Computer Networks
Description: gate Computer Networks | |
Number of Questions: 15 | |
Created by: Sangita Pandit | |
Tags: gate Computer Networks |
Which of the following is not a function of data link layer?
What is the length of burst error if the sender sent 10100011 and corresponding receiver received 10111001?
Public key encryption makes use of which of the following?
A Go-Back-N ARQ uses a window of size 7. How many bits are needed to define the sequence number?
Which of the following is an end to end layer?
Which of the following is a class A host address?
Which of the following describes the drawback of leaky bucket algorithm solved in token bucket algorithm?
Which of the following protocols is used to map the internet addresses to physical addresses at the network layer?
A certain population of ALOHA users manages to generate 100 request/sec. If the time slotted in units of 20 msec, find the channel load.
Given IP address 128.8.129.43 and the subnet mask 255.255.31.0. What is the subnet address?
What is the latency for a 5 MB message, if a bandwidth of the network is 1 Mbps. Assume that the distance between the sender and the receiver is 12,000 km and the light travels at 2.4 X 108 m/sec.
File transfer protocol(ftp) uses which port number for data transfer?
If there are n devices (nodes) in a network,what is the number of cable links required for a mesh and a star topology respectively.
Which of the following is an application layer protocol?
Error Detection at Data link layer is achieved by