Computer Network Subject wise UGC NET Question Analysis

Networking PYQ Part-2


Q.1➡ | UGC NET DEC 2023
The work done by UDP is/are:
(A) Congestion control
(B) Flow control
(C) Retransmission
(D) Segments transmission
Choose the correct answer from the options given below :
i ➥ (A) and (D) Only
ii ➥ (C) Only
iii ➥ (D) Only
iv ➥ (B) and (C) Only
Best Explanation:
Answer: (III)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.2➡ | UGC NET DEC 2023
Has functions are used to produce the message digests which are then encrypted with a private key to get :
i ➥ Public key
ii ➥ Digital signature
iii ➥ Cipher text
iv ➥ Data Encryption Standard
Best Explanation:
Answer: (II)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.3➡ | UGC NET DEC 2023
Which of the following are example of CSMA channel sensing methods ?
(A) 1-persistent
(B) 2-persistent
(C) p-persistent
(D) o-persistent
Choose the correct answer from the options given below :
i ➥ (A), (B) and (D) Only
ii ➥ (A), (C) and (D) Only
iii ➥ (B), (C) and (D) Only
iv ➥ (A), (B) and (C) Only
Best Explanation:
Answer: (II)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.4➡ | UGC NET DEC 2023
Match List – I with List – II.
List – I
(A) Monoalphabetic Cipher
(B) DES
(C) Stream Cipher
(D) Polyalphabetic Cipher

List – II
(I) Round key
(II) One-to-many relationship
(III) One-to-one relationship
(IV) Feedback mechanism
Choose the correct answer from the options given below :
i ➥ (A)-(III), (B)-(I), (C)-(IV), (D)-(II)
ii ➥ (A)-(III), (B)-(IV), (C)-(II), (D)-(I)
iii ➥ (A)-(I), (B)-(III), (C)-(IV), (D)-(II)
iv ➥ (A)-(II), (B)-(I), (C)-(IV), (D)-(III)
Best Explanation:
Answer: (I)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.5➡ | UGC NET DEC 2023
Which of the following is not a field in TCP header ?
i ➥ Sequence Number
ii ➥ Checksum
iii ➥ Fregmentation offset
iv ➥ Window size
Best Explanation:
Answer: (III)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.6➡ | UGC NET DEC 2023
Arrange the following in ascending order :
(A) Remainder of 4916 when divided by 17
(B) Remainder of 2446 when divided by 9
(C) Remainder of 15517 when divided by 17
(D) Last digits of the number 745
Choose the correct answer from the options given below :
i ➥ (A), (B), (C), (D)
ii ➥ (A), (B), (D), (C)
iii ➥ (A), (C), (B), (D)
iv ➥ (D), (C), (B), (A)
Best Explanation:
Answer: (III)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.7➡ | UGC NET DEC 2023
Which of the following statement/s are CORRECT ?
(A) NRZ is a bipolar scheme in which the positive voltage define bit is 0 (zero).
(B) NRZ-L and NRZ-I both have an average signal rate of N/2.
(C) The idea of RZ and NRZ-L are combined into Manchester scheme.
(D) NRZ-L and NRZ-I both have DC component problems.
(E) The minimum bandwidth of Manchester and differential Manchester is 3 times that of NRZ.
Choose the correct answer from the options given below :
i ➥ (A), (B) and (C) Only
ii ➥ (A), (C), (D) and (E) Only
iii ➥ (B), (C) and (D) Only
iv ➥ (A), (B), (C) and (E) Only
Best Explanation:
Answer: (III)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.8➡ UGC NET DEC 2023
In “bit stuffing”, each frame begins and ends with a bit pattern in hexadecimal?
i ➥ Ox8C
ii ➥ Ox6F
iii ➥ OxFF
iv ➥ Ox7E
Best Explanation:
Answer: (IV)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.9➡ | UGC NET DEC 2023
A multiplexes combines for 100 Kbps channels using a time slot of 2 bits. What is the bit rate?
i ➥ 100 Kbps
ii ➥ 200 Kbps
iii ➥ 40 Kbps
iv ➥ 1000 Kbps
Best Explanation:
Answer: (III)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q10➡ | UGC NET DEC 2023
Which of the following statement/s is/are NOT CORRECT ?
(A) OSPF is based on distance-vector routing protocol.
(B) Both link-state and distance-vector routing are based on the least cost goal.
(C) BGP4 is based on the path-vector algorithm.
(D) The three-node instability can be avoided using split horizon combined with poison reverse.
(E) RIP is based on link state algorithm.
Choose the correct answer from the options given below :
i ➥ (A), (D) and (E) Only
ii ➥ (A) and (B) Only
iii ➥ (B) and (C) Only
iv ➥ (B), (C) and (E) Only
Best Explanation:
Answer: (I)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.11➡ | UGC NET DEC 2023
Given below are two statements:
Statement (I): In datagram networks – routers hold state information about connections
Statement (II): In virtual circuit network- each virtual circuit requires router table space per connection
In the light of the above statements, choose the most appropriate answer from the options given below:
i ➥ Both Statement I and Statement II are correct
ii ➥ Both Statement I and Statement II are incorrect
iii ➥ Statement I is correct but Statement II is incorrect
iv ➥ Statement I is incorrect but Statement II is correct
Best Explanation:
Answer: (IV)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.12➡ | UGC NET DEC 2023
Arrange the following steps in the correct order for a DHCP Client to renew its IP lease with a DHCP server:
(A) DHCP client sends a DHCPREQUEST message
(B) DHCP server acknowledges the renewal with a DHCPACK message
(C) DHCP client checks the local lease timer and initiates renewal
(D) DHCP server updates its lease database
Choose the correct answer from the options given below:
i ➥ (A), (B), (C), (D)
ii ➥ (C), (D), (Β), (A)
iii ➥ (C), (B), (A), (D)
iv ➥ (C), (A), (B), (D)
Best Explanation:
Answer: (IV)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.13➡ | UGC NET JUNE 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
45000054000300002006…..
What is the header size?
i ➥ 10 bytes
ii ➥ 20 bytes
iii ➥ 30 bytes
iv ➥ 40 bytes
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.14➡ | UGC NET JUNE 2023
IP datagram has arrived with following partial information in the header (in hexadecimal) 45000054000300002006….
How many more routers can the packet travel to?
i ➥ 22
ii ➥ 26
iii ➥ 30
iv ➥ 32
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.15➡ | UGC NET JUNE 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
45000054000300002006….
What is the protocol of the payload being carried by the packet?
i ➥ ICMP
ii ➥ SCTP
iii ➥ TCP protocol
iv ➥ IGMP
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.16➡ | UGC NET JUNE 2023
IP datagram has arrived with following partial information in the header (in hexadecimal) 45000054000300002006…

What is the efficiency of this datagram?
i ➥ 76.19%
ii ➥ 80.50%
iii ➥ 82.24%
iv ➥ 85.45%
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.17➡ | UGC NET JUNE 2023
IP datagram has arrived with following partial information in the header (in hexadecimal) 45000054000300002006….
What is the size of datagram?
i ➥ 64 bytes
ii ➥ 74 bytes
iii ➥ 84 bytes
iv ➥ 104 bytes
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.18➡ | UGC NET JUNE 2023
Match List I with List II
List I	List II
A. Physical layer	I. Transforming the raw bits in the form of frame for transmission
B. Data Link Layer	II. Control and monitoring of subnet
C. Network layer	III. Transmission of raw bits over communication channel
D. Transport layer	IV. Datagrams transmission data through connection oriented or connectionless using datagram
Choose the correct answer from the options given below:
i ➥ A-III B-II C-I D-IV
ii ➥ A-II B-III C-I D-IV
iii ➥ A-III B-I C-II D-IV
iv ➥ A-II B-IV C-I D-III
Best Explanation:
Answer: III
Explanation:

A. Physical layer → III Transmission of raw bits over communication channel
B. Data Link Layer → I. Transforming the raw bits in the form of frame for transmission
C. Network layer → II. Control and monitoring of subnet
D. Transport layer → IV. Datagrams transmission data through connection oriented or connectionless using datagram
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.19➡ | UGC NET JUNE 2023
Match List I with List IIMatch List I with List II
List I	List II
A. CDMA	I. It provides mobile internet connection with faster data transfer rates
B. GSM	II. It allows user to connect to a network or to other devices over wireless channel

C. UMTS	III. Accessing mechanism for multiple transmitters over a single channel
D. WiFi	IV. It is a cellular technology that employs hybrid of FDMA and TDMA
i ➥ A-III B-IV C-II D-I
ii ➥ A-III B-IV C-I D-II
iii ➥ A-II B-III C-IV D-I
iv ➥ A-II B-I C-IV D-III
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.20➡ | UGC NET JUNE 2023
A TCP server application is programmed to listen on port P on host S. A TCP client is connected to the TCP server over the network, Consider that while TCP connection is active the server is crashed and rebooted. Assume that the client does not use TCP keep alive timer. Which of the following behavior /s is/are possible?
Statement I: The TCP application server on S can listen on P after reboot.
Statement II: If client sends a packet after the server reboot, it will receive the RST segment.

