Information contained in this book has been obtained by authors, from sources believes to be reliable. However,
neither Nodia nor its authors guarantee the accuracy or completeness of any information herein, and Nodia nor its
authors shall be responsible for any error, omissions, or damages arising out of use of this information. This book
is published with the understanding that Nodia and its authors are supplying information but are not attempting
to render engineering or other professional services.
B-8, Dhanshree Tower Ist, Central Spine, Vidyadhar Nagar, Jaipur 302039
Ph : +91 - 141 - 2101150
www.nodia.co.in
email : enquiry@nodia.co.in
Q. 1
GATE 2003
Sol. 1
Which of the following assertions is false about the internet Protocol (IP) ?
(A) It is possible for a computer to have multiple IP addresses
(B) IP packets from the same source to the same destination can take different
routes in the network
(C) IP ensures that a packet is discarded if it is unable to reach its destination
within a given number of hopes
(D) The packet source cannot set the route of an outgoing packets; the route is
determined only by the routing tables in the routers on the way.
GATE 2003
Sol. 2
PA
Q. 2
IA
&
COMPUTER NETWORK
Sol. 3
n
i
.
o
c
The subnet mask for a particular network is 255.255.31.0 Which of the following
pairs of IP addresses could belong to this network ?
(A) 172.57.88.62 and 172.56.87.23.2
(B) 10.35.28.2 and 10.35.29.4
(C) 191.203.31.87 and 191.234.31.88
(D) 128.8.129.43 and 128.8.161.55
.
a
i
d
o
n
Q. 4
GATE 2003
.
w
.
w
.
a
i
d
o
n
n
i
.
o
c
A 2 km long brodcast LAN has 107 bps bandwidth and uses CSMA/CD. The
signal travels along the wire at 2 # 108 m/s. What is the minimum packet size
that can be used on this network ?
(A) 50 bytes
(B) 100 bytes
(C) 200 bytes
(D) None of the above
Sol. 4
Q. 5
Host A is sending data to host B over a full duplex link. A and B are using the
sliding window protocol for flow control. The send and receive window sizes are
5 packets each. Data packets (sent only from A to B) are all 1000 bytes long
GATE 2003
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
n
i
.
o
c
Sol. 5
.
a
i
d
o
n
.
w
= 1000 bytes
=5
= 5 # 1000 = 5000 bytes.
= 200 s
= 50 s /Packet.
= 50 # 5 = 250 s
= 250 + 200 = 450 s
5000
Throughput (Rate) = Data =
= 11.11 # 106
Time
450 # 10 6
Group I
P.
Q. 6
GATE 2004
Group II
Q. Network layer
2.
Encodes/decodes
transmission
R. Transport layer
3.
4.
data
for
physical
.
a
i
d
o
n
.
w
n
i
.
o
c
1.
Q. 7
GATE 2004
Which of the following is NOT true with respective to a transparent bridge and
a router ?
(A) Both bridge and router selectively farward data packets
(B) A bridge uses IP addresses while a router uses MAC addresses
COMPUTER NETWORK
Q. 8
GATE 2004
Sol. 8
GATE 2004
.
a
i
d
How many 8-bit characters can be transmitted per second over a 9600 baud serial
communication link using asynchronous mode of transmission with one start bit,
eight data bits, and one parity bit ?
(A) 600
(B) 800
(C) 876
(D) 1200
o
n
.
w
Q. 9
n
i
.
o
c
.
a
i
d
o
n
n
i
.
o
c
Sol. 9
Q. 10
GATE 2004
Destination
.
w
Subnet Mask
Interface
128.75.43.0
255.255.255.0
Eth 0
128.75.43.0
255.255.255.128
Eth 1
192.12.17.5
255.255.255.255
Eth 3
default
Eth 2
*Shipping Free*
*Maximum Discount*
Sol. 10
COMPUTER NETWORK
n
i
.
o
c
.
a
i
d
Since it matches with both the entries, choose longest length subnet mask hence,
this packet is forwarded through Eth1. Now we perform the AND operation for
the another IP 192.12.17.10 and find that there is no match with any destination,
hence packet is forwarded to default destination that is Eth2.
o
n
.
w
n
i
.
o
c
B : 100 bytes
C : 1000 bytes
The network A and B are connected through a 1 Mbps link, while B and C are
connected by a 512 Kbps link (bps=bits per second).
Q. 11
GATE 2004
Sol. 11
i
d
o
n
.
w
.
a
Assuming that the packets are correctly delivered, how many bytes, including
headers, are delivered to the IP layer at the destination for one application
message, in the best case ? Consider only data packets.
(A) 200
(B) 220
(C) 240
(D) 260
COMPUTER NETWORK
Sol. 12
Q. 13
GATE 2005
n
i
.
o
c
.
a
Sol. 13
Q. 14
GATE 2005
i
d
o
n
.
w
Sol. 14
Q. 15
The maximum window size for data transmission using the selective reject protocol
with n -bit frame sequence numbers is
(A) 2n
(B) 2n 1
n2
(C) 2n 1
(D) 2
GATE 2005
n
i
.
o
c
.
a
Sol. 15
Q. 16
In a network of LANs connected by bridges, packets are set from one LAN
to another through intermediate bridges. Since more than one path may exist
between two LANs, packets may have to be routed through multiple bridges.
Why is the spanning tree algorithm used for bridge-routing ?
(A) For shortest path routing between LANs
(B) For avoiding loops in the routing paths
(C) For fault tolerance
(D) For minimizing collisions
GATE 2005
.
w
o
n
i
d
Sol. 16
Q. 17
GATE 2005
Sol. 17
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
6 bits (26 = 64 ) from host bits. Then the subnet mask will be 255.255.252.0 or
/22 (16 bits of network ID + 6 bits of subnets).
Q. 18
GATE 2005
Sol. 18
n
i
.
o
c
.
a
i
d
o
n
n ^x 3h = 24
or
n = 24
x3
For optimum packet size, number of packets n must be minimum. Among given
options, for a packet size x = 9 , we have number of packets
n = 24 = 4
93
So, optimum packet size is 6 byte. We can also check that for option, (A), (B),
(C) number of packets transmitted is be more than 4 and hence network traffic
is more.
Q. 19
GATE 2005
Sol. 19
.
w
n
i
.
o
c
Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit
jamming signal is 46.4 s . The minimum frame size is :
(A) 94
(B) 416
(C) 464
(D) 512
.
a
i
d
o
n
.
w
For which one of the following reason: does Internet Protocol (IP) use the timeto-live (TTL) field in the IP datagram header?
(A) Ensure packets reach destination within that time
(B) Discard packets that reach later than that time
(C) Prevent packets from looping indefinitely
(D) Limit the time for which a packet gets queued in intermediate routers
Sol. 20
Q. 21
GATE 2006
COMPUTER NETWORK
the bottleneck bankwidth on the path between A and B is 128 kbps. What is the
optimal window size that A should use ?
(A) 20
(B) 40
(C) 160
(D) 320
Sol. 21
n
i
.
o
c
Q. 22
GATE 2006
i
d
o
n
Sol. 22
.
a
.
w
n
i
.
o
c
.
w
o
n
i
d
.
a
We can see that network ID are not same. We can see that network ID (starting
address of block) of computer C1s network is 203.197.0.0. Subnet mask is /17.
To find the last address, we keep the 17, leftmost bits and set the 15 rightmost
bits all to 1s. The last address in this block will be 11001011.11000101.10000000
.00000000 or 203.197.128.0. Since IP address of C2 falls under this range, so C1
assumes that C2 is on same network.
Now we find that the network ID (starting address of block) of computer
C2s network is 203.197.64.0. Subnet mask is /18. To find the last address,
we keep the 18, leftmost bits and set the 14 rightmost bits all to 1s. The
last address in this block will be 11001011.11000101.11000000.00000000 or
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
Sol. 23
.
a
i
d
o
n
Sender
Time
n
i
.
o
c
.
w
Packet no.
Receiver
Time
Packet status
ACK
ACK
ACK
ACK
Lost
Discard
5 resend
ACK
10
10
11
11
12
9 resend
4
5
6
7
w
4
Total Time = 12
Hence (A) is correct option.
o
n
.
w
ACK
.
a
i
d
12
n
i
.
o
c
ACK
ACK
Lost
Lost
Common Data For Q.Statement for Linked Answer Questions 24 and 25:
Consider the diagram shown below where a number of LANs are connected by
(transparent) bridges. In order to avoid packets looping through circuits in the graph,
the bridges organize themselves in a spanning tree. First, the root bridge is identified
as the bridge with the least serial number. Next, the root sends out (one or more) data
units to enable the setting up of the spanning tree of shortest paths from the root bridge
to each bridge.
Each bridge identifies a port (the root port) through which it will forward
frames to the root bridge. Port conflicts are always resolved in favour of the
port with the lower index value. When there is a possibility of multiple bridges
forwarding to the same LAN (but not through the root port), ties are broken as
follows: bridges closest to the root get preference and between such bridges, the
one with the lowest serial number is preferred.
Q. 24
GATE 2006
Sol. 24
COMPUTER NETWORK
n
i
.
o
c
.
a
i
d
o
n
For the given connection of LANs by bridges, which one of the following choices
represents the depth first traversal of the a spanning tree of bridges?
(A) B1,B5,B3,B4,B2
(B) B1,B3,B5,B2,B4
(C) B1,B5,B2,B3,B4
(D) B1.B3.B4.B5.B2
.
w
.
w
.
a
i
d
o
n
n
i
.
o
c
In spanning tree every bridge lies in the tree, but no cycles (or loops) are formed,
hence depth first traversal is B1, B5, B2, B 3, B 4 .
Q. 25
GATE 2006
Consider the correct spanning tree for the previous question. