search
Log In
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
Welcome to GATE CSE Doubts, where you can ask questions and receive answers from other members of the community.
Top Users 2021 Aug 02 - 08
  1. SarathBaswa

    6 Points

Weekly Top User (excluding moderators) will get free access to GATE Overflow Test Series for GATE 2021

Recent questions and answers in Computer Networks

0 votes
1 answer 10 views
traceroot is a program in a server side program b. clint side program c . boath a and b none of the above
answered Jul 20 in Computer Networks asqwer 633 points 10 views
0 votes
1 answer 15 views
hi i want to ask that “network security” in computer networks is necessary for gate 2022 or not ? cause gate 2021 syllabus have not so can i do for sake of completing or left that topic. thank you
answered Jul 10 in Computer Networks asqwer 633 points 15 views
0 votes
1 answer 23 views
#Fragmentation How will a Datagram packet react (fragment or drop packet ) when it's Do not fragment is set true and the MTU of it's own network is less, is this case possible? Sender can fragment it's packet based on the MTU of Data link layer
answered Jul 8 in Computer Networks asqwer 633 points 23 views
0 votes
1 answer 17 views
can anyone please help with this question. Unable to understand why answer is 4? @arjun sir @bikram sir
answered Jul 8 in Computer Networks asqwer 633 points 17 views
0 votes
0 answers 14 views
Which of the following Access Control Method Is Probabilistic? A.Polling B.Contention C.Token Passing D.Sliding Window
asked Jun 21 in Computer Networks Midhun K R 5 points 14 views
0 votes
0 answers 8 views
An HTML form is to be designed to enable purchases of office stationery.Required items are to be selected(Checked).Credit card details are to be entered and then the submit button is to be pressed.Which of the following options would be appropriate for sending the data to the server? ... a way that is transparent to form design. A.Only GET B.Only POST C.Either GET or POST. D.Neither GET nor POST.
asked Jun 21 in Computer Networks Midhun K R 5 points 8 views
0 votes
0 answers 15 views
Prove that the reflection along the line y = x is equivalent to the reflection along the X axis followed by counter clockwise rotation by theta degrees, also find the value of theta.
asked Jun 21 in Computer Networks blackstar019 5 points 15 views
0 votes
0 answers 8 views
I am reading packet switching vs circuit switching from computer networking a top down approach(pg no. 57) . I came across an example: Suppose there are 10 users and that one user suddenly generates one thousand 1000-bit packets, while other users remain quiescent and don't ... data has been transmitted. Now I don,t know how author got 10s as answer while i am getting 100s as answer. Kindly help.
asked Jun 18 in Computer Networks saurabh0709 5 points 8 views
0 votes
0 answers 18 views
What is the range of IP addresses spanned by the CIDR address 192.168.10.0/20?
asked Jun 17 in Computer Networks swaraj_gore_ 5 points 18 views
0 votes
0 answers 14 views
I was scrolling through sample questions when I chanced over this question. Consider a sliding window flow control protocol between hosts A and B. Suppose the link propagation delay is 1 time unit, the retransmission timeout is 3 time units, and the window size is ... the drops? I would really appreciate any help regarding this question. Also, can someone please leave a link to similar questions?
asked Jun 15 in Computer Networks tuhinnn_py 5 points 14 views
0 votes
0 answers 10 views
I had a doubt regarding one scenario in Go Back N flow control algorithm. Consider the following scenario shown in the image The left hand side is the sender and the right hand side is the reciever. I referred to Kurose Ross Extended FSM Description of GBN sender and reciever ... the entire window(packets 1, 2 and 3). Is this correct? Can such a scenario even occur in real life? Thanks in advance.
asked Jun 12 in Computer Networks punter147 5 points 10 views
0 votes
0 answers 8 views
Do we have hdlc and ppp protocols(flow and error control) in syllabus?
asked Jun 12 in Computer Networks Dr Regina Phalange 5 points 8 views
0 votes
1 answer 11 views
does it generally happens that different hosts at different networks have same mac address or its just rare
answered Jun 8 in Computer Networks raun220 23 points 11 views
0 votes
1 answer 11 views
0 votes
1 answer 21 views
I have some conceptual doubts about MAC address why we need them when we have an IP address and routers know the IP address
answered May 20 in Computer Networks Shubham Sulakhe 5 points 21 views
0 votes
1 answer 74 views
If there are n bits available for subnet, how many sub-nets are possible ?
answered May 20 in Computer Networks Shubham Sulakhe 5 points 74 views
0 votes
0 answers 6 views
Do TCP packets with PSH flag set, which are immediately pushed to the Application layer arrive out of order?
asked May 19 in Computer Networks Saswat_17 5 points 6 views
0 votes
0 answers 16 views
If the bandwidth is 100 Mbps, round trip time is 50sec and the frame size is 25 bits. Calculate (i) Window size used in selective repeat ARQ. (ii) Number of sequence bits in selective repeat ARQ.
asked May 15 in Computer Networks nim_nambi 5 points 16 views
0 votes
0 answers 28 views
Finding Optimal Window Size In Slinding Window Protocol. Given Round trip time(RTT sec), Bandwidth(BW bits/sec), packet size(L bits), which approch is right? Approch 1. max data that can be sent in RTT = RTT * BW bits max window size = (RTT * BW)/L packets Apprach 2: ... size = (1 + 2a) packets; a=Tp/Tt Some problems are sloved with approch 1 and others with 2nd one. Which one should we use?
asked May 11 in Computer Networks jaswanth431 5 points 28 views
0 votes
0 answers 8 views
Is AIMD and slow start in congestion control are same. if not then why
asked May 4 in Computer Networks vsumit03 5 points 8 views
0 votes
0 answers 40 views
A satellite communication example using a stop-and-wait-style ARQ. In this task, the goal is to change the protocol of the example using some sliding window method so that the sender is active at least 50% of the time instead of 3% of the example. 64 kbps, 1000 ... should the window size be at least if the sender's activity percentage (ratio of transmission time to total time) was at least 50%?
asked May 2 in Computer Networks Himu21 5 points 40 views
0 votes
0 answers 27 views
Which of the following is a list of packet switching characteristics? (a) Bandwidth divided, translation tables for routing, destination address (b) Bandwidth shared, queues at router,different path possible (c) Bandwidth divided, store and forward, good for bursty data (d) Bandwidth shared, low transmission delay routes may change
asked Apr 25 in Computer Networks Vandit Shah 5 points 27 views
0 votes
0 answers 10 views
can a host simultaneously exist in two different network?
asked Apr 17 in Computer Networks abhijeet at 9 points 10 views
1 vote
2 answers 67 views
Consider a file of 3MB that needs to be transmitted over a 1Gbps link with RTT of 80ms, What is the effective throughput? A)36.2 Mbps B)9.26Mbps C)9.9 Mbps D)28.85 Mbps
answered Mar 2 in Computer Networks ShivangiChauhan 17 points 67 views
0 votes
1 answer 30 views
Maximum value of fragment offset in IP4
answered Feb 25 in Computer Networks rapidxy 9 points 30 views
2 votes
4 answers 865 views
Consider the three-way handshake mechanism followed during $\text{TCP}$ connection establishment between hosts $P$ and $Q$. Let $X$ and $Y$ be two random $32$-bit starting sequence numbers chosen by $P$ and $Q$ respectively. Suppose $P$ sends a $\text{TCP}$ connection request message to $Q$ with a ... $\text{SEQ}$ number $=Y$, $\text{ACK}$ bit $=1$, $\text{ACK}$ number $=X$, $\text{FIN}$ bit $=0$
asked Feb 18 in Computer Networks Arjun 1.5k points 865 views
0 votes
2 answers 634 views
Consider the cyclic redundancy check $\text{(CRC)}$ based error detecting scheme having the generator polynomial $X^3+X+1$. Suppose the message $m_4m_3m_2m_1m_0=11000$ is to be transmitted. Check bits $c_2c_1c_0$ are appended at the end of the message by the ... bit string is denoted by $m_4m_3m_2m_1m_0c_2c_1c_0$. The value of the checkbit sequence $c_2c_1c_0$ is $101$ $110$ $100$ $111$
asked Feb 18 in Computer Networks Arjun 1.5k points 634 views
1 vote
1 answer 592 views
Consider a computer network using the distance vector routing algorithm in its network layer. The partial topology of the network is shown below. The objective is to find the shortest-cost path from the router $R$ to routers $P$ and $Q$. Assume that $R$ does not initially know the shortest routes ... for a packet from $R$ to $P$ is $Y$ The next hop router for a packet from $R$ to $Q$ is $Z$
asked Feb 18 in Computer Networks Arjun 1.5k points 592 views
2 votes
2 answers 1.2K views
Consider a network using the pure $\text{ALOHA}$ medium access control protocol, where each frame is of length $1,000$ bits. The channel transmission rate is $1$ Mbps ($=10^6$ bits per second). The aggregate number of transmissions across all ... as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is ______________
asked Feb 18 in Computer Networks Arjun 1.5k points 1.2K views
1 vote
3 answers 515 views
Consider the following two statements. $S_1$: Destination $\text{MAC}$ address of an $\text{ARP}$ reply is a broadcast address. $S_2$: Destination $\text{MAC}$ address of an $\text{ARP}$ request is a broadcast address. Which one of the following choices is correct? Both $S_1$ and $S_2$ are true $S_1$ is true and $S_2$ is false $S_1$ is false and $S_2$ is true Both $S_1$ and $S_2$ are false
asked Feb 18 in Computer Networks Arjun 1.5k points 515 views
4 votes
2 answers 2.1K views
Assume that a $12$-bit Hamming codeword consisting of $8$-bit data and $4$ check bits is $d_8d_7d_6d_5c_8d_4d_4d_3d_2c_4d_1c_2c_1$ ... $0$ $x$ is $0$ and $y$ is $1$ $x$ is $1$ and $y$ is $0$ $x$ is $1$ and $y$ is $1$
asked Feb 18 in Computer Networks Arjun 1.5k points 2.1K views
3 votes
3 answers 1.5K views
A $\text{TCP}$ server application is programmed to listen on port number $P$ on host $S$. A $\text{TCP}$ client is connected to the $\text{TCP}$ server over the network. Consider that while the $\text{TCP}$ connection was active, the server machine $S$ crashed ... it will receive a $\text{RST}$ segment If the client sends a packet after the server reboot, it will receive a $\text{FIN}$ segment
asked Feb 18 in Computer Networks Arjun 1.5k points 1.5K views
5 votes
3 answers 1.2K views
Consider two hosts $P$ and $Q$ connected through a router $R$. The maximum transfer unit $\text{(MTU)}$ value of the link between $P$ and $R$ is $1500$ bytes, and between $R$ and $Q$ is $820$ bytes. A $TCP$ segment of size $1400$ bytes was ... lost, $P$ is required to resend the whole $\text{TCP}$ segment. $\text{TCP}$ destination port can be determined by analysing only the second fragment.
asked Feb 18 in Computer Networks Arjun 1.5k points 1.2K views
2 votes
1 answer 1.1K views
Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following: The time taken for processing the data frame by the receiver is negligible. The time taken for processing the ... of the number of frames, (rounded to the nearest integer) needed to achieve a link utilization of $50\%$ is_____________.
asked Feb 18 in Computer Networks Arjun 1.5k points 1.1K views
0 votes
0 answers 22 views
find the total number of subnets available and broadcast address is given mask is 255.255.255.224 and IP is 192.168.0.102?
asked Feb 8 in Computer Networks arshin jain 5 points 22 views
0 votes
0 answers 29 views
Options are: 8,4,6,7. This is a multiple correct question. Answer as per key is 8,6,7 Their explanation is this: My doubt: if the window size is 8, then why does the sender wait for acknowledgement after sending 3 packets? It can send more without waiting.
asked Feb 7 in Computer Networks ytheuyr 2 points 29 views
0 votes
0 answers 23 views
I have read rules of supernetting from a few sources and have got conflicting information. this (3:20) , this and this say that the rules are: 1.All the Networks should be contiguous. 2.The block size of every networks should be equal and must be in form of 2^ ... in power of 2 and first address being divisible by "number of blocks" in the supernet. What is going wrong? Am I missing something?
asked Feb 5 in Computer Networks shantanu4raje 25 points 23 views
0 votes
1 answer 48 views
Current RTT=40ms. ACKs arrive at 26ms, 32ms, 24ms respectively. What is the new estimated RTT? Consider alpha=0.9
answered Feb 1 in Computer Networks Parth27 163 points 48 views
0 votes
0 answers 25 views
Consider a code with only four valid code words: 0000000000, 0000011111, 1111100000, and 1111111111. This code has distance 5. If the code word arrived is 0000000111 then the original code word must be ____________ 1.0000011111 2.0000000000 3.1111100000 4.11111
asked Jan 21 in Computer Networks abhinav kumar 5 points 25 views
0 votes
0 answers 23 views
In the TCP connection (AIMD) algorithm, the sender sending threshold (SSThresh) is 12MSS and congestion window size (cwnd) is 1MSS. If round trip time (RTT) is 100ms then what amount of time is required to start the congestion avoidance phase? (Assume no timeout occur at the sender side) 300ms 400ms 700ms 800ms
asked Jan 20 in Computer Networks Gautam9596 5 points 23 views
To see more, click for all the questions in this category.
...