Test 2 - Computer Network | Computer Science (CS)

Description: GATE Previous Year Topic Wise Computer Science(CS) | Computer Network
Number of Questions: 29
Created by:
Tags: Computer Network GATE CS
Attempted 0/29 Correct 0 Score 0

The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?

  1. 172.57.88.62 and 172.56.87.233

  2. 10.35.28.2 and 10.35.29.4

  3. 191.203.31.87 and 191.234.31.88

  4. 128.8.129.43 and 128.8.161.55


Correct Option: D
Explanation:

Which of the following functionalities must be implemented by a transport protocol over and above the network protocol?

  1. Recovery from packet losses

  2. Detection of duplicate packets

  3. Packet delivery in the correct order

  4. End to end connectivity


Correct Option: D
Explanation:

Transport protocols are mainly for providing end to end connections by making sockets. Recovery from packet loss & delivery in correct order, duplication is checked by Data link layer.

For which one of the following reasons does Internet Protocol (IP) use the time to-live (TTL) field in the IP datagram header?

  1. Ensure packets reach destination within that time

  2. Discard packets that reach later than that time

  3. Prevent packets from looping indefinitely

  4. Limit the time for which a packet gets queued in intermediate routers.


Correct Option: B
Explanation:

Which of the following assertions is FALSE about the Internet Protocol (IP)?

  1. It is possible for a computer to have multiple IP addresses

  2. IP packets from the same source to the same destination can take different routes in the network

  3. IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops

  4. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way


Correct Option: D
Explanation:

Internet protocol ensures that a packet is forwarded if it is unable to reach its destination within a given no. of hops. One computer can have multiple IP addresses also packets having same source & destination can take different routes. Source doesn't decide where to route the packet, but it is decided by the routing tables at intermediate routers.

A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 x 108 m/s. What is the minimum packet size that can be used on this network?

  1. 50 bytes

  2. 100 bytes

  3. 200 bytes

  4. None of the above


Correct Option: C
Explanation:

Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B is 128 kbps. What is the optimal window size that A should use?

  1. 20

  2. 40

  3. 160

  4. 320


Correct Option: B
Explanation:

Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for flow control. The send and receive window sizes are 5 packets each. Data packets (sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is 50 micro second. Acknowledgement packets (sent only from B to A) are very small and require negligible transmission time. The propagation delay over the link is 200 micro second. What is the maximum achievable throughput in this communication?

  1. 7.69 × 106 bps

  2. 11.11 × 106 bps

  3. 12.33 × 106 bps

  4. 15.00 x 106 bps


Correct Option: B
Explanation:

Data packet size = 1000 byte        Number of packets = 5        Total data = 5000        Transmission time = 50 micro second/packet        Propagation delay = 200 micro second        So for 5 packets = 50 * 5 = 250 micro second        Total time for 5 packets = 250 + 200 = 450 micro second        Rate = Data/time = 5000*1000000/450 = 11.11*1000000 bps

There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station transmits in a given time slot?

  1. np (1-p)n-1

  2. (1- p)n-1

  3. p (1- p)n-1

  4. 1- (1- p)n-1


Correct Option: A
Explanation:

Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for

  1. 12

  2. 14

  3. 16

  4. 18


Correct Option: A
Explanation:

The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet?

  1. 62 subnets and 262142 hosts

  2. 64 subnets and 262142 hosts

  3. 62 subnets and 1022 hosts

  4. 64 subnets and 1024 hosts


Correct Option: C
Explanation:

In a token ring network the transmission speed is107 bps and the propagation speed is 200 metres/$\mu$s. The 1-bit delay in this network is equivalent to:

  1. 500 metres of cable.

  2. 200 metres of cable.

  3. 20 metres of cable.

  4. 50 metres of cable.


Correct Option: C
Explanation:

The message 11001001 is to be transmitted using the CRC polynomial x3 + 1 to protect it from errors. The message that should be transmitted is:

  1. 11001001000

  2. 11001001011

  3. 11001010

  4. 110010010011


Correct Option: B
Explanation:

Consider the diagram shown below where a number of LANs are connected by (transparent) bridges. In order to avoid packets looping through circuits in the graph, the bridges organize themselves in a spanning tree. First, the root bridge is identified as the bridge with the least serial number. Next, the root sends out (one or more) data units to enable the setting up of the spanning tree of shortest paths from the root bridge to each bridge. Each bridge identifies a port (the root port) through which it will forward frames to the root bridge. Port conflicts are always resolved in favour of the port with the lower index value. When there is a possibility of multiple bridges forwarding to the same LAN (but not through the root port), ties are broken as follows: bridges closest to the root get preference and between such bridges, the one with the lowest serial number is preferred.

Consider the correct spanning tree for the previous question. Let host H1 send out a broadcast ping packet. Which of the following options represents the correct forwarding table on B3?


Correct Option: A
Explanation:

In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

  1. does not increase

  2. increases linearly

  3. increases quadratically

  4. increases exponentially


Correct Option: D
Explanation:

What is the maximum size of data that the application layer can pass on to the TCP layer below?

  1. Any size

  2. 216 bytes

  3. 216 bytes-size of TCP header

  4. 1500 bytes


Correct Option: B
Explanation:

The distance between two stations $M$ and $N$ is $L$ kilometers. All frames are $K$ bits long. The propagation delay per kilometer is $t$ seconds. Let $R$ bits/second be the channel capacity. Assuming that the processing delay is negligible, the $\text{minimum}$ number of bits for the sequence number field in a frame for maximum utilization, when the $\text{sliding window protocol}$ is used, is:

  1. $\lceil \log_2 \frac{2LtR +2K}{K} \rceil$

  2. $\lceil \log_2 \frac{2LtR}{K} \rceil$

  3. $\lceil \log_2 \frac{2LtR +K}{K} \rceil$

  4. $\lceil \log_2 \frac{2LtR +2K}{2K} \rceil$


Correct Option: B
Explanation:

If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?

  1. 1022

  2. 1023

  3. 2046

  4. 2047


Correct Option: C
Explanation:

A client process P needs to make a TCP connection to a server process S. Consider the following situation: the server process S executes a socket (), a bind () and a listen () system call in that order, following which it is preempted. Subsequently, the client process P executes a socket () system call followed by connect () system call to connect to the server process S. The server process has not executed any accept () system call. Which one of the following events could take place?

  1. connect () system call returns successfully

  2. connect () system call blocks

  3. connect () system call returns an error

  4. connect () system call results in a core dump


Correct Option: C
Explanation:

Consider the diagram shown below where a number of LANs are connected by (transparent) bridges. In order to avoid packets looping through circuits in the graph, the bridges organize themselves in a spanning tree. First, the root bridge is identified as the bridge with the least serial number. Next, the root sends out (one or more) data units to enable the setting up of the spanning tree of shortest paths from the root bridge to each bridge. Each bridge identifies a port (the root port) through which it will forward frames to the root bridge. Port conflicts are always resolved in favour of the port with the lower index value. When there is a possibility of multiple bridges forwarding to the same LAN (but not through the root port), ties are broken as follows: bridges closest to the root get preference and between such bridges, the one with the lowest serial number is preferred.

For the given connection of LANs by bridges, which one of the following choices represents the depth first traversal of the spanning tree of bridges?

  1. B1, B5, B3, B4, B2

  2. B1, B3, B5, B2, B4

  3. B1, B5, B2, B3, B4

  4. B1, B3, B4, B5, B2


Correct Option: C
Explanation:

Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error?

  1. G(x) contains more than two terms

  2. G(x) does not divide 1 + xk, for any k not exceeding the frame length

  3. 1 + x is a factor of G(x)

  4. G(x) has an odd number of terms.


Correct Option: C
Explanation:

While opening a TCP connection, the initial sequence number is to be derived using a time-of-day (ToD) clock that keeps running even when the host is down. The low order 32 bits of the counter of the ToD clock is to be used for the initial sequence numbers. The clock counter increments once per millisecond. The maximum packet lifetime is given to be 64s. Which one of the choices given below is closest to the minimum permissible rate at which sequence numbers used for packets of a connection can increase?

  1. 0.015/s

  2. 0.064/s

  3. 0.135/s

  4. 0.327/s


Correct Option: B
Explanation:

In Ethernet when Manchester encoding is used, the bit rate is:

  1. Half the baud rate

  2. Twice the baud rate.

  3. Same as the baud rate.

  4. None of the above


Correct Option: B
Explanation:

Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask 255.255.192.0. Which one of the following statements is true?

  1. C1 and C2 both assume they are on the same network

  2. C2 assumes C1 is on same network, but C1 assumes C2 is on a different network

  3. C1 assumes C2 is on same network, but C2 assumes C1 is on a different network

  4. C1 and C2 both assume they are on different networks.


Correct Option: C
Explanation:

A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?

  1. 1.6 seconds

  2. 2 seconds

  3. 5 seconds

  4. 8 seconds


Correct Option: B
Explanation:

Which one of the following uses UDP as the transport protocol?

  1. HTTP

  2. Telnet

  3. DNS

  4. SMTP


Correct Option: C
Explanation:

Frames of 1000 bits are sent over a 106 bps duplex link between two hosts. The propagation time is 25 ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).

What is the minimum number of bits (l) that will be required to represent the sequence numbers distinctly? Assume that no time gap needs to be given between transmission of two frames.

  1. l=2

  2. l=3

  3. l=4

  4. l=5


Correct Option: D
Explanation:

Match the following:

(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer
  1. P - 2, Q - 1, R - 3, S - 5

  2. P - 1, Q - 4, R - 2, S - 3

  3. P - 1, Q - 4, R - 2, S - 5

  4. P - 2, Q - 4, R - 1, S - 3


Correct Option: B
Explanation:

Frames of 1000 bits are sent over a 106 bps duplex link between two hosts. The propagation time is 25 ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).

Suppose that the sliding window protocol is used with the sender window size of 2l, where l is the number of bits identified in the earlier part and acknowledgements are always piggy backed. After sending 2l frames, what is the minimum time the sender will have to wait before starting transmission of the next frame? (Identify the closest choice ignoring the frame processing time.)

  1. 16 ms

  2. 18 ms

  3. 20 ms

  4. 22 ms


Correct Option: B
Explanation:

In the RSA public key cryptosystem, the private and public keys are $(e, n)$ and $(d, n)$ respectively, where $n=p \times q$ and $p$ and $q$ are large primes. Besides, $n$ is public and $p$ and $q$ are private. Let $M$ be an integer such that $0

  1. I and II

  2. I and III

  3. II and IV

  4. III and IV


Correct Option: B
Explanation:

- Hide questions