-Line |
Q36➡ | GATE 2016 Set-1 Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by Kx– and Kx+ for x = A,B, respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A? |
i ➥ {m , KB+ (H(m)) } |
ii ➥ {m , KB– (H(m)) } |
iii ➥ {m , KA– (H(m)) } |
iv ➥ {m , KA+ (H(m)) } |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q37➡ | GATE 2016 Set-1 An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes. The number of fragments that the IP datagram will be divided into for transmission is __________. |
Show Answer With Best Explanation
Answer: 13
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Fragmentation | Help-Line |
Q38➡ | GATE 2016 Set-1 For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of 1 megabyte and the maximum output rate is 20 megabytes per second. Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket is currently full and the machine needs to send 12 megabytes of data. The minimum time required to transmit the data is seconds ________. |
Show Answer With Best Explanation
Answer: 1.1
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Token Bucket | Help-Line |
Q39➡ | GATE 2016 Set-2 Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires |
i ➥ Anarkali’s Public key |
ii ➥ Salim’s Public key |
iii ➥ Salim’s Private key |
iv ➥ Anarkali’s Private key |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q40➡ | GATE 2016 Set-2 In an Ethernet local area network, which one of the following statements is TRUE? |
i ➥ The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
ii ➥ The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
iii ➥ A station continues to transmit the packet even after the collision is detected. |
iv ➥ The exponential backoff mechanism reduces the probability of collision on retransmissions. |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Ethernet LAN | Help-Line |
Q41➡ | GATE 2016 Set-2 Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted. |
i ➥ HTTP GET request, DNS query, TCP SYN |
ii ➥ DNS query, HTTP GET request, TCP SYN |
iii ➥ DNS query, TCP SYN, HTTP GET request |
iv ➥ TCP SYN, DNS query, HTTP GET request |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
Q42➡ | GATE 2016 Set-2 The value of the expression 1399(mod 17), in the range 0 to 16, is _________. |
Show Answer With Best Explanation
Answer: 4
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q43➡ | GATE 2016 Set-2 A network has a data transmission bandwidth of 20 × 106 bits per second. It uses CSMA/CD in the MAC layer. The maximum signal propagation time from one node to another node is 40 microseconds. The minimum size of a frame in the network is _______ bytes. |
Show Answer With Best Explanation
Answer: 200
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Access Control | Help-Line |
Q44➡ | GATE 2016 Set-2 For the IEEE 802.11 MAC protocol for wireless communication, which of the following statements is/are TRUE? • I. At least three non-overlapping channels are available for transmissions. • II. The RTS-CTS mechanism is used for collision detection. • III. Unicast frames are ACKed. |
i ➥ All I, II and III |
ii ➥ I and III only |
iii ➥ II and III only |
iv ➥ II only |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IEEE 802.11 | Help-Line |
Q45➡ | GATE 2016 Set-2 Consider a 128 × 103 bits/ second satellite communication link with one way propagation delay of 150 milliseconds. Selective retransmission (repeat) protocol is used on this link to send data with a frame size of 1 kilobyte. Neglect the transmission time of acknowledgement. The minimum number of bits required for the sequence number field to achieve 100% utilization is _________. |
Show Answer With Best Explanation
Answer: 4
Explanation:
Given,
Bandwidth = 128 x 103 bps = 128 Kbps
Propagation Delay = 150 milliseconds
Frame size = 1 kilobyte
Link utilization (or Efficiency)= 100% = 1
Ask,
The minimum number of bits required for the sequence number field =?
Formula,
For selective repeat protocol,
Efficiency (η) =
where,
N= Sender window size = Receiver window size
Tp = Propogation Delay
Tt = Transmission Delay =
Sequence Number = sender window size + receiver window size = N+N =2N
Minimum number of bits required for the sequence number = ceil of(2N)
Calculation,
Efficiency (η) =
=> 1 =
=> N = 1+2a
=> N = 1+2*2.4 = 5.8 = 6(approximate)
Sequence Number = sender window size + receiver window size = N+N = 6+6 = 12
Minimum number of bits required for the sequence number = ceil of(2N) =ceil of (12) = 4
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q46➡ | GATE 2015 Set-1 Suppose two hosts use a TCP connection to transfer a large file. Which of the following statements is/are False with respect to the TCP connection? I. If the sequence number of a segment is m, then the sequence number of the subsequent segment is always m+1. II. If the estimated round trip time at any given point of time is t sec, the value of the retransmission timeout is always set to greater than or equal to t sec. III. The size of the advertised window never changes during the course of the TCP connection. IV. The number of unacknowledged bytes at the sender is always less than or equal to the advertised window. |
i ➥ III only |
ii ➥ I and III only |
iii ➥ I and IV only |
iv ➥ II and IV only |
Show Answer With Best Explanation
Answer: II
Explanation:
Statement(I): If the sequence number of a segment is m, then the sequence number of the subsequent segment is always m+1.(False)
1 Byte of Data consumes 1 Sequence number.If Sequence number of segment is m, then the Sequence number of subsequent segment is m+1,only if 1 Byte of Data is transferred. But it is already given that Host transfer karge file. So, the statement is False.
Statement(II): If the estimated round trip time at any given point of time is t sec, the value of the retransmission timeout is always set to greater than or equal to t sec.(True)
TCP sets a timeout when it sends Data and if Data is not acknowledged before timeout expires it retransmit data. Timeout is based on RTT. Timeout is always set to greater than or equal to RTT.
Statement(III): The size of the advertised window never changes during the course of the TCP connection.(False)
Receiver’s window buffer is never changed.But depending upon the available window size, Advertised window is keep changing.
Let’s undestand it with example,
Suppose receiver window size is 1000B, so the size of advertised window is 1000B. Again suppose sender have 400B of data to sent, it sends to receiver. Now receiver window have (1000-400) 600B of available space. Now receiver will sent acknowlege to sender with advertised window of 600B. So, The size of the advertised window keep change during the course of the TCP connection.
Statement(IV): The number of unacknowledged bytes at the sender is always less than or equal to the advertised window.(True)
Because sender will never sends number of Byte greater than the advertised window.
So, Option(II) is correct.
Q47➡ | GATE 2015 Set-1 Suppose that everyone in a group on N people wants to communicate secretly with the (N – 1) others using symmetric Key cryptographic system. The communication between any two person should not be decodable by the others in the group. The numbers of keys required in the system as a whole to satisfy the confidentiality requirement is |
i ➥ 2N |
ii ➥ N(N−1) |
iii ➥ N(N−1) / 2 |
iv ➥ (N−1) / 2 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q48➡ | GATE 2015 Set-1 Which one of the following fields of an IP header is NOT modified by a typical IP router? |
i ➥ Checksum |
ii ➥ Source address |
iii ➥ Time to Live (TTL) |
iv ➥ Length |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IPV4 Header | Help-Line |
Q49➡ | GATE 2015 Set-1 In one of the pairs of protocols given below , both the protocols can use multiple TCP connections between the same client and the server. Which one is that? |
i ➥ HTTP, FTP |
ii ➥ HTTP, TELNET |
iii ➥ FTP, SMTP |
iv ➥ HTTP, SMTP |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Protocols | Help-Line |
Q50➡ | GATE 2015 Set-1 Suppose that the stop-and-wait protocol is used on a link with a bit rate of 64 kilobits per second and 20 milliseconds propagation delay. Assume that the transmission time for the acknowledgment and the processing time at nodes are negligible. Then the minimum frame size in bytes to achieve a link utilization of at least 50% is _________. |
Show Answer With Best Explanation
Answer: 320
Explanation:
Given,
Bit rate (or Bandwidth) = 64 kilobits =64 x 103 bps
Processing Delay (or Tp) = 20ms
Link utilization (or Efficiency) = 50% = 1/2
Ask,
Frame size = ?