In the light of the above statements, choose the correct answer from the options given below.
i ➥ Both Statement I and Statement II  are true
ii ➥ Both Statement I  and Statement II  are false
iii ➥ Statement I  is true but Statement II  is false
iv ➥ Statement I  is false but Statement II  is true
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.21➡ | UGC NET JUNE 2023
In the standard Ethernet with transmission rate of 10Mbps, asssume that the length of the medium is 2500 m and size of a frame is 512 bytes. The propagation speed of a signal in a cable is normally 2 * 10 ^ 8 * m / s The transmission delay and propogation delay are.
i ➥ 25.25μs and 51.2μs
ii ➥ 51.2μs and 12.5μs
iii ➥ 10.24μs and 50.12μs
iv ➥ 12.5μs and 51.2μs
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line


Q.22➡ | UGC NET JUNE 2023
Consider two hosts P and Q that are connected through a router R. The maximum transfer unit (MTU) value of the link between P and R is 1500 bytes and between R and Q is 820 bytes. A TCP segment of size 1400 bytes is transferred from P to Q through R with IP identification value of 0 x 1234. Assume that IP header size is 20 bytes. Further the pcaket is allowed to be fragmented that is Don’t fragment (DF) flag in the IP Header is not set by P. Which of the following statement/s is/are true?
A. Two fragments are created at R and IP datagram size carrying the second fragment is 620 bytes
B. If the second fragment is lost, then R resends the fragment with IP identification value of 0 × 1234
C. If the second fragment lost, then P requires to resend the entire TCP segment.
D. TCP destination port can be determined by analyzing the second fragment only.


Choose the correct answer from the options given below:
i ➥ A, B and C only
ii ➥ A and C only
iii ➥ C and D only
iv ➥ B and D only
Best Explanation:
Answer: B
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line
Q.23➡ | NET June 2023

Match List I with List II
A. CDMA	I.	It provides mobile internet connection with faster data transfer rates
B. GSM	II.	It allows user to connect to a network or to other devices over wireless channel
C. UMTS	III.	Accessing mechanism for multiple transmitters over a single channel
D. Wi-Fi	IV.	It is a cellular technology that employs hybrid of FDMA and TDMA

Choose the correct answer from the options given below:
i ➥ A-III, B-IV, C-II, D-I
ii ➥ A-III, B-IV, C-I, D-II
iii ➥ A-II, B-III, C-IV, D-I
iv ➥ A-II, B-I, C-IV, D-III
Best Explanation:
Answer: (ii)
Explanation:
Here is a brief explanation of each technology:
CDMA (Code Division Multiple Access): A cellular technology that uses a spread spectrum technique to allow multiple users to share a single frequency channel.
GSM (Global System for Mobile Communications): A cellular technology that uses digital signals to provide mobile voice and data services.
UMTS (Universal Mobile Telecommunications System): A 3G cellular technology that provides faster data transfer rates than GSM.
Wi-Fi (Wireless Fidelity): A wireless networking technology that allows devices to connect to the internet or to each other over a short distance.
Now, let’s match each technology with its corresponding description in the image:
A-III: CDMA is an accessing mechanism for multiple transmitters over a single channel.
B-IV: GSM is a cellular technology that employs a hybrid of FDMA (Frequency Division Multiple Access) and TDMA (Time Division Multiple Access).
C-I: UMTS provides mobile internet connection with faster data transfer rates.
D-II: Wi-Fi allows user to connect to a network or to other devices over wireless channel.
Therefore, the correct answer is 2. A-III, B-IV, C-I, D-II.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.24➡ | NET June 2023
 A TCP server application is programmed to listen on port P on host S. A TCP client is connected to the TCP server over the network, consider that while TCP connection is active the server is crashed and rebooted. Assume that the client does not use TCP keepalive timer. Which of the following behaviour/s is/are possible?

Statement I: The TCP application server on S can listen on P after reboot.
Statement II: If client sends a packet after the server reboot, it will receive the RST segment.

 In the light of the above statements, choose the correct answer from the options given below.
i ➥ Both Statement I and Statement II are true
ii ➥ Both Statement I and Statement II are false
iii ➥ Statement I is true but Statement II is false
iv ➥ Statement I is false but Statement II is true
Best Explanation:
Answer: (i)
Explanation:
Statement I: The TCP application server on S can listen on P after reboot.
This statement is true. When the server reboots, it can reestablish the listening socket on port P, assuming there are no conflicts or issues preventing it from doing so.
Statement II: If the client sends a packet after the server reboot, it will receive the RST segment.
This statement is also true. When the server reboots, any existing TCP connections are terminated, and the client will receive a RST (reset) segment as a response to any further data it sends on the previous connection.
So, the correct answer is:
Both Statement I and Statement II are true.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.25➡ | NET June 2023
In the standard Ethernet with transmission rate of 10 Mbps, assume that the length of the medium is 2500m and size of a frame is 512 bytes. The propagation speed of a signal in a cable is normally 2 x 108 m/s. The transmission delay and propagation delay are
i ➥ 25.25μs and 51.2μs
ii ➥ 51.2 μs and 12.5 μs
iii ➥ 10.24 μs and 50.12 μs
iv ➥ 12.5 μs and 51.2 μs
Best Explanation:
Answer: (ii)
Explanation:
Transmission delay in Ethernet is the time it takes to transmit a single frame over the physical medium. It is calculated by dividing the frame size by the transmission rate.
In this case, the transmission delay is:
Transmission delay = Frame size / Transmission rate
512 bytes / 10 Mbps = 51.2 microseconds

Propagation delay in Ethernet is the time it takes for a single bit to travel from the source to the destination over the physical medium. It is calculated by dividing the length of the medium by the propagation speed of the signal.
In this case, the propagation delay is:
Propagation delay = Length of medium / Propagation speed
2500 m / 2 x 10^8 m/s = 12.5 microseconds
Therefore, the transmission delay and propagation delay in the standard Ethernet with a transmission rate of 10 Mbps, a medium length of 2500 m, and a frame size of 512 bytes are 51.2 microseconds and 12.5 microseconds, respectively.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.26➡ | NET June 2023

Match List I with List II
Match List I with List II
LIST I	LIST II
A. Physical layer	I.	Transforming the raw bits in the form of frame for transmission
B. Data Link Layer	II.	Control and monitoring of subnet
C. Network layer	III.	Transmission of raw bits over communication channel
D. Transport layer	IV.	Datagrams transmission data through connection oriented or   connectionless using datagram
1. A-III, B-II, C-I, D-IV
2. A-II, B-III, C-I, D-IV
3. A-III, B-I, C-II, D-IV
4. A-II, B-IV, C-I, D-III
Choose the correct answer from the options given below:
i ➥ A-III, B-II, C-I, D-IV
ii ➥ A-II, B-III, C-I, D-IV
iii ➥ A-III, B-I, C-II, D-IV
iv ➥ A-II, B-IV, C-I, D-III
Best Explanation:
Answer: (i)
Explanation:
Here’s the correct match for List I with List II:
A. Physical layer – III. Transmission of raw bits over a communication channel
B. Data Link Layer – I. Transforming the raw bits into the form of frames for transmission
C. Network layer – II. Control and monitoring of the subnet
D. Transport layer – IV. Datagram transmission of data through connection-oriented or connectionless using datagrams
So, the correct match is:
A-III, B-I, C-II, D-IV
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.27➡ | NET June 2023
Consider two hosts P and Q that are connected through a router R. The maximum transfer unit (MTU) value of the link between P and 1500 bytes and between R and Q is 820 bytes. A TCP segment of size 1400 bytes is transferred from P to Q through R with IP identification value of 0x1234. Assume that IP header size is 20 bytes. Further the packet is allowed to be fragmented that is Don’t fragment (DF) flag in the IP Header is not set by P.
Which of the following statement/s is/are true?
A. Two fragments are created at R and IP datagram size carrying the second fragment is 620 bytes
B. If the second fragment is lost, then R resends the fragment with IP identification value of 0x1234
C. If the second fragment lost, then P requires to resend the entire TCP segment.
D. TCP destination port can be determined by analysing the second fragment only.

Choose the correct answer from the options given below:
i ➥ A. B and C only
ii ➥ A and C only
iii ➥ C and D only
iv ➥ B and D only
Best Explanation:
Answer: (iii)
Explanation:
Let’s analyze each statement:
A. Two fragments are created at R, and the IP datagram size carrying the second fragment is 620 bytes.
This statement is true. Since the MTU between P and R is 1500 bytes and the MTU between R and Q is 820 bytes, when the 1400-byte TCP segment from P is forwarded through R, it will be fragmented into two parts. The first fragment will be 820 bytes, and the second fragment will be 580 bytes (1400 – 820).
B. If the second fragment is lost, then R resends the fragment with an IP identification value of 0x1234.
This statement is false. R is a router and does not maintain the state of TCP segments. It is the responsibility of the end-hosts (P and Q) to handle retransmissions and not the router (R).
C. If the second fragment is lost, then P requires to resend the entire TCP segment.
This statement is true. If the second fragment is lost, P would have to resend the entire TCP segment to ensure that all data is delivered to the destination, as the TCP protocol ensures reliable data transfer.
D. TCP destination port can be determined by analyzing the second fragment only.
This statement is false. The destination port of a TCP segment is typically found in the TCP header of the original unfragmented segment. It is not determined by analyzing any single fragment.
So, the correct answer is:
A and C only
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.28➡ | NET June 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054000300002006…..

