Gate Question in CN Downloaded From Internet Sources
Gate Question in CN Downloaded From Internet Sources
The network uses a Distance Vector Routing Distance Vector Routing protocol.
Once the routes have stabilized, the distance vectors at different nodes are as
following.
N1:(0, 1, 7, 8, 4) N2:(1, 0, 6, 7, 3) N3:(7, 6, 0, 2, 6)
N4:(8, 7, 2, 0, 4) N5:(4, 3, 6, 4, 0)
Each distance vector is the distance of the best-known path at that instance to nodes,
N1 to N5, where the distance to itself is 0. Also, all links are symmetric and the cost
is identical in both directions. In each round, all nodes exchange their distance
vectors with their respective neighbours. Then all nodes update their distance
vectors. In between two rounds, any change in cost of a link will cause the two
incident nodes to change only that entry in their distance vectors.
2. The cost of link N2-N3 reduces to 2 (in both directions). After the next round of
update what will be the new distance vector at node, N3?
3. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
4. The maximum window size for data transmission using the selective reject protocol
with n-bit frame sequence numbers is:
5. In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each
packet contains a header of 3 bytes, then the optimum packet size is:
6. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is:
7. In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as
i.
8. The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:
a. Data Link Layer and Bit synchronization
b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication
10. The protocol data unit (PDU) for the application layer in the Internet stack is
12. If a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second)
over a 1 km(kilometer) cable with no repeaters and the minimum frame size required
for this network is 1250 bytes, what is the signal speed (km/sec) in the cable?
13. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is______
14. A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If
the output bit-string after stuffing is 01111100101, then the input bit-string is
16. What is the vulnerable time in clotted ALOHA if the frame transmission time is
10ms?
17. Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are
11001100, 10101010, 11110000 and 11000011. The checksum bits received by the
destination is
22. A HTML supportive browser on network client machine Q accesses a static HTML
webpage from a HTTP server S. If there is exactly one image in a static HTML page
and which is also at server S. Which among the following is correct option ? if there
is no caching.
(A) Q have to send at least 2 HTTP requests to S by a individual TCP connection.
(B) Q have to send at least 2 HTTP requests to S, but only using a single TCP
connection to server S is enough.
(C) Only a single HTTP request from Q to S is sufficient, and a single TCP
connection between Q and S is necessary for this task.
(D) A single HTTP request from Q to S is sufficient, and this task can be
done without any TCP connection between Q and S
25. If a browser send a request to remote server to access a web page then Which among
the following is the correct sequence to send the packet over the network from a host.
Assume that the host has just restarted.
(A) HTTP GET request, DNS query, TCP SYN
(B) DNS query, HTTP GET request, TCP SYN
(C) DNS query, TCP SYN, HTTP GET request
(D) TCP SYN, DNS query, HTTP GET request
26. Identify the correct order in which the following actions take place in an interaction
between a web browser and a web server.
The web browser requests a webpage using HTTP.
The web browser establishes a TCP connection with the web server.
The web server sends the requested webpage using HTTP.
The web browser resolves the domain name using DNS.
27. In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as
28. A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If
the output bit-string after stuffing is 01111100101, then the input bit-string is
29. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. The message that should be transmitted is:
33.Suppose two hosts are connected by a point-to-point link and they are configured to use
Stop-and-Wait protocol for reliable data transfer. Identify in which one of the following
scenarios, the utilization of the link is the lowest.
(A) Longer link length and lower transmission rate
(B) Longer link length and higher transmission rate
(C) Shorter link length and lower transmission rate
(D) Shorter link length and higher transmission rate
34. Let G(x) be the generator polynomial used for CRC checking. What is the condition that
should be satisfied by G(x) to detect odd number of bits in error?
35. Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The
propagation time is 25ms. Frames are to be transmitted into this link to maximally pack them
in transit (within the link). What is the minimum number of bits (i) that will be required to
represent the sequence numbers distinctly? Assume that no time gap needs to be given
between transmission of two frames.
36. In Ethernet when Manchester encoding is used, the bit rate is:
37.UDP is used By ?
(A) HTTP
(B) Telnet
(C) DNS
(D) SMTP
38. Consider the following activities from m1 to m3 related to email.
m1:Sending an email from a mail client to mail server
m2:Downloading an email from mailbox server to a mail client
m3:Checking email in a web browser
Find the correct match for the Protocol used for each activity.
