search
Log In
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
Welcome to GATE CSE Doubts, where you can ask questions and receive answers from other members of the community.

Recent questions tagged computer-networks

1 vote
0 answers 76 views
GATE Topper Algorithm 1. Check topics from this document 2. Study Them From Any Standard Textbook, Else Go To Nptel 3. Try a couple of simple questions from end chapters to know if you understand basics of that topic 4. Try GATE previous years related questions 5. ... ://gatecse.in/p-np-np-complete-np-hard/ 24. https://gatecse.in/rices-theorem/ 25. https://gatecse.in/some_reduction_inferences/
asked Jul 4 in Revision asqwer 633 points 76 views
0 votes
1 answer 17 views
can anyone please help with this question. Unable to understand why answer is 4? @arjun sir @bikram sir
asked Jul 1 in Computer Networks rish1602 9 points 17 views
0 votes
1 answer 15 views
hi i want to ask that “network security” in computer networks is necessary for gate 2022 or not ? cause gate 2021 syllabus have not so can i do for sake of completing or left that topic. thank you
asked Jun 30 in Computer Networks ykrishnay 103 points 15 views
0 votes
1 answer 23 views
#Fragmentation How will a Datagram packet react (fragment or drop packet ) when it's Do not fragment is set true and the MTU of it's own network is less, is this case possible? Sender can fragment it's packet based on the MTU of Data link layer
asked Jun 26 in Computer Networks Shakyaji 5 points 23 views
0 votes
0 answers 14 views
Which of the following Access Control Method Is Probabilistic? A.Polling B.Contention C.Token Passing D.Sliding Window
asked Jun 21 in Computer Networks Midhun K R 5 points 14 views
0 votes
0 answers 8 views
An HTML form is to be designed to enable purchases of office stationery.Required items are to be selected(Checked).Credit card details are to be entered and then the submit button is to be pressed.Which of the following options would be appropriate for sending the data to the server? ... a way that is transparent to form design. A.Only GET B.Only POST C.Either GET or POST. D.Neither GET nor POST.
asked Jun 21 in Computer Networks Midhun K R 5 points 8 views
0 votes
0 answers 8 views
I am reading packet switching vs circuit switching from computer networking a top down approach(pg no. 57) . I came across an example: Suppose there are 10 users and that one user suddenly generates one thousand 1000-bit packets, while other users remain quiescent and don't ... data has been transmitted. Now I don,t know how author got 10s as answer while i am getting 100s as answer. Kindly help.
asked Jun 18 in Computer Networks saurabh0709 5 points 8 views
0 votes
0 answers 14 views
I was scrolling through sample questions when I chanced over this question. Consider a sliding window flow control protocol between hosts A and B. Suppose the link propagation delay is 1 time unit, the retransmission timeout is 3 time units, and the window size is ... the drops? I would really appreciate any help regarding this question. Also, can someone please leave a link to similar questions?
asked Jun 15 in Computer Networks tuhinnn_py 5 points 14 views
0 votes
0 answers 10 views
I had a doubt regarding one scenario in Go Back N flow control algorithm. Consider the following scenario shown in the image The left hand side is the sender and the right hand side is the reciever. I referred to Kurose Ross Extended FSM Description of GBN sender and reciever ... the entire window(packets 1, 2 and 3). Is this correct? Can such a scenario even occur in real life? Thanks in advance.
asked Jun 12 in Computer Networks punter147 5 points 10 views
0 votes
0 answers 8 views
Do we have hdlc and ppp protocols(flow and error control) in syllabus?
asked Jun 12 in Computer Networks Dr Regina Phalange 5 points 8 views
0 votes
1 answer 11 views
0 votes
0 answers 6 views
Do TCP packets with PSH flag set, which are immediately pushed to the Application layer arrive out of order?
asked May 19 in Computer Networks Saswat_17 5 points 6 views
0 votes
0 answers 16 views
If the bandwidth is 100 Mbps, round trip time is 50sec and the frame size is 25 bits. Calculate (i) Window size used in selective repeat ARQ. (ii) Number of sequence bits in selective repeat ARQ.
asked May 15 in Computer Networks nim_nambi 5 points 16 views
0 votes
0 answers 28 views
Finding Optimal Window Size In Slinding Window Protocol. Given Round trip time(RTT sec), Bandwidth(BW bits/sec), packet size(L bits), which approch is right? Approch 1. max data that can be sent in RTT = RTT * BW bits max window size = (RTT * BW)/L packets Apprach 2: ... size = (1 + 2a) packets; a=Tp/Tt Some problems are sloved with approch 1 and others with 2nd one. Which one should we use?
asked May 11 in Computer Networks jaswanth431 5 points 28 views
0 votes
0 answers 10 views
can a host simultaneously exist in two different network?
asked Apr 17 in Computer Networks abhijeet at 9 points 10 views
2 votes
4 answers 865 views
Consider the three-way handshake mechanism followed during $\text{TCP}$ connection establishment between hosts $P$ and $Q$. Let $X$ and $Y$ be two random $32$-bit starting sequence numbers chosen by $P$ and $Q$ respectively. Suppose $P$ sends a $\text{TCP}$ connection request message to $Q$ with a ... $\text{SEQ}$ number $=Y$, $\text{ACK}$ bit $=1$, $\text{ACK}$ number $=X$, $\text{FIN}$ bit $=0$
asked Feb 18 in Computer Networks Arjun 1.5k points 865 views
0 votes
2 answers 634 views
Consider the cyclic redundancy check $\text{(CRC)}$ based error detecting scheme having the generator polynomial $X^3+X+1$. Suppose the message $m_4m_3m_2m_1m_0=11000$ is to be transmitted. Check bits $c_2c_1c_0$ are appended at the end of the message by the ... bit string is denoted by $m_4m_3m_2m_1m_0c_2c_1c_0$. The value of the checkbit sequence $c_2c_1c_0$ is $101$ $110$ $100$ $111$
asked Feb 18 in Computer Networks Arjun 1.5k points 634 views
1 vote
1 answer 592 views
Consider a computer network using the distance vector routing algorithm in its network layer. The partial topology of the network is shown below. The objective is to find the shortest-cost path from the router $R$ to routers $P$ and $Q$. Assume that $R$ does not initially know the shortest routes ... for a packet from $R$ to $P$ is $Y$ The next hop router for a packet from $R$ to $Q$ is $Z$
asked Feb 18 in Computer Networks Arjun 1.5k points 592 views
2 votes
2 answers 1.2K views
Consider a network using the pure $\text{ALOHA}$ medium access control protocol, where each frame is of length $1,000$ bits. The channel transmission rate is $1$ Mbps ($=10^6$ bits per second). The aggregate number of transmissions across all ... as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is ______________
asked Feb 18 in Computer Networks Arjun 1.5k points 1.2K views
1 vote
3 answers 515 views
Consider the following two statements. $S_1$: Destination $\text{MAC}$ address of an $\text{ARP}$ reply is a broadcast address. $S_2$: Destination $\text{MAC}$ address of an $\text{ARP}$ request is a broadcast address. Which one of the following choices is correct? Both $S_1$ and $S_2$ are true $S_1$ is true and $S_2$ is false $S_1$ is false and $S_2$ is true Both $S_1$ and $S_2$ are false
asked Feb 18 in Computer Networks Arjun 1.5k points 515 views
4 votes
2 answers 2.1K views
Assume that a $12$-bit Hamming codeword consisting of $8$-bit data and $4$ check bits is $d_8d_7d_6d_5c_8d_4d_4d_3d_2c_4d_1c_2c_1$ ... $0$ $x$ is $0$ and $y$ is $1$ $x$ is $1$ and $y$ is $0$ $x$ is $1$ and $y$ is $1$
asked Feb 18 in Computer Networks Arjun 1.5k points 2.1K views
3 votes
3 answers 1.5K views
A $\text{TCP}$ server application is programmed to listen on port number $P$ on host $S$. A $\text{TCP}$ client is connected to the $\text{TCP}$ server over the network. Consider that while the $\text{TCP}$ connection was active, the server machine $S$ crashed ... it will receive a $\text{RST}$ segment If the client sends a packet after the server reboot, it will receive a $\text{FIN}$ segment
asked Feb 18 in Computer Networks Arjun 1.5k points 1.5K views
5 votes
3 answers 1.2K views
Consider two hosts $P$ and $Q$ connected through a router $R$. The maximum transfer unit $\text{(MTU)}$ value of the link between $P$ and $R$ is $1500$ bytes, and between $R$ and $Q$ is $820$ bytes. A $TCP$ segment of size $1400$ bytes was ... lost, $P$ is required to resend the whole $\text{TCP}$ segment. $\text{TCP}$ destination port can be determined by analysing only the second fragment.
asked Feb 18 in Computer Networks Arjun 1.5k points 1.2K views
2 votes
1 answer 1.1K views
Consider the sliding window flow-control protocol operating between a sender and a receiver over a full-duplex error-free link. Assume the following: The time taken for processing the data frame by the receiver is negligible. The time taken for processing the ... of the number of frames, (rounded to the nearest integer) needed to achieve a link utilization of $50\%$ is_____________.
asked Feb 18 in Computer Networks Arjun 1.5k points 1.1K views
1 vote
2 answers 67 views
Consider a file of 3MB that needs to be transmitted over a 1Gbps link with RTT of 80ms, What is the effective throughput? A)36.2 Mbps B)9.26Mbps C)9.9 Mbps D)28.85 Mbps
asked Feb 13 in Computer Networks Humble_student 9 points 67 views
0 votes
0 answers 29 views
Options are: 8,4,6,7. This is a multiple correct question. Answer as per key is 8,6,7 Their explanation is this: My doubt: if the window size is 8, then why does the sender wait for acknowledgement after sending 3 packets? It can send more without waiting.
asked Feb 7 in Computer Networks ytheuyr 2 points 29 views
0 votes
0 answers 23 views
I have read rules of supernetting from a few sources and have got conflicting information. this (3:20) , this and this say that the rules are: 1.All the Networks should be contiguous. 2.The block size of every networks should be equal and must be in form of 2^ ... in power of 2 and first address being divisible by "number of blocks" in the supernet. What is going wrong? Am I missing something?
asked Feb 5 in Computer Networks shantanu4raje 25 points 23 views
0 votes
0 answers 15 views
In datagrams fragmentation occurs at routers. What about in virtual circuits? As CPU bandwidth and buffers are reserved, is there a chance for fragmentation to occur in router?
asked Jan 9 in Computer Networks Kishore7 5 points 15 views
0 votes
1 answer 77 views
0 votes
0 answers 17 views
consider the following figure of connection release.what will be B values ,if A is 21? in ans it is given 52.but it should be 51 bcz in connection release server sends FIN+ACK packet but ack packet does not consume any sequence number.Am i correct?
asked Dec 29, 2020 in Computer Networks 404 found 37 points 17 views
0 votes
1 answer 18 views
dhcp works at which layer?[ network layer or application layer] arp works at which layer?[data link layer or network layer]
asked Dec 29, 2020 in Computer Networks 404 found 37 points 18 views
0 votes
1 answer 34 views
Following is the Packet : 0 x 4 6 0 0 0 0 2 8 0 1 0 1 2 0 5 0 0 1 0 6 0 0 0 0 my question is that what is the size of options and how many bytes of data is being carried by this packet and what is the identification number of datagram fragment?
asked Dec 28, 2020 in Computer Networks codetoendtheworld 5 points 34 views
0 votes
0 answers 11 views
asked Dec 24, 2020 in Computer Networks Abhisheksmile94 347 points 11 views
0 votes
0 answers 58 views
How many maximum numbers of hosts can be connected to in a LAN, having three 6 port switches… The answer given is 14 but I suspect.
asked Dec 14, 2020 in Computer Networks vipin.gautam1906 9 points 58 views
0 votes
0 answers 15 views
Group of user stations(N) share a 56Kbps pure aloha channel .Each Station outputs a 1000 bits frame on an average of once every 100sec(stations are buffered). What is the max value of N?
asked Dec 12, 2020 in Computer Networks samir757 29 points 15 views
0 votes
0 answers 16 views
Wrap Around Concept and TCP Sequence Number While considering the wrap around time, why are the headers not considered? Why is it considered as if the entire stretch of bytes are continuous? Or is it so that the headers are just ignored?
asked Dec 12, 2020 in Computer Networks HitechGa 9 points 16 views
0 votes
0 answers 14 views
Consider the Go back N protocol with a sender's window size of n'. Suppose that at time t', the next inorder packet the receiver is expecting has a sequence number of K'. Assume that the medium does not reorder messages . If acknowledgements are still on their way to sender, what are all possible values of ... back to the sender at a time t'? [K-n, K-1] [K-1, K-n] [K, K-n] [K-n, K+1]
asked Dec 9, 2020 in Computer Networks bj293 5 points 14 views
0 votes
0 answers 74 views
Let N station share 40kbps of a pure aloha channel.Frame size is 512 bits which are sent at every 40 seconds. The maximum value of N is _______
asked Dec 2, 2020 in Computer Networks Veda Pradhan 11 points 74 views
0 votes
0 answers 52 views
A network with CSMA/CD protocol in the MAC layer is running at 1 Gbps over a 1 km cable with no repeaters. The signal speed in the cable is 2 x 10^8 m/sec. The frame size for this network is 10000 bits. What is the total time required in mu sec to send this frame completely where the number of collisions occurs on an average is eccentricity e ?[ Take the floor value of the result]
asked Dec 1, 2020 in Computer Networks Nitinkumar.097 13 points 52 views
0 votes
0 answers 49 views
Sentinel framing uses a one-bit pattern to designate the start of a frame, another bit pattern to designate the end of a frame and a bit-stuffing rule to prevent these two special patterns from occurring in the payload of the packet. The bit-stuffing ... 00111010011011011001100110001111. What bit pattern is there in start and end of the frame. 001110, 001111 00111, 01111 011101, 001111 0011, 01111
asked Dec 1, 2020 in Computer Networks Nitinkumar.097 13 points 49 views
...