What is the header size?
i ➥ 10 bytes
ii ➥ 20 bytes
iii ➥ 30 bytes
iv ➥ 40 bytes
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line
Best Explanation:
Answer: (ii)
Explanation:
The IP datagram header size is 20 bytes.
The first byte of the header contains the version and header length fields. The version field is always 4 for IPv4, and the header length field is a 4-bit field that specifies the number of 32-bit words in the header. The minimum value for the header length field is 5, which indicates a length of 5 × 32 bits = 160 bits = 20 bytes. The maximum value for the header length field is 15, which indicates a length of 15 × 32 bits = 480 bits = 60 bytes.
In the given partial header, the first byte is 45. The first four bits of this byte are 45, which is the hexadecimal representation of the decimal number 17. Since the header length field is a 4-bit field, the value 17 is invalid. Therefore, the only possible value for the header length field is 5, which indicates a header size of 20 bytes.
Here is a breakdown of the first 10 bytes of the header:
IP datagram has arrived with following partial information in the header (in hexadecimal)

45000054000300002006..... 
1.   10 bytes
2.   20 bytes
3.   30 bytes
4.   40 bytes
Bytes 0-1: Version and header length (4 bytes)
Bytes 2-3: Type of service (TOS) (1 byte)
Bytes 4-5: Total length (2 bytes)
Bytes 6-7: Identification (ID) (2 bytes)
Bytes 8-9: Flags and fragment offset (2 bytes)
The remaining bytes of the header contain additional information, such as the source and destination IP addresses, time to live (TTL), and protocol number.

Q.29➡ | NET June 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054000300002006…..
How many more routers can the packet travel to?
i ➥ 22
ii ➥ 26
iii ➥ 30
iv ➥ 32
Best Explanation:
Answer: (iv)
Explanation:
In an IPv4 header, the “Time to Live” (TTL) field determines the maximum number of routers (hops) that a packet can travel through before it is discarded. The TTL field is 8 bits in length, so it can have values from 0 to 255.
In the provided hexadecimal information, the TTL field appears to be “20” in hexadecimal, which is equivalent to 32 in decimal.
This means that the packet can travel through 32 more routers (hops) before it is discarded. So, the answer is: 32
Answer will be :
(iv) 32
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.30➡ | NET June 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054000300002006…..
What is the protocol of the payload being carried by the packet?
i ➥ ICMP
ii ➥ SCTP
iii ➥ TCP protocol
iv ➥ IGMP
Best Explanation:
Answer: (iii)
Explanation:
In an IPv4 header, the protocol field is a 1-byte (8-bit) field that specifies the protocol of the payload being carried by the packet. The protocol field indicates the type of data encapsulated in the IP packet.
In the provided hexadecimal information, the protocol field is “06” in hexadecimal, which is equivalent to 6 in decimal. The protocol value of 6 corresponds to the “TCP protocol.”
So, the protocol of the payload being carried by the packet is “TCP protocol.”
The correct answer is:
TCP protocol
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.31➡ | NET June 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054000300002006…..
What is the size of datagram?
i ➥ 64 bytes
ii ➥ 74 bytes
iii ➥ 84 bytes
iv ➥ 104 bytes
Best Explanation:
Answer: (iii)
Explanation:

IP datagram has arrived with following partial information in the header (in hexadecimal)

45000054000300002006..... 
1.  64 bytes
2.  74 bytes
3.   84 bytes
4.   104 bytes
 
What is the size of datagram?
Answer : 84 bytes.
The Total Length field in the IP header is 4500, which is equal to 17,920 in decimal. This is the total size of the datagram, including the header. The header is 20 bytes long, so the size of the data portion of the datagram is 17,920 – 20 = 17,900 bytes.
Therefore, the size of the datagram is 84 bytes.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.32➡ | NET June 2023
IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054000300002006…..
What is the efficiency of this datagram?
i ➥ 76.19%
ii ➥ 80.50%
iii ➥ 82.24%
iv ➥ 185.45%
Best Explanation:
Answer: (i)
Explanation:

 IP datagram has arrived with following partial information in the header (in hexadecimal)
 45000054 00030000 2006.....
What is the efficiency of this datagram?
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.33➡ | NET December 2022
Which one of the following allows the session to continue?
i ➥ When a user quits a browser
ii ➥ When the user logs out and is invalidated by the servlet
iii ➥ When the session is timed out due to inactivity
iv ➥ When the user refreshes the browser and there is a persistent cookie
Best Explanation:
Answer: (iv)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.34➡ | NET December 2022
Given Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111 in binary, what is the address in hexadecimal notation ?
i ➥ 5A : 88 : AA : 18 : 55 : F0
ii ➥ 5A : 81 : BA : 81 : AA : 08
iii ➥ 5A : 18 : 5A : 18 : 55 : 0F
iv ➥ 5A : 11 : 55 : 18 : 55 : 0F
Best Explanation:
Answer: (iv)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.35➡ | NET December 2022
A computer on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. It is initially filled to capacity with 16 megabits. What is the maximum duration for which the computer can transmit at the full 10 Mbps?
i ➥ 1.6 seconds
ii ➥ 2 seconds
iii ➥ 5 seconds
iv ➥ 8 seconds
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.36➡ | NET December 2022
In the standard Ethernet with transmission rate of 10 Mbps , assume that the length of the medium is
2500 m and size of a frame is 512 byes. The propagation speed of a signal in a cable is normally 2×108 m/s. calculate transmission delay and propagation delay.
i ➥ 25.25 µs and 51.2 µs
ii ➥ 51.2 µs and 12.5 µs
iii ➥ 10.2 µs and 50.12 µs
iv ➥ 12.5 µs and 51.2 µs
Best Explanation:
Answer: (ii)
Explanation:
Transmission delay in Ethernet is the time it takes to transmit a single frame over the physical medium. It is calculated by dividing the frame size by the transmission rate.
In this case, the transmission delay is:
Transmission delay = Frame size / Transmission rate
512 bytes / 10 Mbps = 51.2 microseconds

Propagation delay in Ethernet is the time it takes for a single bit to travel from the source to the destination over the physical medium. It is calculated by dividing the length of the medium by the propagation speed of the signal.
In this case, the propagation delay is:
Propagation delay = Length of medium / Propagation speed
2500 m / 2 x 10^8 m/s = 12.5 microseconds
Therefore, the transmission delay and propagation delay in the standard Ethernet with a transmission rate of 10 Mbps, a medium length of 2500 m, and a frame size of 512 bytes are 51.2 microseconds and 12.5 microseconds, respectively.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.37➡ | NET December 2022
In CRC coding if the data word is 111111 , divisor is 1010 and the remainder is 110. Which of the following code is true?
i ➥ 011111101
ii ➥ 001010110
iii ➥ 111111110
iv ➥ 110111111
Best Explanation:
Answer: (iii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.38➡ | NET December 2022
Consider two hosts P and Q are connected through a router R. The maximum transfer unit (MTU) value of the link between P and R is 1500 bytes and between R and Q is 820 bytes. A TCP segment of size of 1400 bytes is transferred from P to Q through R with IP identification value of 0x1234, Assume that IP header size is 20 bytes Further the packet is allowed to be fragmented that is Don’t Fragment (DF) flag in the IP Header is not set by P which of the following statement is are true

(A) Two fragments are created at R and IP datagram size carrying the second fragment is 620 bytes
(B) If the second fragment is lost then R resend the fragment with IP Identification value of 0x1334
(C) If the second fragment lost then P required to resend the entire TCP segment
(D) TCP destination port can be determined by analyzing the second fragment only
Choose the correct answer from the options given below:
i ➥ A, B and C only
ii ➥ A and C only
iii ➥ C and D only
iv ➥ B and D only
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.39➡ | NET December 2022
The solution to silly window syndrome problem is/are
(A) Nagle’s algorithm
(B) Clark’s algorithm
(C) Jacobson’s algorithm
(D) Piggy backing algorithm
Choose the correct answer from the options given below:
i ➥ A and B only
ii ➥ A and C only
iii ➥ C and D only
iv ➥ B and D only
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.40➡ | NET December 2022
A.	CDMA	I.	It Provides mobile internet connection with faster data transfer rate 
B.	GSM	II.	It allow uses to connect to a network or to other devices over wireless channel
C. 	UMTS 	III.	Accessing mechanism for multiple transmitters over a single channel
D. 	Wi-Fi	IV.	It is cellular technology employs hybrid of FDMA and TDMA
Choose the correct answer from the options given below:
i ➥ A-(III), B-(IV), C-(II), D-(I)
ii ➥ A-(III), B-(IV), C-(I), D-(II)
iii ➥ A-(III), B-(IV), C-(I), D-(II)
iv ➥ A-(II), B-(I), C-(IV), D-(III)
Best Explanation:
Answer: (ii)
Explanation:

Here is a brief explanation of each technology:
CDMA (Code Division Multiple Access): A cellular technology that uses a spread spectrum technique to allow multiple users to share a single frequency channel.
GSM (Global System for Mobile Communications): A cellular technology that uses digital signals to provide mobile voice and data services.
UMTS (Universal Mobile Telecommunications System): A 3G cellular technology that provides faster data transfer rates than GSM.
Wi-Fi (Wireless Fidelity): A wireless networking technology that allows devices to connect to the internet or to each other over a short distance.
Now, let’s match each technology with its corresponding description in the image:
A-III: CDMA is an accessing mechanism for multiple transmitters over a single channel.
B-IV: GSM is a cellular technology that employs a hybrid of FDMA (Frequency Division Multiple Access) and TDMA (Time Division Multiple Access).
C-I: UMTS provides mobile internet connection with faster data transfer rates.
D-II: Wi-Fi allows user to connect to a network or to other devices over wireless channel.
Therefore, the correct answer is 2. A-III, B-IV, C-I, D-II.
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.41➡ | NET December 2022
Rearrange the following sequence in the context of OSI layers:
(A) Transforming the raw bits in the form of frame for transmission
(B) Transmission of raw bits over communication channel
(C) Handling user interfaces
(D) Control and monitoring of subnet
(E) Transmission data through connection orientated or connection less using datagram.
Choose the correct answer from the options given below:
i ➥ A-B-C-D-E
ii ➥ B-C-D-E-A
iii ➥ B-A-D-E-C
iv ➥ A-B-D-E-C
Best Explanation:
Answer: (iii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.42➡ | NET December 2022
A TCP Server application is programmed to listen on port P on Host S. A TCP Client is connected to the TCP Server over the network. Considered that while TCP Connection is active the server is crashed and rebooted Assume that the client does not use TCP keep alive timer. Which of the following behaviors is/are possible?
Statement I:
If client is waiting to receive a packet, it may wait indefinitely
Statement II:
If the client sends a packet after the server reboot, it will receive the FIN segment
In the light of the above statements. Choose the correct answer from the options given below:
i ➥ Both Statement I and Statement II are true
ii ➥ Both Statement I and Statement II are false
iii ➥ Statement I is true but Statement II is false
iv ➥ Statement I is false but Statement II is true
Best Explanation:
Answer: (iii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.43➡ | NET December 2022
An organization is granted the block 130.56.0.0/16. The administration wants to create 1024 subnets.
Find the number of addresses is each subnet.
i ➥ 32
ii ➥ 64
iii ➥ 128
iv ➥ 16
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.44➡ | NET December 2022
An organization is granted the block 130.56.0.0/16 . The administration wants to create 1024 subnets.
Find the subnet prefix
i ➥ 130.56
ii ➥ 136.0
iii ➥ 136.255
iv ➥ 136.56.255
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.45➡ | NET December 2022
An organization is granted the block 130.56.0.0/16. The administration wants to create 1024 subnets.
Find first and last addresses of First subnet.
i ➥ 130.56.0.0              130.56.254.254
ii ➥ 130.56.0.0              130.56.0.63
iii ➥ 130.0.0.0                130.255.255.255
iv ➥ 130.56.0.0              130.56.255.63
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.46➡ | NET December 2022
An organization is granted the block 130.56.0.0/16 . The administration wants to create 1024 subnets.
Find first and last address of the last subnet.
i ➥ 130.56.0.0             130.56.254.255
ii ➥ 130.56.255.0         130.56.255.255
iii ➥ 130.56.255.0         130.56.255.255
iv ➥ 130.56.255.192      130.56.255.255
Best Explanation:
Answer: (iv)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.47➡ | NET December 2022
An organization is granted the block 130.56.0.0/16 . The administration wants to create 1024 subnets.
Find the subnet mask.
i ➥ 130.255.255.255
ii ➥ 130.56.255.255
iii ➥ 130.56.0.255
iv ➥ 130.56.155.192
Best Explanation:
Answer: Mark to All
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.48➡ | NET June 2022
match List I with List II:
	List (I)		List(II)
(A)	BIND	(I)	Block the caller unit a connection attempt arrives
(B)	LISTEN		(II)	give a local address to a socket

(C)	ACCEPT		(III)	show willingness to accept connections
(D)	SOCKET		(IV)	create a new point
Choose the correct answer from the options given below:
i ➥ (A)-(I),(B)-(III),(C)-(II),(D)-(IV)
ii ➥ (A)-(II),(B)-(III),(C)-(I),(D)-(IV)
iii ➥ (A)-(III),(B)-(II),(C)-(I),(D)-(IV)
iv ➥ (A)-(I),(B)-(II),(C)-(III),(D)-(IV)
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.49➡ | NET June 2022
which one is a connectionless transport layer protocol that belongs to the internet protocol family?
i ➥ Transmission control protocol (TCP)
ii ➥ User Datagram Protocol (UDP)
iii ➥ Routing Protocol (RP)
iv ➥ Datagram Control Protocol (DCP)
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.50➡ | NET June 2022
which of the following is correct for the destination address 4A : 30 : 10 : 21 : 10 : 1A?
i ➥ Unicast address
ii ➥ Multicast address
iii ➥ Broadcast address
iv ➥ Unicast and broadcast address
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.51➡ | NET June 2022
which mode is a block cipher implementation as a self synchronizing stream cipher?
i ➥ Cipher Block chaining mode
ii ➥ Cipher feedback mode
iii ➥ Electronic codebook mode
iv ➥ Output feedback mode
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.52➡ | NET June 2022
The representation of 4 bits code 1101 into 7 bit, even parity Hamming code is
i ➥ (1010101)
ii ➥ (1111001)
iii ➥ (1011101)
iv ➥ (1110000)
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.53➡ | NET June 2022
which layer divides each message into packets at the source and re-assembles them at the destination?
i ➥ Network layer
ii ➥ Transport layer
iii ➥ Data link layer
iv ➥ Physical layer
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.54➡ | NET June 2022
Consider an error free 64 kbps satellite channel used to sent 512 byte data frames I one direction with very short acknowledgements coming back the other way. What is the maximum throughput for window size of 15?
i ➥ 32 kbps
ii ➥ 48 kbps
iii ➥ 64 kbps
iv ➥ 70 kbps
Best Explanation:
Answer: (iii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.55➡ | NET June 2022
For multiprocessor system , interconnection network – cross bar switch is an example of
i ➥ Non blocking network
ii ➥ Blocking network
iii ➥ That varies from connection to connection
iv ➥ Recurrent network
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.56➡ | NET June 2022
Using ‘RSA’ algorithm, if p = 13, q = 5 and e = 7 . the value of d and cipher value of ‘6’ with (e,n) key are
i ➥ 7, 4
ii ➥ 7, 1
iii ➥ 7, 46
iv ➥ 55, 1
Best Explanation:
Answer: (iii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.57➡ | NET June 2022
Physical Layer	(I)	Routing of the signals divide the outgoing message into packets to act as network controller for routing data
Data link layer		(II)	Make and break connections , define voltages and data rates convert data bits into electrical signal 
Network layer			(III)	Synchronization, error detection and correction. To Assembles outgoing message into frames
Presentation layer	(IV)	It works as a translating latyer.
i ➥ (A)-(IV),(B)-(III),(C)-(II),(D)-(I)
ii ➥ (A)-(II),(B)-(III),(C)-(IV),(D)-(I)
iii ➥ (A)-(IV),(B)-(III),(C)-(I),(D)-(II)
iv ➥ (A)-(II),(B)-(III),(C)-(I),(D)-(IV)
Best Explanation:
Answer: (iv)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.58➡ | NET June 2022
(A)	DES				(I) Key size - 256
(B)	AES				(II) Key size - 1024
(C)	3 DES				(III) Key size - 56
(D)	RSA				(IV) Key size - 168
i ➥ (A)-(I),(B)-(II),(C)-(IV),(D)-(III)
ii ➥ (A)-(III),(B)-(I),(C)-(IV),(D)-(II)
iii ➥ (A)-(III),(B)-(IV),(C)-(II),(D)-(I)
iv ➥ (A)-(IV),(B)-(II),(C)-(III),(D)-(I)
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.59➡ | NET June 2022
A classless address is given as 167.199.170.82/27. The number of addresses in the network is
i ➥ 64 addresses
ii ➥ 32 addresses
iii ➥ 28 addresses
iv ➥ 30 addresses
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.60➡ | NET June 2022
Based on following passage, answer the questions :
A 300 km long truck operates at 1.536 mbps and is used to transmit 64 bytes frames and uses sliding window protocol. the propagation speed is 6 µ sec/km.

If only 6 bits are reserved for sequence number field , then the efficiency of the system is
i ➥ 0.587
ii ➥ 0.875
iii ➥ 0.578
iv ➥ 0.50
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.61➡ | NET June 2022
Based on following passage , answer the questions :
A 300 km long truck operates at 1.536 mbps and is used to transmit 64 bytes frames and uses sliding window protocol. the propagation speed is 6 μ sec/km.

The minimum number of bits required in sequence number fields of the packet is
i ➥ 6 bits
ii ➥ 7 bits
iii ➥ 5 bits
iv ➥ 4 bits
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.62➡ | NET June 2022
Based on following passage , answer the questions :
A 300 km long truck operates at 1.536 mbps and is used to transmit 64 bytes frames and uses sliding window protocol. the propagation speed is 6 µ sec/km.

The maximum achievable throughput is
i ➥ 0.768
ii ➥ 0.678
iii ➥ 0.901
iv ➥ 0.887
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.63➡ | NET June 2022
Based on following passage , answer the questions :
A 300 km long truck operates at 1.536 mbps and is used to transmit 64 bytes frames and uses sliding window protocol. the propagation speed is 6  µ sec/km.

The transmission and propagation delays are respectively
i ➥ Tt = 333.33 µ sec, Tp = 18000 µ sec
ii ➥ Tt = 300  µ sec,  Tp = 15360   µ sec
iii ➥ Tt = 33.33  µ sec,  Tp = 1800  µ sec
iv ➥ Tt = 1800  µ sec,  Tp = 33.33 µ sec
Best Explanation:
Answer: (i)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.64➡ | NET June 2022
Based on following passage , answer the questions :
A 300 km long truck operates at 1.536 mbps and is used to transmit 64 bytes frames and uses sliding window protocol. the propagation speed is 6 µ sec/km.