(A) m1:HTTP, m2:SMTP, m3:POP
(B) m1:SMTP, m2:FTP, m3:HTTP
(C) m1:SMTP, m2:POP, m3:HTTP
(D) m1:POP, m2:SMTP, m3:IMAP
39. If a browser send a request to remote server to access a web page then Which among the
following is the correct sequence to send the packet over the network from a host. Assume
that the host has just restarted.
A) HTTP GET request, DNS query, TCP SYN
(B) DNS query, HTTP GET request, TCP SYN
(C) DNS query, TCP SYN, HTTP GET request
(D) TCP SYN, DNS query, HTTP GET request
40. Consider the following message M = 1010001101. The cyclic redundancy check (CRC) for
this message using the divisor polynomial x5 + x4 + x2 + 1 is:
41.In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit
stuffing is employed, the transmitter sends the data sequence 01110110 as
42. The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:
a. Data Link Layer and Bit synchronization
b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication
43. If a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second) over a
1 km(kilometer) cable with no repeaters and the minimum frame size required for this
network is 1250 bytes, what is the signal speed (km/sec) in the cable?
44. The maximum window size for data transmission using the selective reject protocol with
n-bit frame sequence numbers is
45. An Internet Service Provider(ISP) has the following chunk of CIDR-based IP addresses
available with it:245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B while retaining the remaining with itself.
Which of the following is a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22
(B) 245.248.128.0/21 and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21
(D) 245.248.136.0/22 and 245.248.132.0/21
46.. The protocol data unit(PDU) for the application layer in the Internet stack is
47. The address resolution protocol (ARP) is used for:
48.An organization has a class B network and wishes to form subnets for 64 departments.
The subnet mask would be:
49.Packets of the same session may be routed through different paths in:
(A) TCP, but not UDP (B) TCP and UDP
(C) UDP, but not TCP (D) Neither TCP nor UDP
50.Which of the following transport layer protocols is used to support electronic mail?
(A) SMTP (B) IP (C) TCP (D) UDP
51.An Internet Service Provider(ISP) has the following chunk of CIDR-based IP addresses
available with it:245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B while retaining the remaining with itself.
Which of the following is a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22 (B)245.248.128.0/21and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21 (D) 245.248.136.0/22 and
245.248.132.0/21
52.Consider a source computer (S) transmitting a file of size 106 bits to a destination
computer (D) over a network of two routers (R1 and R2) and three links (L1, L2, and L3). L1
connects S to R1; L2 connects R1 to R2; and L3 connects R2 to D. Let each link be of length
100km. Assume signals travel over each link at a speed of 10^8 meters per second. Assume
that the link bandwidth on each link is 1Mbps. Let the file be broken down into 1000 packets
each of size 1000 bits. Find the total sum of transmission and propagation delays in
transmitting the file from S to D.
(A) 1005ms (B) 1010ms (C) 3000ms (D) 3003ms
53. In one of the pairs of protocols given below, both the protocols can use multiple TCP
connections between the same client and the server. Which one is that?
A.HTTP, FTP B.HTTP, TELNET C. FTP, SMTP D.HTTP, SMTP
54. In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(A) does not increase (B) increases linearly
(C) increases quadratically (D) increases exponentially
55. Assume that source S and destination D are connected through two intermediate routers
labeled R. Determine how many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.
57. Which of the following system calls results in the sending of SYN packets?
A) Socket B) Bind C) Listen D) Connect
58.A client process P needs to make a TCP connection to a server process S. Consider the
following situation: the server process S executes a socket(), a bind() and a listen() system
call in that order, following which it is preempted. Subsequently, the client process P
executes a socket() system call followed by connect() system call to connect to the server
process S. The server process has not executed any accept() system call. Which one of the
following events could take place?
A) connect () system call returns successfully
B) connect () system call blocks
C) connect () system call returns an error
D) connect () system call results in a core dump
59. There are n stations in a slotted LAN. Each station attempts to transmit with a probability
p in each time slot. What is the probability that ONLY one station transmits in a given time
slot?
A) (1-p)^(n-1) B) np(1-p)^(n-1) C) p(1-p)^(n-1) D) 1-(1-p)^(n-1)
60. The address of a class B host is to be split into subnets with a 6-bit subnet number. What
is the maximum number of subnets and the maximum number of hosts in each subnet?
61. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet?
A) 1022 B) 1023 C) 2046 D) 2047
62. In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each packet
contains a header of 3 bytes, then the optimum packet size is: