GATE Computer Network Previous Year Questions
GATE Computer Network Previous Year Questions
Computer-Networks
Question 1
Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)?
A SMTP, MIME
B SMTP, POP3
C IMAP, POP3
D IMAP, SMTP
Computer-Networks GATE 2019
Question 2
A 3
B 5
C 2
D 1
Computer-Networks GATE 2019
Question 3
Consider three machines M, N, and P with IP addresses 100.10.5.2, 100.10.5.5, and 100.10.5.6 respectively. The subnet mask is set to 255.255.255.252 for all the
three machines. Which one of the following is true?
Computer-Networks GATE 2019
Question 4
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that Φ(n) = 2880, where Φ() denotes Euler's Totient Function,
then the prime factor of n which is greater than 50 is ______.
A 107
B 97
C 45
D 92
Computer-Networks GATE 2019
Question 5
Consider that 15 machines need to be connected in a LAN using 8-port Ethernet switches. Assume that these switches do not have any separate uplink ports.
The minimum number of switches needed is _____.
A 3
B 7
C 1
D 5
Computer-Networks GATE 2019
Question 6
Suppose that in an IP-over-Ethernet network, a machine X wishes to nd the MAC address of another machine Y in its subnet. Which one of the following
techniques can be used for this?
A X sends an ARP request packet to the local gateway's IP address which then nds the MAC address of Y and sends to X
B X sends an ARP request packet with broadcast IP address in its local subnet
C X sends an ARP request packet to the local gateway's MAC address which then nds the MAC address of Y and sends to X
D X sends an ARP request packet with broadcast MAC address in its local subnet
Computer-Networks GATE 2019
Question 7
Consider a long-lived TCP session with an end-to-end bandwidth of 1 Gbps (= 109 bits/second). The session starts with a sequence number of 1234. The
minimum time (in seconds, rounded to the closest integer) before this sequence number can be used again is _________.
A 33
B 34
C 35
D 36
Computer-Networks TCP Gate 2018
Question 8
Computer-Networks Header Gate 2018
Question 9
Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note that cwnd stands for the TCP congestion window
and MSS denotes the Maximum Segment Size.
Computer-Networks TCP-Congestion-Window Gate 2018
Question 10
Consider a simple communication system where multiple nodes are connected by a shared broadcast medium (like Ethernet or wireless). The nodes in the
system use the following carrier-sense based medium access protocol. A node that receives a packet to transmit will carrier-sense the medium for 5 units of
time. If the node does not detect any other transmission in this duration, it starts transmitting its packet in the next time unit. If the node detects another
transmission, it waits until this other transmission nishes, and then begins to carrier-sense for 5 time units again. Once they start to transmit, nodes do not
perform any collision detection and continue transmission even if a collision occurs. All transmissions last for 20 units of time. Assume that the transmission
signal travels at the speed of 10 meters per unit time in the medium.
Assume that the system has two nodes P and Q, located at a distance d meters from each other. P starts transmitting a packet at time t=0 after successfully
completing its carrier-sense phase. Node Q has a packet to transmit at time t=0 and begins to carrier-sense the medium.
The maximum distance d (in meters, rounded to the closest integer) that allows Q to successfully avoid a collision between its proposed transmission and P’s
ongoing transmission is ___________.
A 50
B 51
C 52
D 53
Computer-Networks Ethernet Gate 2018
Question 11
Consider an IP packet with a length of 4,500 bytes that includes a 20-byte IPv4 header and a 40-byte TCP header. The packet is forwarded to an IPv4 router that
supports a Maximum Transmission Unit (MTU) of 600 bytes. Assume that the length of the IP header in all the outgoing fragments of this packet is 20 bytes.
Assume that the fragmentation o set value stored in the rst fragment is 0.
A 144
145
B
C 146
D 147
Computer-Networks IPv4-an-Fragmentation Gate 2018
Question 12
Consider a TCP client and a TCP server running on two di erent machines. After completing data transfer, the TCP client calls close to terminate the connection
and a FIN segment is sent to the TCP server. Server-side TCP responds by sending an ACK, which is received by the client-side TCP. As per the TCP connection
state diagram (RFC 793), in which state does the client-side TCP connection wait for the FIN from the server-side TCP?
A LAST-ACK
B TIME-WAIT
C FIN-WAIT-1
D FIN-WAIT-2
Question 13
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations
can take place.
B (I) only
C (II) only
Question 14
A computer network uses polynomials over GF(2) for error checking with 8 bits as information bits and uses x3 + x + 1 as the generator polynomial to generate
the check bits. In this network, the message 01011011 is transmitted as
A 01011011010
B 01011011011
C 01011011101
D 01011011100
Question 15
In a RSA cryptosystem, a participant A uses two prime numbers p = 13 and q = 17 to generate her public and private keys. If the public key of A is 35, then the
private key of A is _________.
11
A
B 12
C 13
D 14
Question 16
The value of parameters for the Stop-and-Wait ARQ protocol are as given below:
Assume that there are no transmission errors. Then, the transmission e ciency (expressed in percentage) of the Stop-and-Wait ARQ protocol for the above
parameters is _________ (correct to 2 decimal places).
A 89.33%
B 89.34%
C 89.35%
D 89.36%
Question 17
Consider the following statements about the routing protocols, Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) in an IPv4 network.
A I and IV only
C I, II and IV only
Computer-Networks Routing GATE 2017(set-02)
Question 18
Consider socket API on a Linux machine that supports connected UDP sockets. A connected UDP socket is a UDP socket on which connect function has already
been called. Which of the following statement is/are CORRECT?
I. A connected UDP socket can be used to communicate with multiple peers simultaneously.
II. A process can successfully call connect function again for an already connected UDP socket.
I only
A
B II only
C Both I and II
D Neither I nor II
Computer-Networks UDP GATE 2017(set-02)
Question 19
The maximum number of IPv4 router addresses that can be listed in the record route (RR) option eld of an IPv4 header is _________.
A 9
B 10
C 11
D 12
Computer-Networks IPv4 GATE 2017(set-02)
Question 20
Consider two hosts X and Y, connected by a single direct link of rate 106bits/sec. The distance between the two hosts is 10,000 km and the propagation speed
along the link is 2 × 108m/sec. Host X sends a le of 50,000 bytes as one large message to host Y continuously. Let the transmission and propagation delays be p
milliseconds and q milliseconds, respectively. Then the values of p and q are
Computer-Networks Network-Communication GATE 2017(set-02)
Question 21
Which one of the following protocols is NOT used to resolve one form of address to another one?
A DNS
B ARP
C DHCP
D RARP
Computer-Networks Protocols 2016 set-01
Question 22
D (iv) only
Computer-Networks Application-Layer-Protocol 2016 set-01
Question 23
Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by Kx- and Kx+ for x = A,B,
respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the
CORRECT way of sending the message m along with the digital signature to A?
A
B
C
D
Computer-Networks Security 2016 set-01
Question 24
An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes.
Assume that the size of the IP header is 20 bytes.
The number of fragments that the IP datagram will be divided into for transmission is _________.
A 13
B 14
C 15
D 16
Computer-Networks IPv4-and-Fragmentation 2016 set-01
Question 25
For a host machine that uses the token bucket algorithm for congestion control, the token bucket has a capacity of 1 megabyte and the maximum output rate is
20 megabytes per second. Tokens arrive at a rate to sustain output at a rate of 10 megabytes per second. The token bucket is currently full and the machine
needs to send 12 megabytes of data. The minimum time required to transmit the data is seconds _________.
A 1.1 sec
B 1.2 sec
C 1.3 sec
D 1.4 sec
Computer-Networks Token-Bucket 2016 set-01
Question 26
A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80
Kbps (1Kbps = 1000 bits/second). Size of an acknowledgement is 100 bytes and the transmission rate at the receiver is 8 Kbps. The one-way propagation delay
is 100 milliseconds.
2500
A
B 2501
C 2502
D 2503
Computer-Networks Stop-and-Wait-ARQ 2016 set-01
Question 27
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
Question 28
In an Ethernet local area network, which one of the following statements is TRUE?
B The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.
C A station continues to transmit the packet even after the collision is detected.
Question 29
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote
server, assuming that the host has just been restarted.
Question 30
A network has a data transmission bandwidth of 20 × 106 bits per second. It uses CSMA/CD in the MAC layer. The maximum signal propagation time from one
node to another node is 40 microseconds. The minimum size of a frame in the network is _________ bytes.
A 200
B 201
C 202
D 203
Computer-Networks CSMA/CD GATE 2016 set-2
Question 31
For the IEEE 802.11 MAC protocol for wireless communication, which of the following statements is/are TRUE?
D II only
Question 32
Consider a 128 × 103 bits/ second satellite communication link with one way propagation delay of 150 milliseconds. Selective retransmission (repeat) protocol is
used on this link to send data with a frame size of 1 kilobyte. Neglect the transmission time of acknowledgement. The minimum number of bits required for the
sequence number field to achieve 100% utilization is __________.
A 4
B 5
C 6
D 7
Question 33
A III only
C I and IV only
D II and IV only
Question 34
Which one of the following elds of an IP header is NOT modi ed by a typical IP router?
A Checksum
B Source address
Question 35
Consider a LAN with four nodes S1, S2, S3 and S4. Time is divided into xed-size slots, and a node can begin its transmission only at the beginning of a slot. A
collision is said to have occurred if more than one node transmit in the same slot. The probabilities of generation of a frame in a time slot by S1, S2, S3 and S4
are 0.1, 0.2, 0.3 and 0.4, respectively. The probability of sending a frame in the rst slot without any collision by any of these four stations is _________.
A 0.4404
B 0.463
C 0.464
D 0.465
Question 36
Suppose that the stop-and-wait protocol is used on a link with a bit rate of 64 kilobits per second and 20 milliseconds propagation delay. Assume that the
transmission time for the acknowledgment and the processing time at nodes are negligible. Then the minimum frame size in bytes to achieve a link utilization
of at least 50% is _________.
A 320
B 321
C 322
D 323
Question 37
Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API.
Question 38
Which one of the following statements is NOT correct about HTTP cookies?
A A cookie is a piece of code that has the potential to compromise the security of an internet user
B A cookie gains entry to the user’s work area through an HTTP header
D Cookies can be used to track the browsing pattern of a user at a particular site
Question 39
A link has a transmission speed of 106 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgement has negligible transmission
delay, and that its propagation delay is the same as the data propagation delay. Also assume that the processing delays at the nodes are negligible. The
e ciency of the stop-and-wait protocol in this setup is exactly 25%. The value of the one-way propagation delay (in milliseconds) is ___________.
A 12
B 13
C 14
D 15
Question 40
Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU =
1500 bytes). Size of UDP header is 8 bytes and size of IP heard is 20 bytes. There is no option eld in IP header. How many total number of IP fragments will be
transmitted and what will be the contents of o set eld in the last fragment?
A 6 and 925
B 6 and 7400
C 7 and 1110
D 7 and 8880
Question 41
Question 42
A Only I is correct
Computer-Networks TCP GATE 2015(Set-03)
Question 43
Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second) over a 1 km (kilometer) cable with no repeaters. If the minimum frame
size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable?
A 8000
B 10000
C 16000
D 20000
Computer-Networks CSMA/CD GATE 2015(Set-03)
Question 44
Consider a network connected two systems located 8000 kilometers apart. The bandwidth of the network is 500 × 106 bits per second. The propagation speed of
the media is 4 × 106 meters per second. It is needed to design a Go-Back-N sliding window protocol for this network. The average packet size is 107 bits. The
network is to be used to its full capacity. Assume that processing delays at nodes are negligible. Then the minimum size in bits of the sequence number eld
has to be ___________.
A 8
B 7
C 6
D 5
Computer-Networks Sliding-Window-Protocol GATE 2015(Set-03)
Question 45
In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ____________.
A 158
B 157
C 156
D 155
Computer-Networks Subnetting GATE 2015(Set-03)
Question 46
A S1, S2, and S3 are all true.
Computer-Networks Routing GATE 2014(Set-01)
Question 47
A P and R only
B Q and R only
C Q and S only
D R and S only
Computer-Networks Security GATE 2014(Set-01)
Question 48
A 4,2,1,3
B 1,2,3,4
C 4,1,2,3
D 2,4,1,3
Computer-Networks TCP GATE 2014(Set-01)
Question 49
Consider a token ring network with a length of 2 km having 10 stations including a monitoring station. The propagation speed of the signal is 2×108 m/s and the
token transmission time is ignored. If each station is allowed to hold the token for 2 µsec, the minimum time for which the monitoring station should wait (in
µsec) before assuming that the token is lost is _______.
A 28μs to 30 μs
B 29μs to 31 μs
C 30μs to 32 μs
D 31μs to 33 μs
Computer-Networks Token-Ring GATE 2014(Set-01)
Question 50
Let the size of congestion window of a TCP connection be 32 KB when a timeout occurs. The round trip time of the connection is 100 msec and the maximum
segment size used is 2 KB. The time taken (in msec) by the TCP connection to get back to 32 KB congestion window is _________.
A 1100 to 1300
B 1101 to 1301
C 1102 to 1302
D 1103 to 1303
Computer-Networks TCP GATE 2014(Set-01)
Question 51
Consider a selective repeat sliding window protocol that uses a frame size of 1 KB to send data on a 1.5 Mbps link with a one-way latency of 50 msec. To achieve
a link utilization of 60%, the minimum number of bits required to represent the sequence number eld is ________.
A 5
B 6
C 7
D 8
Computer-Networks Sliding-Window-Protocol GATE 2014(Set-01)
Question 52
Which one of the following is TRUE about the interior gateway routing protocols – Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)?
A RIP uses distance vector routing and OSPF uses link state routing
B OSPF uses distance vector routing and RIP uses link state routing
Question 53
Which one of the following socket API functions converts an unconnected active TCP socket into a passive socket?
A connect
B bind
C listen
D accept
Question 54
A 26
B 27
C 28
D 29
Question 55
A T1 < T2 < T3
B T1 > T2 > T3
C T2 = T3, T3 < T1
D T1 = T3, T3 > T2
Question 56
A Only I1 and I2
B Only I1
C Only I2 and I3
Only I3 and I4
D
Computer-Networks Security Gate 2014 Set -02
Question 57
In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair is
Question 58
A bit-stu ng based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stu ng is 01111100101, then the input bit-string
is
A 0111110100
B 0111110101
C 0111111101
D 0111111111
Question 59
A (i) only
Question 60
A 1
B 2
3
C
D 4
Question 61
Every host in an IPv4 network has a 1-second resolution real-time clock with battery backup. Each host needs to generate up to 1000 unique identi ers per
second. Assume that each host has a globally unique IPv4 address. Design a 50-bit globally unique ID for this purpose. After what period (in seconds) will the
identi ers generated by a host wrap around?
A 256
B 257
C 258
D 259
Question 62
An IP router with a Maximum Transmission Unit (MTU) of 1500 bytes has received an IP packet of size 4404 bytes with an IP header of length 20 bytes. The
values of the relevant elds in the header of the third IP fragment generated by the router for this packet are
Question 63
Question 64
The transport layer protocols used for real time multimedia, le transfer, DNS and email, respectively are
Question 65
Using public key cryptography, X adds a digital signature to message M, encrypts <M, σ>, and sends it to Y, where it is decrypted. Which one of the following
sequences of keys is used for the operations?
A Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
B Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
C Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
D Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Computer-Networks Network-Security Gate 2013
Question 66
Computer-Networks Network-Layer Gate 2013
Question 67
Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the
signal speed in the cable to be 2,00,000 km/s.
A 1
B 2
C 2.5
D 5
Computer-Networks Data-Link-Layer Gate 2013
Question 68
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment o set value is 300. The position of the datagram,
the sequence numbers of the rst and the last bytes of the payload, respectively are
Question 69
The protocol data unit (PDU) for the application layer in the Internet stack is
A Segment
B Datagram
C Message
D Frame
Computer-Networks Application-Layer-Protocol Gate 2012
Question 70
Which of the following transport layer protocols is used to support electronic mail?
A SMTP
B IP
C TCP
D UDP
Question 71
In the IPv4 addressing format, the number of networks allowed under Class C addresses is
A 214
B 27
C 221
D 224
Computer-Networks IPv4 Gate 2012
Question 72
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk
of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of
addresses to A and B?
Computer-Networks IPv4 Gate 2012
Question 73
Consider a source computer (S) transmitting a le of size 106 bits to a destination computer (D) over a network of two routers (R1 and R2) and three links (L1, L2
and L3). L1 connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of length 100 km. Assume signals travel over each link at a speed of
108 meters per second. Assume that the link bandwidth on each link is 1Mbps. Let the le be broken down into 1000 packets each of size 1000 bits. Find the
total sum of transmission and propagation delays in transmitting the le from S to D?
A 1005 ms
B 1010 ms
C 3000 ms
D 3003 ms
Computer-Networks Switching Gate 2012
Question 74
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS
and the threshold at the start of the rst transmission is 8 MSS. Assume that a timeout occurs during the fth transmission. Find the congestion window size at
the end of the tenth transmission.
A 8 MSS
B 14 MSS
C 7 MSS
D 12 MSS
Computer-Networks Congestion-Control Gate 2012
Question 75
A layer-4 rewall (a device that can look at all protocol headers up to the transport layer) CANNOT
C stop incoming tra c from a speci c IP address but allow outgoing tra c to the same IP address
D block TCP tra c from a speci c user on a multi-user system during 9:00PM and 5:00AM
Computer-Networks Network-Security Gate 2011
Question 76
A (3, 2, 0, 2, 5)
B (3, 2, 0, 2, 6)
C (7, 2, 0, 2, 5)
D (7, 2, 0, 2, 6)
Computer-Networks Routing Gate 2011
Question 77
A 3
9
B
C 10
D ∞
Computer-Networks Routing Gate 2011
Question 78
One of the header elds in an IP datagram is the Time to Live (TTL) eld. Which of the following statements best explains the need for this eld?
Computer-Networks IP-Packet 2010
Question 79
A Internet chat
B Web browsing
C E-mail
D ping
Computer-Networks Client-Server-Application 2010
Question 80
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same net mask N. Which of the values of N
given below should not be used if A and B should belong to the same network?
A 255.255.255.0
B 255.255.255.128
C 255.255.255.192
D 255.255.255.224
Computer-Networks IP-Address 2010
Question 81
A 4
B 3
C 2
D 1
Computer-Networks Routing 2010
Question 82
A 0
B 1
C 2
D 4
Computer-Networks Routing 2010
Question 83
A I and II
B I and III
C II and IV
D III and IV
Computer-Networks Network-Security 2009
Question 84
A 0.015/s
B 0.064/s
C 0.135/s
D 0.327/s
Computer-Networks TCP 2009
Question 85
Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satis ed by G(x) to detect odd number of bits in error?
B G(x) does not divide 1+xk, for any k not exceeding the frame length
Computer-Networks Error-Detection 2009
Question 86
A I=2
B I=3
C I=4
D I=5
Computer-Networks Sliding-Window-Protocol 2009
Question 87
A 16ms
B 18ms
C 20ms
D 22ms
Computer-Networks Sliding-Window-Protocol 2009
Question 88
What is the maximum size of data that the application layer can pass on to the TCP layer below?
A Any size
C 216 bytes
D 1500 bytes
Computer-Networks Application-Layer-Protocol Gate-2008
Question 89
Which of the following system calls results in the sending of SYN packets?
A socket
B bind
C listen
D connect
Computer-Networks Sockets Gate-2008
Question 90
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window
B increases linearly
C increases quadratically
D increases exponentially
Computer-Networks TCP Gate-2008
Question 91
If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?
A 1022
B 1023
C 2046
D 2047
Computer-Networks IP-Address Gate-2008
Question 92
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is lled at a rate of 2Mbps. It is initially lled to capacity with 16Megabits.
What is the maximum duration for which the computer can transmit at the full 10Mbps?
A 1.6 seconds
B 2 seconds
C 5 seconds
D 8 seconds
Computer-Networks Token-Bucket Gate-2008
Question 93
A client process P needs to make a TCP connection to a server process S. Consider the following situation: the server process S executes a socket (), a bind () and
a listen () system call in that order, following which it is preempted. Subsequently, the client process P executes a socket () system call followed by connect ()
system call to connect to the server process S. The server process has not executed any accept() system call. Which one of the following events could take place?
Computer-Networks Sockets Gate-2008
Question 94
Computer-Networks Match-the-Following Gate 2008-IT
Question 95
A 1Mbps satellite link connects two ground stations. The altitude of the satellite is 36,504 km and speed of the signal is 3 × 108 m/s. What should be the packet
size for a channel utilization of 25% for a satellite link using go-back-127 sliding window protocol? Assume that the acknowledgment packets are negligible in
size and that there are no errors during communication.
A 120 bytes
B 60 bytes
C 240 bytes
D 90 bytes
Computer-Networks Sliding-Window-Protocol Gate 2008-IT
Question 96
The minimum frame size required for a CSMA/CD based computer network running at 1 Gbps on a 200 m cable with a link speed of 2 × 108 m/s is
A 125 bytes
B 250 bytes
C 500 bytes
D None of these
Computer-Networks Ethernet Gate 2008-IT
Question 97
A 1
B 2
C 3
D 4
Computer-Networks Error-Detection Gate 2008-IT
Question 98
C S2 and S3 only
D S1 and S4 only
Computer-Networks Routing Gate 2008-IT
Question 99
B S1 and S3 only
C S3 and S4 only
Computer-Networks Congestion-Control Gate 2008-IT
Question 100
A S2 and S3 only
B S1 and S4
C S1 and S3
D S2 and S4
Computer-Networks TCP Gate 2008-IT
Question 101
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems,
respectively are:
A
B
D
Computer-Networks Network-Security Gate 2008-IT
Question 102
A 1
B 2
C 3
D 6
Computer-Networks IP-Address Gate 2008-IT
Question 103
A 192.168.1.67
B 192.168.1.110
C 192.168.1.135
D 192.168.1.155
Computer-Networks IP-Address Gate 2008-IT
Question 104
Computer-Networks Ethernet Gate-2007
Question 105
A HTTP
B Telnet
C DNS
D SMTP
Computer-Networks Transport Layer Protocol Gate-2007
Question 106
There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station
transmits in a given time slot?
A np(1-p)n-1
B (1-p)n-1
C p(1-p)n-1
D 1-(1-p)n-1
Computer-Networks LAN-and-Probability Gate-2007
Question 107
In a token ring network the transmission speed is 107 bps and the propagation speed is 200 metres/μs. The 1-bit delay in this network is equivalent to:
C 20 metres of cable.
D 50 metres of cable.
Computer-Networks Token-Ring-Network Gate-2007
Question 108
The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of
hosts in each subnet?
Computer-Networks IP-Address Gate-2007
Question 109
The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is:
A 11001001000
B 11001001011
C 11001010
D 110010010011
Computer-Networks CRC Gate-2007
Question 110
The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the
channel capacity. Assuming that processing delay is negligible, the minimum number of bits for the sequence number eld in a frame for maximum utilization,
when the sliding window protocol is used, is:
A ⌈log2(2LtR+2K/K)⌉
B ⌈log2(2LtR/K)⌉
C ⌈log2(2LtR+K/K)⌉
D ⌈log2(2LtR+K/2K)⌉
Computer-Networks Sliding-Window-Protocol Gate-2007
Question 111
A P–2Q–1R–3S–5
B P–1Q–4R–2S–3
C P–1Q–4R–2S–5
D P–2Q–4R–1S–3
Computer-Networks Match-the-Following Gate-2007
Question 112
Computer-Networks TCP Gate 2007-IT
Question 113
Consider a TCP connection in a state where there are no outstanding ACKs. The sender sends two segments back to back. The sequence numbers of the rst
and second segments are 230 and 290 respectively. The rst segment was lost, but the second segment was received correctly by the receiver. Let X be the
amount of data carried in the rst segment (in bytes), and Y be the ACK number sent by the receiver. The values of X and Y (in that order) are
A 60 and 290
C 60 and 231
D 60 and 230
Computer-Networks TCP Gate 2007-IT
Question 114
Computer-Networks Network-Security Gate 2007-IT
Question 115
A rewall is to be con gured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only
allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP
connections to hosts in the private network. To achieve this the minimum capability of the rewall should be that of
A A combinational circuit
B A nite automaton
Computer-Networks TCP Gate 2007-IT
Question 116
A 0
B 1
C 2
D 3
Computer-Networks Error-Correction Gate 2007-IT
Question 117
Computer-Networks Routing Gate 2007-IT
Question 118
Computer-Networks Manchester-Encoding Gate 2007-IT
Question 119
Let us consider a statistical time division multiplexing of packets. The number of sources is 10. In a time unit, a source transmits a packet of 1000 bits. The
number of sources sending data for the rst 20 time units is 6, 9, 3, 7, 2, 2, 2, 3, 4, 6, 1, 10, 7, 5, 8, 3, 6, 2, 9, 5 respectively. The output capacity of multiplexer is
5000 bits per time unit. Then the average number of backlogged of packets per time unit during the given period is
A 5
B 4.45
C 3.45
D 0
Computer-Networks Access-Control-Methods Gate 2007-IT
Question 120
A group of 15 routers are interconnected in a centralized complete binary tree with a router at each tree node. Router j communicates with router j by sending
a message to the root of the tree. The root then sends the message back down to router j. The mean number of hops per message, assuming all possible router
pairs are equally likely is
A 3
B 4.26
C 4.53
D 5.26
Computer-Networks Routing Gate 2007-IT
Question 121
A broadcast channel has 10 nodes and total capacity of 10 Mbps. It uses polling for medium access. Once a node nishes transmission, there is a polling delay
of 80 μs to poll the next node. Whenever a node is polled, it is allowed to transmit a maximum of 1000 bytes. The maximum throughput of the broadcast
channel is
A 1 Mbps
B 100/11 Mbps
C 10 Mbps
D 100 Mbps
Computer-Networks Access-Control-Methods Gate 2007-IT
Question 122
Computer-Networks Network-Protocols Gate 2007-IT
Question 123
A zdp
B fpq
C qwA
D oze
Computer-Networks Network-Security Gate 2007-IT
Question 124
A 0.545
B 0.6
C 0.857
0.961
D
Computer-Networks Token-Ring-Topology Gate 2007-IT
Question 125
A 0.545
B 0.655
C 0.9375
D 0.961
Question 126
For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) eld in the IP datagram header?
D Limit the time for which a packet gets queued in intermediate routers
Computer-Networks IP-Header Gate-2006
Question 127
A
B
Computer-Networks Bridges Gate-2006
Question 128
Computer-Networks Bridges Gate-2006
Question 129
Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets
are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of
packets that A will transmit for sending the message to B?
A 12
B 14
C 16
D 18
Computer-Networks Sliding-Window-Protocol Gate-2006
Question 130
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and
the bottleneck bandwidth on the path between A and B is 128 kbps. What is the optimal window size that A should use?
A 20
B 40
C 160
D 320
Computer-Networks Sliding-Window-Protocol Gate-2006
Question 131
Two computers C1 and C2 are con gured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask
255.255.192.0. Which one of the following statements is true?
Computer-Networks IP-Address Gate-2006
Question 132
Computer-Networks Network-Protocols Gate 2006-IT
Question 133
B Ethernet frame includes a checksum eld and IP packet includes a CRC eld
C Ethernet frame includes a CRC eld and IP packet includes a checksum eld
Question 134
A 1 only
B 2 and 3 only
C 1 and 3 only
D 2 only
Computer-Networks Network-Security Gate 2006-IT
Question 135
A eth0
B eth1
C eth2
D eth3
Computer-Networks IP-Address Gate 2006-IT
Question 136
Suppose that it takes 1 unit of time to transmit a packet (of xed size) on a communication link. The link layer uses a window ow control protocol with a window
size of N packets. Each packet causes an ack or a nak to be generated by the receiver, and ack/nak transmission times are negligible. Further, the round trip
time on the link is equal to N units. Consider time i > N. If only acks have been received till time i(no naks), then the goodput evaluated at the transmitter at
time i(in packets per unit time) is
A 1 – N/i
B i/(N + i)
C 1
D 1 – e(i/N)
Computer-Networks Sliding-Window-Protocol Gate 2006-IT
Question 137
In the 4B/5B encoding scheme, every 4 bits of data are encoded in a 5-bit codeword. It is required that the codewords have at most 1 leading and at most 1
trailing zero. How many such codewords are possible?
A 14
B 16
C 18
D 20
Computer-Networks Encoding Gate 2006-IT
Question 138
A router has two full-duplex Ethernet interfaces each operating at 100 Mb/s. Ethernet frames are at least 84 bytes long (including the Preamble and the Inter-
Packet-Gap). The maximum packet processing time at the router for wirespeed forwarding to be possible is (in microseconds)
A 0.01
B 3.36
C 6.72
D 8
Computer-Networks Ethernet Gate 2006-IT
Question 139
A link of capacity 100 Mbps is carrying tra c from a number of sources. Each source generates an on-o tra c stream; when the source is on, the rate of tra c
is 10 Mbps, and when the source is o , the rate of tra c is zero. The duty cycle, which is the ratio of on-time to o -time, is 1:2. When there is no bu er at the
link, the minimum number of sources that can be multiplexed on the link so that link capacity is not wasted and no data loss occurs is S1. Assuming that all
sources are synchronized and that the link is provided with a large bu er, the maximum number of sources that can be multiplexed so that no data loss occurs
is S2. The values of S1 and S2 are, respectively,
A 10 and 30
B 12 and 25
C 5 and 33
D 15 and 22
Computer-Networks Network-Layer Gate 2006-IT
Question 140
On a wireless link, the probability of packet error is 0.2. A stop-and-wait protocol is used to transfer data across the link. The channel condition is assumed to
be independent from transmission to transmission. What is the average number of transmission attempts required to transfer 100 packets?
A 100
B 125
C 150
D 200
Computer-Networks Stop-and-Wait-protocol Gate 2006-IT
Question 141
A program on machine X attempts to open a UDP connection to port 5376 on a machine Y, and a TCP connection to port 8632 on machine Z. However, there are
no applications listening at the corresponding ports on Y and Z. An ICMP Port Unreachable error will be generated by
A Y but not Z
B Z but not Y
C Neither Y nor Z
D Both Y and Z
Computer-Networks TCP-and-UDP Gate 2006-IT
Question 142
A subnetted Class B network has the following broadcase address : 144.16.95.255. Its subnet mask
A is necessarily 255.255.224.0
B is necessarily 255.255.240.0
C is necessarily 255.255.248.0
Computer-Networks IP-Address Gate 2006-IT
Question 143
Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and R2 are two relationships between E1 and E2, where R1 is one-to-
many and R2 is many-to-many. R1 and R2 do not have any attributes of their own. What is the minimum number of tables required to represent this situation in
A 2
B 3
C 4
D 5
Computer-Networks ER-Model Gate-2005
Question 144
In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is 24 bytes
and each packet contains a header of 3 bytes, then the optimum packet size is:
A 4
B 6
C 7
D 9
Computer-Networks Network-Switching Gate-2005
Question 145
Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 46.4 μs. The minimum frame size is:
A 94
416
B
C 464
D 512
Computer-Networks Ethernet Gate-2005
Question 146
The maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is:
A 2n
B 2n-1
C 2n - 1
D 2n-2
Computer-Networks Sliding-Window-Protocol Gate-2005
Question 147
In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one path may exist
between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?
Computer-Networks Bridges Gate-2005
Question 148
An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be:
A 255.255.0.0
B 255.255.64.0
C 255.255.128.0
D 255.255.252.0
Computer-Networks IP-Address Gate-2005
Question 149
Packets of the same session may be routed through di erent paths in:
Computer-Networks Routing Gate-2005
Question 150
The address resolution protocol (ARP) is used for:
Computer-Networks Network-Addressing Gate-2005
Question 151
Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the
technique used by traceroute to identify these hosts
A By progressively querying routers about the next router on the path to B using ICMP packets, starting with the rst router
By requiring each router to append the address to the ICMP packet as it is forwarded to B. The list of all routers en-route to B is returned by
B B in an ICMP reply packet
C By ensuring that an ICMP reply packet is returned to A by each router en-route to B, in the ascending order of their hop distance from A
Computer-Networks Network-Layer Gate 2005-IT
Question 152
C CSMA/CD is not suitable for a high propagation delay network like satellite network
Computer-Networks CSMA/CD Gate 2005-IT
Question 153
Computer-Networks Network-Layer Gate 2005-IT
Question 154
Computer-Networks Network-Layer Gate 2005-IT
Question 155
A network with CSMA/CD protocol in the MAC layer is running at 1 Gbps over a 1 km cable with no repeaters. The signal speed in the cable is 2 × 108 m/sec. The
minimum frame size for this network should be
A 10000 bits
B 10000 bytes
C 5000 bits
D 5000 bytes
Computer-Networks CSMA/CD Gate 2005-IT
Question 156
A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms. The channel uses stop and wait protocol. The transmission time of the
acknowledgement frame is negligible. To get a channel e ciency of at least 50%, the minimum frame size should be
A 80 bytes
B 80 bits
C 160 bytes
D 160 bits
Computer-Networks Data-Link-Layer Gate 2005-IT
Question 157
On a TCP connection, current congestion window size is Congestion Window=4 KB. The window size advertised by the receiver is Advertise Window=6 KB. The
last byte sent by the sender is LastByteSent=10240 and the last byte acknowledged by the receiver is LastByteAcked=8192. The current window size at the
sender is
A 2048 bytes
B 4096 bytes
C 6144 bytes
D 8192 bytes
Question 158
In a communication network, a packet of length L bits takes link L1 with a probability of p 1 or link L2 with a probability of p 2. Link L1 and L2 have bit error
probability of b 1and b 2 respectively. The probability that the packet will be received without error via either L1 or L2 is
A (1 – b 1)L p 1 + (1 – b 2)Lp 2
B [1 – (b 1 + b L
2 ) ]p1 p2
C (1 – b 1)L (1 – b 2)Lp 1p 2
D 1 – (b 1 Lp 1 + b 2 Lp 2)
Computer-Networks Network-Layer Gate 2005-IT
Question 159
In a TDM medium access control bus LAN, each station is assigned one time slot per cycle for transmission. Assume that the length of each time slot is the time
to transmit 100 bits plus the end-to-end propagation delay. Assume a propagation speed of 2 × 108 m/sec. The length of the LAN is 1 km with a bandwidth of 10
Mbps. The maximum number of stations that can be allowed in the LAN so that the throughput of each station can be 2/3 Mbps is
A 3
B 5
C 10
D 20
Computer-Networks Data-Link-Layer Gate 2005-IT
Question 160
A company has a class C network address of 204.204.204.0. It wishes to have three subnets, one with 100 hosts and two with 50 hosts each. Which one of the
following options represents a feasible set of subnet address/subnet mask pairs?
204.204.204.128/255.255.255.192
A 204.204.204.0/255.255.255.128
204.204.204.64/255.255.255.128
204.204.204.0/255.255.255.192
B 204.204.204.192/255.255.255.128
204.204.204.64/255.255.255.128
204.204.204.128/255.255.255.128
C 204.204.204.192/255.255.255.192
204.204.204.224/255.255.255.192
204.204.204.128/255.255.255.128
D 204.204.204.64/255.255.255.192
204.204.204.0/255.255.255.192
Computer-Networks Network-Layer Gate 2005-IT
Question 161
Assume that “host1.mydomain.dom” has an IP address of 145.128.16.8. Which of the following options would be most appropriate as a subsequence of steps in
performing the reverse lookup of 145.128.16.8? In the following options “NS” is an abbreviation of “nameserver”.
A Query a NS for the root domain and then NS for the “dom” domains
Computer-Networks Network-Layer Gate 2005-IT
Question 162
Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for this message using the divisor polynomial x5 + x4 + x2 + 1 is :
A 01110
B 01011
C 10101
D 10110
Computer-Networks Data-Link-Layer Gate 2005-IT
Question 163
Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Di e-Hellman key exchange technique. They
agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is
A 3
B 4
C 5
D 6
Computer-Networks Data-Link-Layer Gate 2005-IT
Question 164
A P - 1, Q - 4, R - 3
B P - 2, Q - 4, R - 1
C P - 2, Q - 3, R - 1
D P - 1, Q - 3, R - 2
Computer-Networks Match-the-Following Gate-2004
Question 165
Which of the following is NOT true with respect to a transparent bridge and a router?
Computer-Networks Bridge-and-Router Gate-2004
Question 166
How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start
bit, eight data bits, two stop bits, and one parity bit?
A 600
B 800
C 876
D 1200
Computer-Networks Serial-Communication Gate-2004
Question 167
A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the
rst backo race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second backo
race is
A 0.5
B 0.625
C 0.75
D 1.0
Computer-Networks Ethernet Gate-2004
Question 168
Computer-Networks IP-Address Gate-2004
Question 169
A 200
B 220
C 240
D 260
Computer-Networks IPv4-and-TCP Gate-2004
Question 170
A 325.5 Kbps
B 354.5 Kbps
C 409.6 Kbps
D 512.0 Kbps
Computer-Networks IPv4-and-TCP Gate-2004
Question 171
A Packet switching leads to better utilization of bandwidth resources than circuit switching.
C Packet switching requires more per packet processing than circuit switching.
Computer-Networks Data-Link-Layer Gate 2004-IT
Question 172
Computer-Networks General Gate 2004-IT
Question 173
Computer-Networks General Gate 2004-IT
Question 174
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?
Computer-Networks Network-Security Gate 2004-IT
Question 175
A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?
A 14
B 30
C 62
D 126
Computer-Networks Network-Layer Gate 2004-IT
Question 176
A host is connected to a Department network which is part of a University network. The University network, in turn, is part of the Internet. The largest network in
which the Ethernet address of the host is unique is:
D the Internet
Computer-Networks Network-Layer Gate 2004-IT
Question 177
A byte
B word
C segment
D message
Computer-Networks Network-Layer Gate 2004-IT
Question 178
Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?
Computer-Networks Network-Layer Gate 2004-IT
Question 179
A l and II only
D I, II and III
Computer-Networks Application-Layer Gate 2004-IT
Question 180
A serial transmission T1 uses 8 information bits, 2 start bits, 1 stop bit and 1 parity bit for each character. A synchronous transmission T2 uses 3 eight bit sync
characters followed by 30 eight bit information characters. If the bit rate is 1200 bits/second in both cases, what are the transfer rates of T1 and T2?
Computer-Networks General Gate 2004-IT
Question 181
In a sliding window ARQ scheme, the transmitter's window size is N and the receiver's window size is M. The minimum number of distinct sequence numbers
required to ensure correct operation of the ARQ scheme is
A min (M,N)
B max (M,N)
C M+N
D MN
Computer-Networks ARQ-Protocol Gate 2004-IT
Question 182
Consider a 10 Mbps token ring LAN with a ring latency of 400 µs. A host that needs to transmit seizes the token. Then it sends a frame of 1000 bytes, removes
the frame after it has circulated all around the ring, and nally releases the token. This process is repeated for every frame. Assuming that only a single host
wishes to transmit, the e ective data rate is
A 1Mbps
B 2Mbps
C 5Mbps
D 6Mbps
Computer-Networks Network-Layer Gate 2004-IT
Question 183
A 20 Kbps satellite link has a propagation delay of 400 ms. The transmitter employs the "go back n ARQ" scheme with n set to 10. Assuming that each frame is
100 bytes long, what is the maximum data rate possible?
A 5 Kbps
B 10 Kbps
C 15 Kbps
D 20 Kbps
Computer-Networks Network-Layer Gate 2004-IT
Question 184
Consider a simpli ed time slotted MAC protocol, where each host always has data to send and transmits with probability p = 0.2 in every slot. There is no
backo and one frame can be transmitted in one slot. If more than one host transmits in the same slot, then the transmissions are unsuccessful due to
collision. What is the maximum number of hosts which this protocol can support, if each host has to be provided a minimum through put of 0.16 frames per
time slot?
A 1
B 2
C 3
D 4
Computer-Networks Data-Link-Layer Gate 2004-IT
Question 185
In the TCP/IP protocol suite, which one of the following is NOT part of the IP header?
A Fragment O set
B Source IP address
C Destination IP address
Computer-Networks Network-Layer Gate 2004-IT
Question 186
A TCP message consisting of 2100 bytes is passed to IP for delivery across two networks. The rst network can carry a maximum payload of 1200 bytes per
frame and the second network can carry a maximum payload of 400 bytes per frame, excluding network overhead. Assume that IP overhead per packet is 20
bytes. What is the total IP overhead in the second network for this transmission?
A 40 bytes
B 80 bytes
C 120 bytes
D 160 bytes
Computer-Networks Network-Layer Gate 2004-IT
Question 187
Suppose that the maximum transmit window size for a TCP connection is 12000 bytes. Each packet consists of 2000 bytes. At some point of time, the connection
is in slow-start phase with a current transmit window of 4000 bytes. Subsequently, the transmitter receives two acknowledgements. Assume that no packets are
lost and there are no time-outs. What is the maximum possible value of the current transmit window?
A 4000 bytes
B 8000 bytes
C 10000 bytes
D 12000 bytes
Computer-Networks Network-Layer Gate 2004-IT
Question 188
Which of the following assertions is FALSE about the Internet Protocol (IP)?
B IP packets from the same source to the same destination can take di erent routes in the network
C IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops
D The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Computer-Networks IPv4 Gate-2003
Question 189
Which of the following functionalities must be implemented by a transport protocol over and above the network protocol?
Question 190
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
Computer-Networks IP-Address Gate-2003
Question 191
A 2km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2×108 m/s. What is the minimum packet size that can
be used on this network?
A 50 bytes
B 100 bytes
C 200 bytes
Computer-Networks Ethernet Gate-2003
Question 192
Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for ow control. The send and receive window sizes are 5
packets each. Data packets (sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is 50 µs Acknowledgement packets (sent
only from B to A) are very small and require negligible transmission time. The propagation delay over the link is 200 µs. What is the maximum achievable
throughput in this communication?
Computer-Networks Sliding-Window-Protocol Gate-2003
Question 193
What is the distance of the following code 000000, 010101, 000111, 011001, 111111?
A 2
B 3
C 4
D 1
Computer-Networks Error-Detection Gate-1995
Question 194
A simple and reliable data transfer can be accomplished by using the ‘handshake protocol’. It accomplishes reliable data transfer because for every data item
sent by the transmitter __________.
A in this case receiver has to respond that receiver can be able to receive the data item.
Computer-Networks Handshake-Protocol Gate-1992
Question 195
Start and stop bits do not contain an ‘information’ but are used in serial communication for
A Error detection
B Error correction
C Synchronization
Computer-Networks Sequential-Circuits Gate-1992
Question 196
A Out of syllabus.
Computer-Networks General Gate-1991
There are 196 questions to complete.