The Sender window size to get the maximum efficiency is
i ➥ 108
ii ➥ 109
iii ➥ 55
iv ➥ 56
Best Explanation:
Answer: (ii)
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.65➡ | NET November 2021
In Ethernet when Manchester coding is used, the bit rate is ______.
i ➥ Half the baud rate
ii ➥ Same as the baud rate
iii ➥ Thrice the baud rate
iv ➥ twice the baud rate

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.66➡ | NET November 2021
Given below are two statements
Statement I: Telnet, Ftp, Http are application layer protocol
Statement II: The Iridium project was planned to launch 66 low orbit satellites.
In light of the above statements, choose the correct answer from the options given below.
i ➥ Both Statement I and Statement II are false
ii ➥ Both Statement I and Statement II are true
iii ➥ Statement I is false but Statement II is true
iv ➥ Statement I is true but Statement II is false

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.67➡ | NET November 2021
Match List I with List II

Choose the correct answer from the options given below:
i ➥ A – II, B – III, C – I, D – IV
ii ➥ A – IV, B – I, C – III, D – II
iii ➥ A – IV, B – II, C – I, D – III
iv ➥ A – IV, B – III, C – I, D – II

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.68➡ | NET November 2021
Which of the following statement is False?
i ➥ Packet switching can lead to reordering unlike circuit switching.
ii ➥ Packet switching leads to better utilization of bandwidth resources than circuit switching.
iii ➥ Packet switching results in less variation in the delay than circuit switching.
iv ➥ Packet switching sender and receiver can use any bit rate, format or framing method unlike circuit switching.

Show Answer With Best Explanation

Answer: III, IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.69➡ | NET November 2021
A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is True?
i ➥ Receiver decrypts using his own public key
ii ➥ Receiver decrypts using sender’s public key
iii ➥ Sender encrypts using his own public key
iv ➥ Sender encrypts using receiver’s public key

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.70➡ | NET November 2021
In electronic mail, which of the following protocols allows the transfer of multimedia?
i ➥ IMAP
ii ➥ MIME
iii ➥ POP3
iv ➥ SMTP

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q71➡ | NET November 2021
Which of the following statements are true?
A. X.25 is connection-oriented network
B. X.25 doesn’t support switched virtual circuits.
C. Frame relay service provides acknowledgements.
D. Frame relay service provides detection of transmission errors.
Choose the correct answer from the options given below:
i ➥ A and D only
ii ➥ B and C only
iii ➥ B and D only
iv ➥ C and D only

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.72➡ | NET November 2021
The address of class B host is to be split into subnets with 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet?
i ➥ 62 subnets and 1022 hosts
ii ➥ 62 subnets and 262142 hosts
iii ➥ 64 subnets and 1024 hosts
iv ➥ 64 subnets and hosts 262142

Show Answer With Best Explanation

Answer: I
Explanation:
Class B : Out of 32 bits, Class B have
Network id = 16 bits and
Host id = 16 bits
Calculation
Given subnet bits = 6 bits
Maximum number of the subnets = 26 – 2 = 62
Note that 2 is substracted because
* all 0’s is used to represent Network and
* all 1’s is used to represent Broadcast Address of Network.
Maximum number of hosts in each subnet
Host id bits = 32 – (Network id bit + subnet id bits) = 32 – (16+ 6) = 10
Maximum number of hosts in each subnet = 210– 2 = 1022
Note that 2 is substracted because
* all 0’s is used to represent Subnet and
* all 1’s is used to represent Broadcast Address of Subnet.
So, Option(I) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q.73➡ | NET November 2021
Which of the following statements are true?
A.Frequency division multiplexing technique can be handled by digital circuits.
B.Time division multiplexing technique can be handled by analog circuits
C. Wavelength division multiplexing technique is used with optical fiber for combining two signals.
D. Frequency division multiplexing technique can be applied when the bandwidth of a link is greater than the bandwidth of the signals to be transmitted.
Choose the correct answer from the options given below:
i ➥ A and D only
ii ➥ B and D only
iii ➥ B and D only
iv ➥ C and D only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q.74➡ | NET November 2020
Using ‘RSA’ public key cryptosystem, if p=3, q=11 and d=7, find the value of e and encrypt the number ’19’?
i ➥ 20,19
ii ➥ 33,11
iii ➥ 3,28
iv ➥ 77,28

Show Answer With Best Explanation

Answer: III

Explanation:
RSA key Generation Algorithm:
1) Select 2 primes p & q such that p!= q.
2) Calculate n = p*q.
3) Calculate ϕ(n) = (p-1)*(q-1)
4) Select e such that 1< e< ϕ (n) & gcd (e, ϕ(n)) == 1
5) Calculate d , e*d mod ϕ(n) ==1
6) Public key = (e , n)
Private key = d
7) Return public key(e,n) & private key(d,n)

Calculate Ciphertext & Plaintext using key e and d:
Ciphertext = (Plaintext)e mod n
Plaintext = (Ciphertext)d mod n

Given,
p=3, q=11
d=7
Plaintext =19
Ask,
Ciphertext=?

Calculation,
1) Two prime numbers p =3 , q=11
2) Calculate n = p*q = 3*11 = 33
3) Calculate ϕ(n) = (p-1)*(q-1) = (3-1)*(11-1) = 2*10=20
4) Calculate d ,
=>e*d mod ϕ(n) ==1
=>e*7 mod 20 ==1
=> 3*7 mod 20 ==1 {if we take value of e is 3 , then reminder will be 1}
5) public key (e) = 3

Now, Calculate Ciphertext using key :
Ciphertext = (Plaintext)e mod n
= 193 mod 33
=28

So, Option(III) is correct.

More Discussion Explanation On YouTubeNetwork Security Help-Line

Q.75➡ | NET November 2020
Given below are two statements:
Statement I: In Caesar Cipher each letter of Plain text is replaced by another letter for encryption.
Statement II: Diffie-Hellman algorithm is used for exchange of secret key.

In the light of the above statements, choose the correct answer from the options given below:
i ➥ Both Statement I and Statement II are true
ii ➥ Both Statement I and Statement II are false
iii ➥ Statement I is correct but Statement II is false
iv ➥ Statement I is incorrect but Statement II is true

Show Answer With Best Explanation

Answer: I
Explanation: Upload soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.76➡ | NET November 2020
Firewall is a device that filters access to the protected network from the outside network.
Firewall can filter the packets on the basis of
(A) Source IP address
(B) Destination IP Address
(C) TCP Source Port
(D) UDP Source Port
(E) TCP Destination Port

Choose the correct answer from the options given below:
i ➥ (A), (B) and (C) only
ii ➥ (B) and (E) only
iii ➥(C) and (D) only
iv ➥(A), (B), (C), (D) and (E) only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload soon

More DiscussionExplanation On YouTubeFirewall Help-Line

Q.77➡ | NET November 2020
Match List I with List II
Match List I with List II List I                                                                                 List II A) Serial Line IP (SLIP)                                         (I) Application layer B) Border Gateway Protocol (BGP)                  (II) Transport layer C) User Data protocol (UDP)                            (III) Data Link layer D) Simple Network Management Protocol   (IV) Network layer Choose the correct answer from the options given below: A) A-I, B-II, C-III, D-IV B) A-III, B-IV, C-II, D-I C) A-II, B-III, C-IV, D-I D) A-III, B-I, C-IV, D-II
Choose the correct answer from the options given below:
i ➥ A-I, B-II, C-III, D-IV
ii ➥ A-III, B-IV, C-II, D-I
iii ➥ A-II, B-III, C-IV, D-I
iv ➥ A-III, B-I, C-IV, D-II

Show Answer With Best Explanation

Answer: II
Explanation:

More DiscussionExplanation On YouTubeProtocols Help-Line

Q.78➡ | NET November 2020
Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding for the next frame are called as___.
i ➥ Simplex protocols
ii ➥ Unreserved simplex protocols
iii ➥ Simplex stop and wait protocols
iv ➥ Restricted simplex protocols

Show Answer With Best Explanation

Answer: III
Explanation: Upload soon

More DiscussionExplanation On YouTubeFlow Control Help-Line

Q.79➡ | NET November 2020
Post office protocol (POP) is a message access protocol which is used to extract messages for clients. In this regard, which of the following are true?
A) POP has two modes, Delete mode and keep
B) In Delete mode, mail is deleted from mailbox after each retrieval
C) In Delete mode, mail is deleted from the mailbox before each retrieval.
D) In keep mode, mail is deleted before retrieval.
E) In keep mode, mail remains in the mailbox after retrieval.

Choose the correct answer from the options given below:
i ➥ (A) and (B) only
ii ➥ (A), (D) and (E) only
iii ➥(A), (B), (C) and (D) only
iv ➥ (A), (B) and (E) only

Show Answer With Best Explanation

Answer: IV
Explanation:

POP has two modes:
i) Delete Mode – A mail is deleted from the mailbox on the mail server after successful retrieval. (Delete after reading)
ii) Keep Mode – A mail remains in the mailbox on the mail server after successful retrieval. (Store even after reading)

Stetement(A)- True.
Stetement(B)- True.
Stetement(C)- False.
Stetement(D)- False.
Stetement(E)- True.

So, option(iv) is correct.

More DiscussionExplanation On YouTubeProtocols Help-Line

Q.80➡ | NET November 2020
i ➥ Both Statement I and Statement II are true
ii ➥ Both Statement I and Statement II are false
iii ➥ Statement I is correct but Statement II is false
iv ➥ Statement I is incorrect but Statement II is true

Show Answer With Best Explanation

Answer: I
Explanation: Upload soon

More DiscussionExplanation On YouTubeProtocols Help-Line

Q81➡ | NET December 2019
Which of the following is not needed by an encryption algorithm used in Cryptography?
A) KEY
B) Message
C) Ciphertext
D) User details
i ➥ (C) only
ii ➥ (D) only
iii ➥ (B) , (C) and (D) only
iv ➥ (C) and (D) only

Show Answer With Best Explanation

Answer: IV

Explanation:
Concept:
In cryptography,
• To encrypt a message, we need an encryption algorithm & To decrypt a message, we need a decryption algorithm.
• Encryption algorithm convert plaintext into ciphertext & Decryption algorithm convert ciphertext into plaintext.
• For Encryption algorithm, we need an encryption key, and the plaintext.
• For Decryption algorithm, we need a decryption key, and the ciphertext.

Ciphertext & user details are not needed by encryption algorithm.

So, Option(IV) is correct.

More Discussion Explanation On YouTubeNetwork Security Help-Line

Q.82➡ | NET December 2019
A network with a bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network?
i ➥ 1,000,000 bps
ii ➥ 2,000,000 bps
iii ➥ 12,000,000 bps
iv ➥ 1,200,00,000 bps

Show Answer With Best Explanation

Answer: II
Explanation:
Given,
Bandwidth = 10 Mbps = 10 x 106bps
Frame per minutes = 12,000 Frame per min
Frame size = 10,000 bits

Ask,
Throughput = ?

Throughput::
In data Transmission, network throughput tells how much data was transferred from a source at any given time & typically measured in bps, as in Mbps or Gbps.

Caculation:
Throughput = Frames per minute * each Frame size
= 12,000 per minute* 10,000 bits
= 12,000 * 10,000 bits per minute
= (12,000 * 10,000 / 60) bits per second
= 2,000,000 bps
= 2 Mbps

So, Option(ii) is correct.

More DiscussionExplanation On YouTubeFlow Control Help-Line

Q.83➡ | NET December 2019
Consider the following statements with respect to network security:
(a) Message confidentiality means that the sender and the receiver expect privacy.
(b) Message integrity means that the data must arrive at the receiver exactly as they were sent.
(c) Message authentication means the receiver is ensured that the message is coming from the intended sender.

Which of the statements is (are) correct?
i ➥ Only (a) and (b)
ii ➥ Only (a) and (c)
iii ➥ Only (b) and (c)
iv ➥ (a), (b) and (c)

Show Answer With Best Explanation

Answer: IV
Explanation:

Confidentiality
• Confidentiality means that only the authorized individuals/systems can view sensitive or classified information.
• The data being sent over the network should not be accessed by unauthorized individuals.
Confidentiality means that the sender and the receiver expect privacy.

Integrity
• Data integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle.
Integrity means that the data must arrive at the receiver exactly as they were sent.

Authentication
• Authentication is the process of determining whether someone is who it is declared to be.
Authentication means the receiver is ensured that the message is coming from the intended sender.

So, Option(IV) is correct.

More Discussion Explanation On YouTubeNetwork Security Help-Line

Q.84➡ | NET December 2019
Piconet is a basic unit of a Bluetooth system consisting of _______ master node and up to ________ active salve nodes.
i ➥ one, five
ii ➥ one, seven
iii ➥ two, eight
iv ➥ one, eight

Show Answer With Best Explanation

Answer: II

Explanation:
• A piconet is a wireless set of devices make of use Bluetooth technology protocols.
• A piconet is connection of two or more devices occupying the same physical.
• A piconet is a combination of one master device( any device whis share the resource) and seven active slave devices(devices connected to the master device like phone,printer,speaker,scanner,mic etc) which has maximum 255 further slave devices can be inactive.

Other topic related to Piconet is Scatternet.

Scatternet -> sactternet is combination of Piconet.

So the correct answer is Option(II). (One Master and Seven Slave Devices )



For more details about Piconet Please Visit the More Discussion

More DiscussionExplanation On YouTubeBluetooth Help-Line

Q.85➡ | NET December 2019
The full form of ICANN is
i ➥ Internet Corporation for Assigned Names and Numbers
ii ➥ Internet Corporation for Assigned Names and Names
iii ➥ Institute of Corporation for Assigned Names and Numbers
iv ➥ Internet connection for Assigned Names and Numbers

Show Answer With Best Explanation

Answer: I
Explanation:

ICANN (Internet Corporation for Assigned Name and Numbers)is non-profit organization that was formed in 1998. ICANN maintains the central repository for IP Addresses & help coordinate the supply the IP Addresses. It also manages the domain name system & root servers.

More DiscussionExplanation On YouTubeICANN Help-Line

Q.86➡ | NET December 2019
Consider a subnet with 720 routers. If a three-level hierarchy is chosen, with eight clusters, each containing 9 regions of 10 routers, then the total number of entries in hierarchical table of each router is
i ➥ 25
ii ➥ 27
iii ➥ 53
iv ➥ 72

Show Answer With Best Explanation

Answer: I

Explanation:
Let’s try to understand the basic,
In distance vector & link state routing, router have routing table & router have to store information about other router. As networks grow in size, number of router increases in network. Due to this, router can’t handle network traffic efficiently. So, routing will have to done hierarchically.

In three level hierarchically routing,
Group of routers are called region & Group of regions are called cluster.

Given:
Number of cluster = 8 cluster
Each cluster have 9 regions.
Each region have 10 routers.

Total number of entries in hierarchically table of each router
=10 entries for router + 8 entries for routing to other regions within own cluster + 7 entries for distant clusters
=10 + 8 + 7
=25

or

Total number of entries in hierarchically table of each router
= Total nmber of router in a region + (Number of regions – 1) +(Number of clusters -1)
=10 + 8 + 7
=25

So, Option(I) is correct.

More Discussion Explanation On YouTubeRouting Help-Line

Q.87➡ | NET December 2019
Consider the following statements :
(a) Fiber optic cable is much lighter than copper cable.
(b) Fiber optic cable is not affected by power surges or electromagnetic interference.
(c) Optical transmission is inherently bidirectional. Which of the statements is (are) correct?
i ➥ Only (a) and (b)
ii ➥ Only (a) and (c)
iii ➥ Only (b) and (c)
iv ➥ (a), (b) and (c)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTransmission Media Help-Line

Q.88➡ | NET December 2019
Match List I with List II
Match List I and List II: (a)	Physical layer             (i) provide token management service (b)	Transport layer          (ii) concerned with transmitting  raw bits over a communication channel (c)	Session layer               (iii) concerned with syntax and semantic of the information transmitted  (d)	Presentation layer      (iv) true end to end from source to destination   A)	(a).(ii), (b).(iv), (c).(iii). (d).(i) B)	(a).(iv). (b).(iii). (c).(ii). (d).(i) C)	(a).(ii), (b).(iv), (c).(i), (d).(iii) D)	(a).(iv), (b).(ii), (c).(i), (d).(iii)
i ➥ (a).(ii), (b).(iv), (c).(iii). (d).(i)
ii ➥ (a).(iv). (b).(iii). (c).(ii). (d).(i)
iii ➥ (a).(ii), (b).(iv), (c).(i), (d).(iii)
iv ➥ (a).(iv), (b).(ii), (c).(i), (d).(iii)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTCP/IP Model Help-Line

Q.89➡ | NET June 2019
What percentage(%) of the IPv4, IP address space do all class C addresses consume?
i ➥ 12.5%
ii ➥ 25%
iii ➥ 37.5%
iv ➥ 50%

Show Answer With Best Explanation

Answer: I

Explanation:
Classful IP addresses is divided into classes. The leading bits of classes are:
Class A – 0
Class B – 10
Class C – 110
Class D – 1110
Class E – 1111

On the basis of percentage, address space consume by all classes are:
Class A – 50%
Class B – 25%
Class C – 12.5%
Class D – 6.25%
Class E – 6.25%
What percentage(%) of the IPv4, IP address space do all class C addresses consume?

More DiscussionExplanation On YouTubeIP Address Help-Line

Q.90➡ | NET June 2019
In the TCP/IP model, encryption and decryption are functions of __ layer
i ➥ Data link
ii ➥ Network
iii ➥ Transport
iv ➥ Application

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube TCP/IP Model Help-Line

Q.91➡ | NET June 2019
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply?
i ➥ ARP
ii ➥ DNS
iii ➥ RARP
iv ➥ ICMP

Show Answer With Best Explanation

Answer: III

Explanation:
ARP :
• Address Resolution Protocol [ARP] is a network layer protocol that is used to convert IP address into MAC address.
• ARP is protocol that allows a client to send a broadcast message with its IP address and receive an MAC address in reply.

DNS:
• DNS stands for Domain Name System.
• DNS is a service that translates the domain name into IP addresses.
• For example, the domain name www.samagraCS.com has a IP address 162.0.215.21(Suppose)
• Where, www is a particular host server.
• The com part of the domain name reflects the purpose of the organization or entity (in this example, commercial) and is called the top-level domain name.
• The samagraCS part of the domain name defines the organization and together with the top-level is called the second-level domain name.

RARP:
• Reverse Address Resolution Protocol (RARP) is a network layer protocol used to convert an IP address from a given physical address.
• RARP is the complement of ARP.
• “RARP is a protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply”.

ICMP:
• The ICMP stands for Internet Control Message Protocol.
• ICMP is a network level protocol.
• ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.

So, Option(III) is correct.

More DiscussionExplanation On YouTubeProtocols Help-Line

Q.92➡ | NET June 2019
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
i ➥ Intrusion detection systems
ii ➥ Digital signatures
iii ➥ Data Compression
iv ➥ Certification

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.93➡ | NET June 2019
You are designed a link layer protocol for a link with bandwidth of 1 Gbps (109 bits/second) over a fiber link with length of 800 km. Assume the speed of light in this medium is 200000 km/second. What is the propagation delay in this link?
i ➥ 1 millisecond
ii ➥ 2 millisecond
iii ➥ 3 millisecond
iv ➥ 4 millisecond

Show Answer With Best Explanation

Answer: IV

Explanation:
Given :
Bandwidth (Bw) = 1Gbps = 109 bps
Link Length or Distance (d) = 800 Km
Speed or velocity (v) = 200,000 Km / Sec

Propogation Delay: It is a measure of the time required for asignal to propogate from one end of circuit to other end.

Formula used :
You are designed a link layer protocol for a link with bandwidth of 1 Gbps (109 bits/second) over a fiber link with length of 800 km. Assume the speed of light in this medium is 200000 km/second. What is the propagation delay in this link?

Calculation:
You are designed a link layer protocol for a link with bandwidth of 1 Gbps (109 bits/second) over a fiber link with length of 800 km. Assume the speed of light in this medium is 200000 km/second. What is the propagation delay in this link?
You are designed a link layer protocol for a link with bandwidth of 1 Gbps (109 bits/second) over a fiber link with length of 800 km. Assume the speed of light in this medium is 200000 km/second. What is the propagation delay in this link?
= 0.004 sec
= 4 ms

{1 second = 1000 millisecond}

So, Option(IV) is correct.

More DiscussionExplanation On YouTubeDelay Help-Line

Q.94➡ | NET June 2019
Consider the following two statements with respect to IPv4 in computer networking:
P: The loopback(IP) address is a member of class B network
Q: The loopback(IP) address is used to send a packet from host to itself
What can you say about the statements P and Q?
i ➥ P-True; Q-False
ii ➥ P-False; Q-True
iii ➥ P-True; Q-True
iv ➥ P-False; Q-false

Show Answer With Best Explanation

Answer: II

Explanation:
Loopback address
• A loopback address is a special IP address, 127.0.0.1, reserved by InterNIC for use in testing network cards.
• A loopback address works is that a data packet will get sent through a network and routed back to the same device where it originated.
• In IPv4, 127.0.0.1 is the most commonly used loopback address, however, this can range be extended to 127.255.255.255.
The loopback (IP) address is used to send a packet from host to itself & check NIC working or not.
• The loopback (IP) address is a member of class A network. (IP Address of Class A network range from 0.0.0.0 to 127.255.255.255)

Statement P: The loopback(IP) address is a member of class B network (False).
Because, The loopback(IP) address is a member of class A network.

Statement Q: The loopback(IP) address is used to send a packet from host to itself (True)

So, Option(II) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q.95➡ | NET June 2019
i ➥ Only S1
ii ➥ Only S2
iii ➥ Both S1 and S2
iv ➥ Neither S1 nor S2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.96➡ | NET June 2019
You need 500 subnets, each with about 100 usable host addresses per subnet. What network mask will you assign using a class B network address?
i ➥ 255.255.255.252
ii ➥ 255.255.255.128
iii ➥ 255.255.255.0
iv ➥ 255.255.254.0

Show Answer With Best Explanation

Answer: II

Explanation:
We know,
In a Class B network, the first 16 bits are the network part of the address. & remaining 16 bits indicate the host within the network.

Subnet mask:
A subnet mask always consists of a series of contiguous 1 bits followed by a series of contiguous 0 bits.Where,
• 1’s represent Network ID & Subnet ID
• 0’s represent Host ID

Given that,
Number of Subnet = 500 subnet
So, Number of bits required to represent subnet = ceil value of(500) = 9bits

Number of Host per subnet = 100 subnet
So, Number of bits required to represent subnet = ceil value of(100) = 7 bits

Now,
We borrow 9bits of Subnet ID bits from Host ID part(16 bits is HID part in class B) to represent 500 subnet.
Network ID bits = 16 bits
Subnet ID bits = 9 bits
Host ID bits = 16-9 = 7bits

Now its obvious,
Number of 1’s in subnet mask = Network ID bits + Subnet ID bits = 16 + 9 = 25
Number of 0’s in subnet mask = Host ID bits = 7

Hence, Subnet Mask is
1111 1111 . 1111 1111 . 1111 1111 . 1000 0000
In decimal form it is represented as:
255 : 255 : 255 : 128

So, Option(II) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q.97➡ | NET June 2019
The ability to inject packets into the internet with false source address is known as :
i ➥ Man-in-the-Middle attack
ii ➥ IP phishing
iii ➥ IP sniffing
iv ➥ IP Spoofing

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.98➡ | NET June 2019
i ➥ 3
ii ➥ 12
iii ➥ 6
iv ➥ 24

Show Answer With Best Explanation

Answer: IV

Explanation:
Given,
The Euler’s phi function
The Euler's  phi function   Where, p runs over all primes dividing n that means
Where, p runs over all primes dividing n that means
p = prime factors of n

Now, given n = 45
Then, p (prime factor of 45) = {3,5}

Calculation,
Put values of p in given Euler’s phi function
The Euler's  phi function     Where, p runs over all primes dividing n that means p = prime factors of n

So, Option(IV) is correct.

More Discussion Explanation On YouTubeNetwork Security Help-Line

Q.99➡ | NET June 2019
A fully connected network topology is a topology in which there is a direct link between all pairs of nodes. Given a fully connected network with n nodes, the number of direct links as a function of n can be expressed as
i ➥ n(n+1)/2
ii ➥ (n+1)/2
iii ➥ n/2
iv ➥ n(n-1)/2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Topology Help-Line

Q.100➡ | NET June 2019
Which of the following statements is/are true with regard to various layers in the Internet stack?
P: At the link layer, a packet of transmitted information is called a frame
Q: At the network layer, a packet of transmitted information is called a segment
i ➥ P only
ii ➥ Q only
iii ➥ P and Q
iv ➥ Neither P nor Q

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeISO OSI Model Help-Line

Q.101➡ | NET December 2018
Consider ISO-OSI network architecture reference model. Session layer of this model offer Dialog control, token management and __ as services.
i ➥ Synchronization
ii ➥ Asynchronization
iii ➥ Errors
iv ➥ Flow control

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeISO OSI Model Help-Line

Q.102➡ | NET December 2018
An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
i ➥ 245.248.132.0/22 and 245.248.132.0/21
ii ➥ 245.248.136.0/21 and 245.248.128.0/22
iii ➥ 245.248.136.0/24 and 245.248.132.0/21
iv ➥ 245.248.128.0/21 and 245.248.128.0/22

Show Answer With Best Explanation

Answer: II

Explanation:

An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?


An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?

According to given Option,
valid allocation of addresses to A = 245.248.136.0/21 and
valid allocation of addresses to B = 245.248.128.0/22

So, Option(II) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q.103➡ | NET December 2018
Which of the following statement/s is/are true?
(i) Firewall can screen traffic going into or out of an organization.
(ii) Virtual private networks cam simulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
i ➥ A) (i) only
ii ➥ B) Neither (i) nor(ii)
iii ➥ C) Both (i) and (ii)
iv ➥ D) (ii) only

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFirewall Help-Line

Q.104➡ | NET December 2018
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a web page from a remote server, assuming that the host has been restarted.
i ➥ HTTP GET request, DNS query, TCP SYN
ii ➥ DNS query, TCP SYN, HTTP GET request
iii ➥ TCP SYN, DNS query, HTTP GET request
iv ➥ DNS query, HTTP Get request, TCP SYN

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTCP Help-Line

Q.105➡ | NET December 2018
Consider the following two statements:
S1: TCP handles both congestion and flow control
S2: UDP handles congestion but not flow control
Which of the following option is correct with respect to the above statements (S1) and (S2)?
i ➥ Both S1 and S2 are correct
ii ➥ Neither S1 nor S2 is correct
iii ➥ S1 is not correct but S2 is correct
iv ➥ S1 is correct but S2 is not correct

Show Answer With Best Explanation

Answer: IV

Explanation:
UDP Operation:
• Connectionless Services
• Unreliable Services
• No flow Control
• No Error Control Except Checksum
• No Congestion Control Protocol
• No retransmission
• UDP is a message-oriented protocol.

TCP Operation:
• Connection Oriented Services
• reliable Services
• flow Control
• Error Control
• Congestion Control Protocol
• Retransmission
• TCP is a byte-oriented protocol.

Statements S1: TCP handles both congestion and flow control(True)
Statements S2: UDP handles congestion but not flow control(False)

So, Option(IV) is correct.

More Discussion Explanation On YouTubeTCP UDP Protocol Help-Line

Q.106➡ | NET December 2018
Match the following secret key algorithm (List 1) with the corresponding key lengths (List 2) and choose the correct answer from the code given below:
i ➥ (a)-(ii),(b)-(iii), (c)- (iv), (d)-(i)
ii ➥ (a)-(iv),(b)-(iii), (c)- (ii), (d)-(i)
iii ➥ (a)-(iii),(b)-(iv), (c)- (ii), (d)-(i)
iv ➥ (a)-(iii),(b)-(iv), (c)- (i), (d)-(ii)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.107➡ | NET December 2018
The four byte IP Address consists of
i ➥ Neither network nor Host Address
ii ➥ Network Address
iii ➥ Both Network and Host Address
iv ➥ Host Address

Show Answer With Best Explanation

Answer: III

Explanation:
IP Address: An IP address is a 32-bit number. The 32 bits are divided into four octets. an IP address is divided into Two parts named network id
and host id. The first part (Network id)of an IP address identifies the network on which the host resides, while the second part(Host id) identifies
the particular host on the given network.
The four byte IP Address consists of

More Discussion Explanation On YouTubeIP Address Help-Line

Q.108➡ | NET December 2018
Which of the following statement/s is/are true ?
(i) windows XP supports both peer-peer and client-server networks.
(ii) Windows XP implements Transport protocols as drivers that can be loaded and uploaded from the system dynamically.
i ➥ Both (i) and (ii)
ii ➥ Neither (i) nor (ii)
iii ➥ (ii) only
iv ➥ (i) only

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMiscellaneous Topic Help-Line

Q.109➡ | NET December 2018
The host is connected to a department network which is a part of a university network. The university network, in turn, is part of the internet. The largest network, in which the Ethernet address of the host is unique, is
i ➥ The university network
ii ➥ The internet
iii ➥ The subnet to which the host belongs
iv ➥ The department network

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetworking Basic ConceptHelp-Line

Q.110➡ | NET December 2018
Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
i ➥ 2N
ii ➥ N(N-1)
iii ➥ N(N-1)/2
iv ➥ (N-1) 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Miscellaneous Topic Help-Line

Q.111➡ | NET June 2018
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:
i ➥ 49
ii ➥ 368
iii ➥ 149
iv ➥ 151

Show Answer With Best Explanation

Answer: I

Explanation:
Given,
Frame size = 200 bits
Channel Bandwidth= 200 Kbps
System Produces = 250 frame per second

Ask,
Throughput of the system = ?

Formula,
The Throughput of slotted ALOHA is S = G * e-G
The maximum Throughput Smax = 0.368 (or 36.8%) when G =1
Where, G is the average number of frames produced by the system during one frame transmission time.
The Frame Transmission time = A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second :

Calculation,
The Frame Transmission time = A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:= 10-3 second = 1 millisecond
System Produces = 250 frame per second = (250 * 103 / 103) frame per second = (1/4) frame per millisecond
so, The Load (G) = 1/4 frame

S = G * e-G
= (1/4) * e-(1/4)
= 0.195 (or 19.5%) {where, e = 2.71}

Throughput = 250 * 0.195 = 49 Frames
Only 49 out of 259 frames will survive.

So, Option(I) is correct.

More Discussion Explanation On YouTubeAccess Control Help-Line

Q.112➡ | NET June 2018
The period of a signal is 100 ms. Its frequency is:
i ➥ 1003 Hertz
ii ➥ 10−2 KHz
iii ➥ 10−3 KHz
iv ➥ 105 Hertz

Show Answer With Best Explanation

Answer: II

Explanation:
Given,
Period(T) = 100ms

Formula used,
 The period of a signal is 100 ms. Its frequency is .
Calculation:
The period of a signal is 100 ms. Its frequency is
= The period of a signal is 100 ms. Its frequency is:second
=  The period of a signal is 100 ms. Its frequency is:second
= 10 Hz
=  The period of a signal is 100 ms. Its frequency is:Hz
= 10-2 KHz

So, Option(II) is correct.

More Discussion Explanation On YouTubeNumerical Help-Line

Q.113➡ | NET June 2018
The dotted-decimal notation of the following IPV4 address in binary notation is .
10000001 00001011 00001011 11101111
i ➥ 111.56.45.239
ii ➥ 129.11.10.238
iii ➥ 129.11.11.239
iv ➥ 111.56.11.239

Show Answer With Best Explanation

Answer: III

Explanation:
Dotted Decimal Representation: An IP address is a 32-bit number written in dotted decimal notation, four 8-bit fields (octets) converted from binary to decimal numbers, separated by dots.

10000001 00001011 00001011 11101111

convert 8-bit binary to decimal & seperate them by dots

129.11.11.239

So, Option(III) is correct.

More Discussion Explanation On YouTubeIP Address Help-Line

Q.114➡ | NET June 2018
Which of the following statements are true ?
(I) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
(II) IS – 95 is a second generation cellular phone system based on CDMA and DSSS.
(III) The Third generation cellular phone system will provide universal personnel communication.
i ➥ (a) and (b) only
ii ➥ (b) and (c) only
iii ➥ (a), (b) and (c)
iv ➥ (a) and (c) only

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCellular System Help-Line

Q.115➡ | NET June 2018
Match the following symmetric block ciphers with corresponding block and key sizes :
i ➥ (a)-(iv), (b)-(ii), (c)-(i), (d)-(iii)
ii ➥ (a)-(ii), (b)-(iv), (c)-(i), (d)-(iii)
iii ➥ (a)-(ii), (b)-(iv), (c)-(iii), (d)-(i)
iv ➥ (a)-(iv), (b)-(ii), (c)-(iii), (d)-(i)

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.116➡ | NET June 2018
Which of the following statements are true ?
(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.
Code:
i ➥ (a) and (b) only
ii ➥ (b) and (c) only
iii ➥ (a) and (c) only
iv ➥ (a), (b) and (C)

Show Answer With Best Explanation

Answer: III

Explanation:
Switching: In large networks, there can be multiple paths from sender to receiver. The switching technique will decide the best route for data transmission.
Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks

Circuit Switched Networks
• A dedicated path is establish between sender and receiver.
• Resources need to be reserved during the set up phase.

Packet Switched Networks
• Itis a switching technique in which the message is sent in one go, but it is divided into smaller pieces, and they are sent individually.
• There are two approaches to Packet Switching:
1) Datagram Packet switching:
• Resourse is reserved
• Connection oriented

2) Virtual Circuit Switching
• no Resourse is reserved
• Connectionless

Message Switching
• It is a switching technique in which a message is transferred as a complete unit and routed through intermediate nodes at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of a dedicated path between the sender and receiver.
• Resources need not reserved during the set up phase.

Statement(a) : True
Statement(b) : False
Statement(c) : True

So, Option(III) is correct.

More Discussion Explanation On YouTubeSwitching Help-Line

Q.117➡ | NET June 2018
In Challenge-Response authentication the claimant__________
i ➥ Proves that she knows the secret without revealing it
ii ➥ Proves that she doesn’t know the secret
iii ➥ Reveals the secret
iv ➥ Gives a challenge

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNetwork Security Help-Line

Q.118➡ | NET June 2018
Decrypt the message “WTAAD” using the Caesar Cipher with key=15.
i ➥ LIPPS
ii ➥ HELLO
iii ➥ OLLEH
iv ➥ DAATW

Show Answer With Best Explanation

Answer: II

Explanation:
Basic Concept
A substitution cipher replaces one symbol with another. Substitution ciphers can be categorized as
• Mono alphabetic
• Polyalphabetic ciphers

Shift Cipher
• The simplest monoalphabetic cipher is probably the shift cipher.
• The shift cipher is sometimes referred to as the Caesar cipher.
• The encryption algorithm is “shift key characters down,” with key equal to some number. The decryption algorithm is “shift key characters up.”

Calculation
W = 23 -15 = 8 (h)
T = 20 -15 =5 (e)
A = 1 – 15 = -14 + 26 = 12 (l) {when get negative number then add 26 to wrap arround}
A = 1 – 15 = -14 + 26 = 12 (l)
D = 4 – 15 = -11 + 26 = 15 (o)

Decrypted message = hello

So, Option(II) is correct.

More Discussion Explanation On YouTube Network Security Help-Line

Q.119➡ | NET June 2018
To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be__________.
i ➥ t+1
ii ➥ t−2
iii ➥ 2t−1
iv ➥ 2t+1

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeHamming Distance Help-Line

Q.120➡ | NET June 2018
Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with
 Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with
i ➥ HLLEO YM AEDRZ
ii ➥ EHOLL ZYM RAED
iii ➥ ELHL MDOY AZER
iv ➥ ELHL DOMY ZAER

Show Answer With Best Explanation

Answer: III

Explanation:
Given,
PainText = HELLO MY DEARZ
 Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with
In encryption, we move the character at position 2 to position 1, the character at Position 4 to position 2, and so on.

Ask,
CipherText =?

Calculation
Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with

So, Option(III) is correct.

More Discussion Explanation On YouTubeNetwork Security Help-Line

Q.121➡ | NET November 2017 Paper-2
Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ?
i ➥ Hub
ii ➥ Modem
iii ➥ Switch
iv ➥ Gateway

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeHardware Devices Help-Line

Q.122➡ | NET November 2017 Paper-2
___________do not take their decisions on measurements or estimates of the current traffic and topology.
i ➥ Static algorithms
ii ➥ Adaptive algorithms
iii ➥ Non – adaptive algorithms
iv ➥ Recursive algorithms

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRouting Algorithms Help-Line

Q.123➡ | NET November 2017 Paper-2
The number of bits used for addressing in Gigabit Ethernet is___________.
i ➥ 32 bit
ii ➥ 48 bit
iii ➥ 64 bit
iv ➥ 128 bit

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeEthernet Help-Line

Q.124➡ | NET November 2017 Paper-2
Which of the following layer of OSI Reference model is also called end-to-end layer?
i ➥ Network layer
ii ➥ Data layer
iii ➥ Session layer
iv ➥ Transport layer

Show Answer With Best Explanation

Answer: IV

Explanation:
 Which of the following layer of OSI Reference model is also called end-to-end layer?
So, Option(IV) is correct.

More Discussion Explanation On YouTubeISO OSI Model Help-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?