0% found this document useful (0 votes)
32 views7 pages

Gate Question in CN Downloaded From Internet Sources

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

Gate Question in CN Downloaded From Internet Sources

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1. Consider a network with five nodes, N1 to N5, as shown below.

The network uses a Distance Vector Routing Distance Vector Routing protocol.
Once the routes have stabilized, the distance vectors at different nodes are as
following.
N1:(0, 1, 7, 8, 4) N2:(1, 0, 6, 7, 3) N3:(7, 6, 0, 2, 6)
N4:(8, 7, 2, 0, 4) N5:(4, 3, 6, 4, 0)

Each distance vector is the distance of the best-known path at that instance to nodes,
N1 to N5, where the distance to itself is 0. Also, all links are symmetric and the cost
is identical in both directions. In each round, all nodes exchange their distance
vectors with their respective neighbours. Then all nodes update their distance
vectors. In between two rounds, any change in cost of a link will cause the two
incident nodes to change only that entry in their distance vectors.

2. The cost of link N2-N3 reduces to 2 (in both directions). After the next round of
update what will be the new distance vector at node, N3?
3. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
4. The maximum window size for data transmission using the selective reject protocol
with n-bit frame sequence numbers is:
5. In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each
packet contains a header of 3 bytes, then the optimum packet size is:
6. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is:
7. In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as
i.
8. The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:
a. Data Link Layer and Bit synchronization
b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication

9. Choose the best matching between Group 1 and Group 2 :


a. Group –1
b. P. Data link layer
c. Q. Network layer
d. R. Transport layer
e. Group – 2
f. Ensures reliable transport of data over a physical point-to-point link
g. Encodes/. Decodes data for physical transmission
h. Allows end-to-end communication between two processes
i. Routes data from one network node to the next

10. The protocol data unit (PDU) for the application layer in the Internet stack is

11. What is the address resolution protocol (ARP) used for?

12. If a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second)
over a 1 km(kilometer) cable with no repeaters and the minimum frame size required
for this network is 1250 bytes, what is the signal speed (km/sec) in the cable?

13. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is______

14. A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If
the output bit-string after stuffing is 01111100101, then the input bit-string is

15. The wrong statement about a MAC address is


a. It is represented by colon hexadecimal notation
b. The first six digits represents the manufacturer
c. This is used by network layer for packet delivery from end to end
d. Its types are unicast, multicast and broadcast.

16. What is the vulnerable time in clotted ALOHA if the frame transmission time is
10ms?

17. Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are
11001100, 10101010, 11110000 and 11000011. The checksum bits received by the
destination is

18. What is the port number of HTTP?

19. How many TCP connections FTP use?

20. Match the below pairs


(M) SMTP (1) Application layer
(N) BGP (2) Transport layer
(O) TCP (3) Data link layer
(P) PPP (4) Network layer
(5) Physical layer
21. Which among the following is maximum size of data passed by application layer on
TCP ?
(A) Any size
(B) 2^16 bytes-size of TCP header
(C) 2^16 bytes
(D) 1500 bytes

22. A HTML supportive browser on network client machine Q accesses a static HTML
webpage from a HTTP server S. If there is exactly one image in a static HTML page
and which is also at server S. Which among the following is correct option ? if there
is no caching.
(A) Q have to send at least 2 HTTP requests to S by a individual TCP connection.
(B) Q have to send at least 2 HTTP requests to S, but only using a single TCP
connection to server S is enough.
(C) Only a single HTTP request from Q to S is sufficient, and a single TCP
connection between Q and S is necessary for this task.
(D) A single HTTP request from Q to S is sufficient, and this task can be
done without any TCP connection between Q and S

23. UDP is used By ?


(A) HTTP
(B) Telnet
(C) DNS
(D) SMTP

24. Consider the following activities from m1 to m3 related to email.


m1:Sending an email from a mail client to mail server
m2:Downloading an email from mailbox server to a mail client
m3:Checking email in a web browser
Find the correct match for the Protocol used for each activity.
(A) m1:HTTP, m2:SMTP, m3:POP
(B) m1:SMTP, m2:FTP, m3:HTTP
(C) m1:SMTP, m2:POP, m3:HTTP
(D) m1:POP, m2:SMTP, m3:IMAP

25. If a browser send a request to remote server to access a web page then Which among
the following is the correct sequence to send the packet over the network from a host.
Assume that the host has just restarted.
(A) HTTP GET request, DNS query, TCP SYN
(B) DNS query, HTTP GET request, TCP SYN
(C) DNS query, TCP SYN, HTTP GET request
(D) TCP SYN, DNS query, HTTP GET request

26. Identify the correct order in which the following actions take place in an interaction
between a web browser and a web server.
The web browser requests a webpage using HTTP.
The web browser establishes a TCP connection with the web server.
The web server sends the requested webpage using HTTP.
The web browser resolves the domain name using DNS.

27. In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as

28. A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If
the output bit-string after stuffing is 01111100101, then the input bit-string is
29. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is:

31. Which one of the following is not a client-server application?


(A) Internet Chat
(B) Web Browsing
(C) Email
(D) ping

32. Match the following.

(P) SMTP (1) Application layer

(Q) BGP (2) Transport layer

(R) TCP (3) Data link layer

(S) PPP (4) Network layer

(5) Physical layer

33.Suppose two hosts are connected by a point-to-point link and they are configured to use
Stop-and-Wait protocol for reliable data transfer. Identify in which one of the following
scenarios, the utilization of the link is the lowest.
(A) Longer link length and lower transmission rate
(B) Longer link length and higher transmission rate
(C) Shorter link length and lower transmission rate
(D) Shorter link length and higher transmission rate

34. Let G(x) be the generator polynomial used for CRC checking. What is the condition that
should be satisfied by G(x) to detect odd number of bits in error?

35. Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The
propagation time is 25ms. Frames are to be transmitted into this link to maximally pack them
in transit (within the link). What is the minimum number of bits (i) that will be required to
represent the sequence numbers distinctly? Assume that no time gap needs to be given
between transmission of two frames.

36. In Ethernet when Manchester encoding is used, the bit rate is:
37.UDP is used By ?
(A) HTTP
(B) Telnet
(C) DNS
(D) SMTP
38. Consider the following activities from m1 to m3 related to email.
m1:Sending an email from a mail client to mail server
m2:Downloading an email from mailbox server to a mail client
m3:Checking email in a web browser
Find the correct match for the Protocol used for each activity.
(A) m1:HTTP, m2:SMTP, m3:POP
(B) m1:SMTP, m2:FTP, m3:HTTP
(C) m1:SMTP, m2:POP, m3:HTTP
(D) m1:POP, m2:SMTP, m3:IMAP

39. If a browser send a request to remote server to access a web page then Which among the
following is the correct sequence to send the packet over the network from a host. Assume
that the host has just restarted.
A) HTTP GET request, DNS query, TCP SYN
(B) DNS query, HTTP GET request, TCP SYN
(C) DNS query, TCP SYN, HTTP GET request
(D) TCP SYN, DNS query, HTTP GET request

40. Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for
this message using the divisor polynomial x5 + x4 + x2 + 1 is:

41.In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as

42. The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:
a. Data Link Layer and Bit synchronization
b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication

43. If a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second) over a
1 km(kilometer) cable with no repeaters and the minimum frame size required for this
network is 1250 bytes, what is the signal speed (km/sec) in the cable?

44. The maximum window size for data transmission using the selective reject protocol with
n-bit frame sequence numbers is

45. An Internet Service Provider(ISP) has the following chunk of CIDR-based IP addresses
available with it:245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B while retaining the remaining with itself.
Which of the following is a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22
(B) 245.248.128.0/21 and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21
(D) 245.248.136.0/22 and 245.248.132.0/21

46.. The protocol data unit(PDU) for the application layer in the Internet stack is
47. The address resolution protocol (ARP) is used for:

48.An organization has a class B network and wishes to form subnets for 64 departments.
The subnet mask would be:

49.Packets of the same session may be routed through different paths in:
(A) TCP, but not UDP (B) TCP and UDP
(C) UDP, but not TCP (D) Neither TCP nor UDP

50.Which of the following transport layer protocols is used to support electronic mail?
(A) SMTP (B) IP (C) TCP (D) UDP

51.An Internet Service Provider(ISP) has the following chunk of CIDR-based IP addresses
available with it:245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B while retaining the remaining with itself.
Which of the following is a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22 (B)245.248.128.0/21and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21 (D) 245.248.136.0/22 and
245.248.132.0/21

52.Consider a source computer (S) transmitting a file of size 106 bits to a destination
computer (D) over a network of two routers (R1 and R2) and three links (L1, L2, and L3). L1
connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of length
100km. Assume signals travel over each link at a speed of 10^8 meters per second. Assume
that the link bandwidth on each link is 1Mbps. Let the file be broken down into 1000 packets
each of size 1000 bits. Find the total sum of transmission and propagation delays in
transmitting the file from S to D.
(A) 1005ms (B) 1010ms (C) 3000ms (D) 3003ms

53. In one of the pairs of protocols given below, both the protocols can use multiple TCP
connections between the same client and the server. Which one is that?
A.HTTP, FTP B.HTTP, TELNET C. FTP, SMTP D.HTTP, SMTP

54. In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(A) does not increase (B) increases linearly
(C) increases quadratically (D) increases exponentially

55. Assume that source S and destination D are connected through two intermediate routers
labeled R. Determine how many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.

A) Network layer – 4 times and Data link layer – 4 times


B) Network layer – 4 times and Data link layer – 3 times
C) Network layer – 4 times and Data link layer – 6 times
D) Network layer – 2 times and Data link layer – 6 times
56. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
A) 6 B) 8 C) 4 D) None of the Above

57. Which of the following system calls results in the sending of SYN packets?
A) Socket B) Bind C) Listen D) Connect

58.A client process P needs to make a TCP connection to a server process S. Consider the
following situation: the server process S executes a socket(), a bind() and a listen() system
call in that order, following which it is preempted. Subsequently, the client process P
executes a socket() system call followed by connect() system call to connect to the server
process S. The server process has not executed any accept() system call. Which one of the
following events could take place?
A) connect () system call returns successfully
B) connect () system call blocks
C) connect () system call returns an error
D) connect () system call results in a core dump

59. There are n stations in a slotted LAN. Each station attempts to transmit with a probability
p in each time slot. What is the probability that ONLY one station transmits in a given time
slot?
A) (1-p)^(n-1) B) np(1-p)^(n-1) C) p(1-p)^(n-1) D) 1-(1-p)^(n-1)

60. The address of a class B host is to be split into subnets with a 6-bit subnet number. What
is the maximum number of subnets and the maximum number of hosts in each subnet?

A) 62 subnets and 262142 hosts B) 64 subnets and 262142 hosts


C) 62 subnets and 1022 hosts D) 64 subnets and 1024 hosts

61. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet?
A) 1022 B) 1023 C) 2046 D) 2047

62. In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each packet
contains a header of 3 bytes, then the optimum packet size is:

You might also like