0

Computer Networks

Description: gate Computer Networks
Number of Questions: 15
Created by:
Tags: gate Computer Networks
Attempted 0/15 Correct 0 Score 0

Which of the following is not a function of data link layer?

  1. Flow control

  2. Error control

  3. Congestion control

  4. Framing

  5. Provides services to the network layer


Correct Option: C
Explanation:

It is the major function of network layer.

What is the length of burst error if the sender sent 10100011 and corresponding receiver received 10111001?

  1. 1

  2. 2

  3. 3

  4. 4

  5. 5


Correct Option: D
Explanation:

Length of the burst error is measured from the first bit corrupted to the last corrupted bit.

Public key encryption makes use of which of the following?

  1. One key

  2. Two keys

  3. Hash function

  4. Digital signature

  5. No key


Correct Option: B
Explanation:

Public key encryption uses two key one public key and second private key.

A Go-Back-N ARQ uses a window of size 7. How many bits are needed to define the sequence number?

  1. 3

  2. 7

  3. 8

  4. 4

  5. 14


Correct Option: A
Explanation:

window size=2^n-1 where,window size=7n= bits needed to define the sequence numberso,7=2^n-18=2^nn=3

Which of the following is an end to end layer?

  1. Data link layer

  2. Transport layer

  3. Session layer

  4. Network layer

  5. Physical layer


Correct Option: B
Explanation:

It is a true end to end layer from source to destination.In other words, a program on the source machine carries on a conversation with a similar program on the destination machine.

Which of the following is a class A host address?

  1. 130.215.8.145

  2. 198.70.51.10

  3. 130.215

  4. 128.10.3.8

  5. 36.56.0.10


Correct Option: E
Explanation:

It is a class A host address.Range of class A host address =1.0.0.0 to 127.255.255.255

Which of the following describes the drawback of leaky bucket algorithm solved in token bucket algorithm?

  1. Regulated packet flow

  2. Traffic shaping

  3. Congestion control

  4. Discards packets when the bucket fills up

  5. Rigid output pattern


Correct Option: D
Explanation:

Leaky bucket discards packets when bucket fills up whereas token bucket discards the tokens not the packets hence packet is not lost in case of token bucket.

Which of the following protocols is used to map the internet addresses to physical addresses at the network layer?

  1. ARP

  2. Reverse ARP

  3. DHCP

  4. ICMP

  5. Gateway


Correct Option: A
Explanation:

It is a network layer protocol known as address resolution protocol used to map the internet addresses to physical addresses.

A certain population of ALOHA users manages to generate 100 request/sec. If the time slotted in units of 20 msec, find the channel load.

  1. 2.25

  2. 2

  3. 1.75

  4. 0.2

  5. 1.25


Correct Option: B
Explanation:

No.of request=100/sec slot time=20 msec no of slots per second=1/20 msec                                           =50 so, channel load=(No of request/sec)/(No.of slots/sec)                                =100/50                                 =2

Given IP address 128.8.129.43 and the subnet mask 255.255.31.0. What is the subnet address?

  1. 128.8.129.0

  2. 128.8.1.0

  3. 128.0.0.0

  4. 128.8.1.1

  5. 128.8.55.0


Correct Option: B
Explanation:

Changing the address into binary form and bit wise anding the ip address with mask address will give a subnet address.IP address 10000000.00001000.10000001.00101001 bit-wising anding with mask 11111111.11111111.00011111.00000000 will give subnet address 1000000.00001000.00000001.00000000(128.8.1.0)

What is the latency for a 5 MB message, if a bandwidth of the network is 1 Mbps. Assume that the distance between the sender and the receiver is 12,000 km and the light travels at 2.4 X 108 m/sec.

  1. 40.05 sec

  2. 42 sec

  3. 39.95 sec

  4. 41 sec

  5. 40 sec


Correct Option: A
Explanation:

Latency= Propagation time + Transmission timePropagation Time=distance/propagation speedi.e propagation time=12000 * 1000/2.4 * 10^8 =0.05 secTransmission time=Message Size/Bandwidthi.e. transmission time=5*10^6*8/1*10^6 =40 sechence, latency=.05+40 =40.05sec

File transfer protocol(ftp) uses which port number for data transfer?

  1. 25

  2. 110

  3. 20

  4. 21

  5. 23


Correct Option: C
Explanation:

ftp uses 2 port number port number 20 for data transfer and port 21 for control information.

If there are n devices (nodes) in a network,what is the number of cable links required for a mesh and a star topology respectively.

  1. n - 1, n (n - 1)/2

  2. n, n - 1

  3. n - 1, n

  4. n (n - 1)/2, n - 1

  5. n, n + 1


Correct Option: D
Explanation:

For a mesh ,it is a case of complete graph with n verticeshence links=n(n-1)/2 For star n-1 links are needed since a single central host is connected to all host.

Which of the following is an application layer protocol?

  1. ICMP

  2. UDP

  3. IP

  4. TCP

  5. TELNET


Correct Option: E
Explanation:

It is an application layer protocol.

Error Detection at Data link layer is achieved by

  1. Character Stuffing

  2. Bit Stuffing

  3. Encoding

  4. Cyclic Redundancy Check

  5. Character Count


Correct Option: D
Explanation:

It is one of the error detection method used at data link layer.

- Hide questions