Formula,
For stop-wait protocol,
Efficiency (η) =
where,
Tp = Propogation Delay
Tt = Transmission Delay =
Calculation,
η =
=>
=> 1+2a = 2
=> Tt =2*Tp
=>
=> L = 2 * Tp * Bw
=> L = 2* 20 ms * 64 x 103 bps
=> L = 2* 20* 10-3 s * 64 x 103 bps
=> L = 40 * 64 / 8 Byte = 320 Byte
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q51➡ | GATE 2015 Set-1 Consider a LAN with four nodes S1, S2, S3 and S4. Time is divided into fixed-size slots, and a node can begin its transmission only at the beginning of a slot. A collision is said to have occurred if more than one node transmit in the same slot. The probabilities of generation of a frame in a time slot by S1, S2, S3 and S4 are 0.1, 0.2, 0.3 and 0.4, respectively. The probability of sending a frame in the first slot without any collision by any of these four stations is _________. |
Show Answer With Best Explanation
Answer: 0.40 to 0.46
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Access Control | Help-Line |
Q52➡ | GATE 2015 Set-2 Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API. |
i ➥ listen, accept, bind recv |
ii ➥ bind, listen, accept, recv |
iii ➥ bind, accept, listen, recv |
iv ➥ accept, listen, bind recv |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Sockets | Help-Line |
Q53➡ | GATE 2015 Set-2 A link has a transmission speed of 106 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgement has negligible transmission delay, and that its propagation delay is the same as the data propagation delay. Also assume that the processing delays at the nodes are negligible. The efficiency of the stop-and-wait protocol in this setup is exactly 25%. The value of the one-way propagation delay (in milliseconds) is ________. |
Show Answer With Best Explanation
Answer: 12
Explanation:
Given,
Bandwidth = 106 bps
Frame size = 1000 B = 1000* 8 bits
Efficiency = 25% = 1/4
Ask,
Propogation Delay = ?
Formula,
For stop-wait protocol,
Efficiency (η) =
where,
Tp = Propogation Delay
Tt = Transmission Delay =
Calculation,
=> η =
=> 1/4 =
=> 1+2a = 4
=> Tp =3*Tt /2
=> Tp = 3*8ms/2
=> Tp = 12ms
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q54➡ | GATE 2015 Set-2 Which one of the following statements is NOT correct about HTTP cookies? |
i ➥ A cookie is a piece of code that has the potential to compromise the security of an internet user |
ii ➥ A cookie gains entry to the user’s work area through an HTTP header |
iii ➥ A cookie has an expiry date and time |
iv ➥ Cookies can be used to track the browsing pattern of a user at a particular site |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | HTTP | Help-Line |
Q55➡ | GATE 2015 Set-2 Consider the following routing table at an IP router: For each IP address in Group I identify the correct choice of the next hop from Group II using the entries from the routing table above. |
i ➥ i-a, ii-c, iii-e, iv-d |
ii ➥ i-a, ii-d, iii-b, iv-e |
iii ➥ i-b, ii-c, iii-d, iv-e |
iv ➥ i-b, ii-c, iii-e, iv-d |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q56➡ | GATE 2015 Set-2 Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU = 1500 bytes). Size of UDP header is 8 bytes and size of IP heard is 20 bytes. There is no option field in IP header. How many total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment? |
i ➥ 6 and 925 |
ii ➥ 6 and 7400 |
iii ➥ 7 and 1110 |
iv ➥ 7 and 8880 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Fragmentation | Help-Line |
Q57➡ | GATE 2015 Set-2 Assume that the bandwidth for a TCP connection is 1048560 bits/sec. Let α be the value of RTT in milliseconds (rounded off to the nearest integer) after which the TCP window scale option is needed. Let β be the maximum possible window size the window scale option. Then the values of α and β are |
i ➥ 63 milliseconds, 65535×214 |
ii ➥ 63 milliseconds, 65535×216 |
iii ➥ 500 milliseconds, 65535×214 |
iv ➥ 500 milliseconds, 65535×216 |
Show Answer With Best Explanation
Answer: III
Explanation:
RTT: Round-trip delay (RTD) or round-trip time (RTT) is the amount of time it takes for a signal to be sent plus the amount of time it takes for acknowledgement of that signal having been received.
Bandwidth-Delay Product(BDP): The bandwidth-delay product is the product of a data link’s capacity (in bits per second) and its round-trip time (in seconds). BDP = RTT * bandwidth
Given,
Bandwidth(or data link capacity) = 1048560 bits/sec
TCP window scale option is needed. It is needed for efficient transfer of data when the Bandwidth-Delay Product (BDP) is greater than 64 KB
{* BDP = 64KB (BDP is maximum 216-1 =65535 B )*}
Calculation,
BDP = RTT * bandwidth
=> 65,535 B = α * 1048560 bits/sec
=>
=> α = 0.5 sec = 500 milliseconds
By using the window scale option, the receiver window size increased up to a maximum of 1GB.
Receiver window size from 64KB to 1GB i.e. 216B to 230B.
a 14bits shift count is used in TCP Header. So, the maximum possible window size gets increased from 216-1 to (216-1 * 214) or 65,535 to 65,535 * 214.
So, Option(III) is correct.
Q58➡ | GATE 2015 Set-3 Consider the following statements. I. TCP connections are full duplex. II. TCP has no option for selective acknowledgment. III. TCP connections are message streams. |
i ➥ Only I is correct |
ii ➥ Only I and III are correct |
iii ➥ Only II and III are correct |
iv ➥ All of I, II and III are correct |
Show Answer With Best Explanation
Answer: I
Explanation:
Statement(I): TCP connections are full duplex.(True)
TCP offers full-duplex service, in which data can flow in both directions at the same time. Each TCP then has a sending and receiving buffer, and segments move in both directions.
Statement(II): TCP has no option for selective acknowledgment.(False)
TCP has option for selective acknowledgment. With selective acknowledgments, the data receiver can inform the sender about all segments that have arrived successfully, so the sender need retransmit only the segments that have actually been lost.
Statement(III): TCP connections are message streams.(False)
TCP connections are Byte stream protocol. While sending data, each Byte of segment is counted and First Byte number of segment is called Sequence number.Sequence number of TCP segment is stored in TCP Header.
So, Option(I) is correct.
Q59➡ | GATE 2015 Set-3 Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second) over a 1 km (kilometer) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? |
i ➥ 8000 |
ii ➥ 10000 |
iii ➥ 16000 |
iv ➥ 20000 |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Access Control | Help-Line |
Q60➡ | GATE 2015 Set-3 In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is _______. |
Show Answer With Best Explanation
Answer: 158
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q61➡ | GATE 2015 Set-3 Consider a network connected two systems located 8000 kilometers apart. The bandwidth of the network is 500 × 106 bits per second. The propagation speed of the media is 4 × 106 meters per second. It is needed to design a Go-Back-N sliding window protocol for this network. The average packet size is 107 bits. The network is to be used to its full capacity. Assume that processing delays at nodes are negligible. Then the minimum size in bits of the sequence number field has to be _________. |
Show Answer With Best Explanation
Answer: 8
Explanation:
Given,
Distance = 8000 km = 8 * 106 meters
Bandwidth = 500 * 106 bps
Propagation Speed= 4 * 106 meters per sec
Frame size = 1 kilobyte
Link utilization (or Efficiency)= 100% = 1
Ask,
The minimum number of bits required for the sequence number field =?
Formula,
For selective repeat protocol,
Efficiency (η) =
where,
N= Sender window size = Receiver window size
Tp = Propogation Delay
Tt = Transmission Delay =
Sequence Number = sender window size + receiver window size = N+N =2N
Minimum number of bits required for the sequence number = ceil of(2N)
Calculation,
Efficiency (η) =
=> 1 =
=> N = 1+2a
=> N = 1+2*2.4 = 5.8 = 6(approximate)
Sequence Number = sender window size + receiver window size = N+N = 6+6 = 12
Minimum number of bits required for the sequence number = ceil of(2N) =ceil of (12) = 4
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q62➡ | GATE 2015 Set-3 Two hosts are connected via a packet switch with 107 bits per second links. Each link has a propagation delay of 20 microseconds. The switch begins forwarding a packet 35 microseconds after it receives the same. If 10000 bits of data are to be transmitted between the two hosts using a packet size of 5000 bits, the time elapsed between the transmission of the first bit of data and the reception of the last bit of the data in microseconds is _. |
Show Answer With Best Explanation
Answer: 1575
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Switching | Help-Line |
Q63➡ | GATE 2014 Set-1 Consider the following three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links. [S1] The computational overhead in link state protocols is higher than in distance vector protocols. [S2] A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol. [S3] After a topology change, a link state protocol will converge faster than a distance vector protocol. Which one of the following is correct about S1, S2, and S3 ? |
i ➥ listen, accept, bind recv |
ii ➥ S1, S2, and S3 are all false. |
iii ➥ S1 and S2 are true, but S3 is false. |
iv ➥ S1 and S3 are true, but S2 is false. |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Routing algorithms | Help-Line |
Q64➡ | GATE 2014 Set-1 Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5 |
i ➥ P and R only |
ii ➥ Q and R only |
iii ➥ Q and S only |
iv ➥ R and S only |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network security | Help-Line |
Q65➡ | GATE 2014 Set-1 Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web server. 3. The web server sends the requested webpage using HTTP. 4. The web browser resolves the domain name using DNS. |
i ➥ 4,2,1,3 |
ii ➥ 1,2,3,4 |
iii ➥ 4,1,2,3 |
iv ➥ 2,4,1,3 |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | HTTP | Help-Line |
Q66➡ | GATE 2014 Set-1 Consider a token ring network with a length of 2 km having 10 stations including a monitoring station. The propagation speed of the signal is 2×108 m/s and the token transmission time is ignored. If each station is allowed to hold the token for 2 µsec, the minimum time for which the monitoring station should wait (in µsec) before assuming that the token is lost is______. |
Show Answer With Best Explanation
Answer: 28μs to 30 μs
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Token-Ring | Help-Line |
Q67➡ | GATE 2014 Set-1 Let the size of congestion window of a TCP connection be 32 KB when a timeout occurs. The round trip time of the connection is 100 msec and the maximum segment size used is 2 KB. The time taken (in msec) by the TCP connection to get back to 32 KB congestion window is _. |
Show Answer With Best Explanation
Answer: 1000 To 1300
Explanation:
Given,
size of congestion window = 32KB
Round Trip Time = 100ms
Maximum segment size = 2KB
Logic to solve,
When Time-out occurs in TCP slow start phase, Thresold value is calculated by
Thresold = (Congestion window size)/2
So, start with 1MSS (or 2KB) as sender window size. Slow start phase will begin and window size will grow exponentially till Thresod reached. After that congestion avaidance phase will begin. Now window size will grow linearly till 16MSS (or 32KB).
Calculation,
Thresold = (Congestion window size)/2 = 32KB / 2 = 16KB
Slow start phase:
window size is 1 MSS (or 2KB)
After 1st Round Trip, window size is 2 MSS (or 4KB)
After 2nd Round Trip, window size is 4 MSS (or 8KB)
After 3rd Round Trip, window size is 8 MSS (or 16KB)
(Thresold reached)
Congestion avaodance phase:
After 4th Round Trip, window size is 9 MSS (or 18KB)
After 5th Round Trip, window size is 10 MSS (or 20KB)
After 6th Round Trip, window size is 11 MSS (or 22KB)
After 7th Round Trip, window size is 12 MSS (or 24KB)
After 8th Round Trip, window size is 13 MSS (or 26KB)
After 9th Round Trip, window size is 14 MSS (or 28KB)
After 10th Round Trip, window size is 15 MSS (or 30KB)
After 11th Round Trip, window size is 16 MSS (or 32KB)
Total Round Trip = 11
Total Round Trip Time = 11* 100 ms = 1100ms
The time taken (in msec) by the TCP connection to get back to 32 KB congestion window is 1100.
Q68➡ | GATE 2014 Set-1 Consider a selective repeat sliding window protocol that uses a frame size of 1 KB to send data on a 1.5 Mbps link with a one-way latency of 50 msec. To achieve a link utilization of 60%, the minimum number of bits required to represent the sequence number field is __. |
Show Answer With Best Explanation
Answer: 5
Explanation:
Given,
Frame size = 1 KB = 8 x 210 bits = 8*1024 bits
Bandwidth = 1.5 Mbps = 1.5 x 106 bps
Propagation Delay(Tp) = 50 milliseconds
Link utilization (or Efficiency)= 60% = 0.6
Ask,
The minimum number of bits required to represent the sequence number field =?
Formula,
For selective repeat protocol,
Efficiency (η) =
where,
N= Sender window size = Receiver window size
Tp = Propogation Delay
Tt = Transmission Delay =
Sequence Number = sender window size + receiver window size = N+N =2N
Minimum number of bits required for the sequence number = ceil of(2N)
Calculation,
Efficiency (η) =
=> 0.6 =
=> N = 0.6(1+2a)
=> N = 0.6(1+2*9.15) = 11.58 = 12(approximate)
Sequence Number = sender window size + receiver window size = N+N = 12+12 = 24
Minimum number of bits required for the sequence number = ceil of(2N) =ceil of (24) = 5bits
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q69➡ | GATE 2014 Set-2 Which one of the following is TRUE about the interior gateway routing protocols – Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)? |
i ➥ RIP uses distance vector routing and OSPF uses link state routing |
ii ➥ OSPF uses distance vector routing and RIP uses link state routing |
iii ➥ Both RIP and OSPF use link state routing |
iv ➥ Both RIP and OSPF use distance vector routing |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Routing protocols | Help-Line |
Q70➡ | GATE 2014 Set-2 Which one of the following socket API functions converts an unconnected active TCP socket into a passive socket? |
i ➥ connect |
ii ➥ bind |
iii ➥ listen |
iv ➥ accept |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Socket | Help-Line |
Q71➡ | GATE 2014 Set-2 In the diagram shown below, L1 is an Ethernet LAN and L2 is a Token-Ring LAN. An IP packet originates from sender S and traverses to R, as shown. The links within each ISP and across the two ISPs, are all point-to-point optical links. The initial value of the TTL field is 32. The maximum possible value of the TTL field when R receives the datagram is . |
Show Answer With Best Explanation
Answer: 26
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Ethernet | Help-Line |
Q72➡ | GATE 2014 Set-2 Consider the store and forward packet switched network given below. Assume that the bandwidth of each link is 106 bytes / sec. A user on host A sends a file of size 103 bytes to host B through routers R1 and R2 in three different ways. In the first case a single packet containing the complete file is transmitted from A to B. In the second case, the file is split into 10 equal parts, and these packets are transmitted from A to B. In the third case, the file is split into 20 equal parts and these packets are sent from A to B. Each packet contains 100 bytes of header information along with the user data. Consider only transmission time and ignore processing, queuing and propagation delays. Also assume that there are no errors during transmission. Let T1, T2 and T3 be the times taken to transmit the file in the first, second and third case respectively. Which one of the following is CORRECT? |
i ➥ T1 < T2 < T3 |
ii ➥ T1 > T2 > T3 |
iii ➥ T2 = T3, T3 < T1 |
iv ➥ T1 = T3, T3 > T2 |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Switching | Help-Line |
Q73➡ | GATE 2014 Set-2 An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q—R1—R2—R3—H H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer encryption is used, with DES as the shared key encryption protocol. Consider the following four pieces of information: [I1] The URL of the file downloaded by Q [I2] The TCP port numbers at Q and H [I3] The IP addresses of Q and H [I4] The link layer addresses of Q and H Which of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone? |
i ➥ Only I1 and I2 |
ii ➥ Only I1 |
iii ➥ Only I2 and I3 |
iv ➥ Only I3 and I4 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q74➡ | GATE 2014 Set-2 A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage from a HTTP server S. The static HTML page has exactly one static embedded image which is also at S. Assuming no caching, which one of the following is correct about the HTML webpage loading (including the embedded image)? |
i ➥ Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP connection to server S |
ii ➥ Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is sufficient |
iii ➥ A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is necessary for this |
iv ➥ A single HTTP request from Q to S is sufficient, and this is possible without any TCP connection between Q and S |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
Q75➡ | GATE 2014 Set-3 In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair is |
i ➥ Network layer and Routing |
ii ➥ Data Link Layer and Bit synchronization |
iii ➥ Transport layer and End-to-end process communication |
iv ➥ Medium Access Control sub-layer and Channel sharing |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | ISO-OSI Layer | Help-Line |
Q76➡ | GATE 2014 Set-3 A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is |
i ➥ 0111110100 |
ii ➥ 0111110101 |
iii ➥ 0111111101 |
iv ➥ 0111111111 |
Show Answer With Best Explanation
Answer: II
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Data Link Layer | Help-Line |
Q77➡ | GATE 2014 Set-3 Host A (on TCP/IP v4 network A) sends an IP datagram D to host B (also on TCP/IP v4 network B). Assume that no error occurred during the transmission of D. When D reaches B, which of the following IP header field(s) may be different from that of the original datagram D? (i) TTL (ii) Checksum (iii) Fragment Offset |
i ➥ (i) only |
ii ➥ (i) and (ii) only |
iii ➥ (i) and (ii) only |
iv ➥ (i), (ii) and (iii) |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IPV4 Header | Help-Line |
Q78➡ | GATE 2014 Set-3 An IP router implementing Classless Inter Domain Routing (CIDR) receives a packet with address 131.23.151.76. The router’s routing table has the following entries: The identifier of the output interface on which this packet will be forwarded is ________. |
Show Answer With Best Explanation
Answer: 1
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q79➡ | GATE 2014 Set-3 Every host in an IPv4 network has a 1-second resolution real-time clock with battery backup. Each host needs to generate up to 1000 unique identifiers per second. Assume that each host has a globally unique IPv4 address. Design a 50-bit globally unique ID for this purpose. After what period (in seconds) will the identifiers generated by a host wrap around? |
Show Answer With Best Explanation
Answer: 256
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IPv4 Protocol | Help-Line |
Q80➡ | GATE 2014 Set-3 An IP router with a Maximum Transmission Unit (MTU) of 1500 bytes has received an IP packet of size 4404 bytes with an IP header of length 20 bytes. The values of the relevant fields in the header of the third IP fragment generated by the router for this packet are |
i ➥ MF bit: 0, Datagram Length: 1444; Offset: 370 |
ii ➥ MF bit: 1, Datagram Length: 1424; Offset: 185 |
iii ➥ MF bit: 1, Datagram Length: 1500; Offset: 370 |
iv ➥ MF bit: 0, Datagram Length: 1424; Offset: 2960 |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Fragmentation | Help-Line |
Q81➡ | GATE 2013 The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are |
i ➥ TCP, UDP, UDP and TCP |
ii ➥ UDP, TCP, TCP and UDP |
iii ➥ UDP, TCP, UDP and TCP |
iv ➥ TCP, UDP, TCP and UDP |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Trasport Layer Protocol | Help-Line |
Q82➡ | GATE 2013 Using public key cryptography, X adds a digital signature σ to message M, encrypts <M, σ> , and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations? |
i ➥ Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key |
ii ➥ Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key |
iii ➥ Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key |
iv ➥ Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Security | Help-Line |
Q83➡ | GATE 2013 Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D. |
i ➥ Network layer – 4 times and Data link layer – 4 times |
ii ➥ Network layer – 4 times and Data link layer – 3 times |
iii ➥ Network layer – 4 times and Data link layer – 6 times |
iv ➥ Network layer – 2 times and Data link layer – 6 times |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Network Layer | Help-Line |
Q84➡ | GATE 2013 Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
i ➥ 1 |
ii ➥ 2 |
iii ➥ 2.5 |
iv ➥ 5 |
Show Answer With Best Explanation
Answer: II
Explanation:
Given,
Data rate (or Bandwidth) = 500 Mbps = 500 x 106 bps
Frame size = 10,000 bits
Speed = 200,000 km/sec
Ask,
Distance =?
Formula,
Length = 2 * Tp * Bandwidth
Calculation,
=> L = 2 * Tp * Bandwidth
=> L = 2 *(Distance/Speed) * Bandwidth
So, Option(II) is correct.
More Discussion | Explanation On YouTube | Flow Control | Help-Line |
Q85➡ | GATE 2013 In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are |
i ➥ Last fragment, 2400 and 2789 |
ii ➥ First fragment, 2400 and 2759 |
iii ➥ Last fragment, 2400 and 2759 |
iv ➥ Middle fragment, 300 and 689 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Fragmentation | Help-Line |
Q86➡ | GATE 2013 Consider the store and forward packet switched network given below. Assume that the bandwidth of each link is 106 bytes / sec. A user on host A sends a file of size 103 bytes to host B through routers R1 and R2 in three different ways. In the first case a single packet containing the complete file is transmitted from A to B. In the second case, the file is split into 10 equal parts, and these packets are transmitted from A to B. In the third case, the file is split into 20 equal parts and these packets are sent from A to B. Each packet contains 100 bytes of header information along with the user data. Consider only transmission time and ignore processing, queuing and propagation delays. Also assume that there are no errors during transmission. Let T1, T2 and T3 be the times taken to transmit the file in the first, second and third case respectively. Which one of the following is CORRECT? |
i ➥ T1 < T2 < T3 |
ii ➥ T1 > T2 > T3 |
iii ➥ T2 = T3, T3 < T1 |
iv ➥ T1 = T3, T3 > T2 |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Switching | Help-Line |
Q87➡ | GATE 2012 The protocol data unit (PDU) for the application layer in the Internet stack is |
i ➥ Segment |
ii ➥ Datagram |
iii ➥ Message |
iv ➥ Frame |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Application Layer | Help-Line |
Q88➡ | GATE 2012 Which of the following transport layer protocols is used to support electronic mail? |
i ➥ SMTP |
ii ➥ IP |
iii ➥ TCP |
iv ➥ UDP |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Transport Layer Protocols | Help-Line |
Q89➡ | GATE 2012 In the IPv4 addressing format, the number of networks allowed under Class C addresses is |
i ➥ 214 |
ii ➥ 27 |
iii ➥ 221 |
iv ➥ 224 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q90➡ | GATE 2012 An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? |
i ➥ 245.248.136.0/21 and 245.248.128.0/22 |
ii ➥ 245.248.128.0/21 and 245.248.128.0/22 |
iii ➥ 245.248.132.0/22 and 245.248.132.0/21 |
iv ➥ 245.248.136.0/24 and 245.248.132.0/21 |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | IP Address | Help-Line |
Q91➡ | GATE 2012 Consider a source computer (S) transmitting a file of size 106 bits to a destination computer (D) over a network of two routers (R1 and R2) and three links (L1, L2 and L3). L1 connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of length 100 km. Assume signals travel over each link at a speed of 108 meters per second. Assume that the link bandwidth on each link is 1Mbps. Let the file be broken down into 1000 packets each of size 1000 bits. Find the total sum of transmission and propagation delays in transmitting the file from S to D? |
i ➥ 1005 ms |
ii ➥ 1010 ms |
iii ➥ 3000 ms |
iv ➥ 3003 ms |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Switching | Help-Line |
Q92➡ | GATE 2012 Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the congestion window size at the end of the tenth transmission. |
i ➥ 8 MSS |
ii ➥ 14 MSS |
iii ➥ 7 MSS |
iv ➥ 12 MSS |
Show Answer With Best Explanation
Answer: Marks to All
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Congestion Control | Help-Line |
Q93➡ | GATE 2011 A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT |
i ➥ block entire HTTP traffic during 9:00PM and 5:00AM |
ii ➥ block all ICMP traffic |
iii ➥ stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address |
iv ➥ block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM |
Show Answer With Best Explanation
Answer: IV
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Firewall | Help-Line |
Q94➡ | GATE 2011 Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application level protocol used in each activity? |
i ➥ m1: HTTP m2: SMTP m3: POP |
ii ➥ m1: SMTP m2: FTP m3: HTTP |
iii ➥ m1: SMTP m2: POP m3: HTTP |
iv ➥ m1: POP m2: SMTP m3: IMAP |
Show Answer With Best Explanation
Answer: III
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Application Layer Protocol | Help-Line |
Q95➡ | GATE 2011 Statement for Linked Answer Questions 95 and 96: Consider a network with five nodes, N1 to N5 as shown below. The network uses a Distance Vector Routing protocol. Once the routes have stabilized, the distance vectors at different nodes are as following. N1:(0,1,7,8,4) N2:(1,0,6,7,3) N3:(7,6,0,2,6) N4:(8,7,2,0,4) N5:(4,3,6,4,0) Each distance vector is the distance of the best known path at the instance to nodes, N1 to N5, where the distance to itself is 0. Also, all links are symmetric and the cost is identical in both directions. In each round, all nodes exchange their distance vectors with their respective neighbors. Then all nodes update their distance vectors. In between two rounds, any change in cost of a link will cause the two incident nodes to change only that entry in their distance vectors. The cost of link N2-N3 reduces to 2(in both directions). After the next round of updates, what will be the new distance vector at node, N3. |
i ➥ (3, 2, 0, 2, 5) |
ii ➥ (3, 2, 0, 2, 6) |
iii ➥ (7, 2, 0, 2, 5) |
iv ➥ (7, 2, 0, 2, 6) |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
More Discussion | Explanation On YouTube | Routing Protocol | Help-Line |
Q96➡ | |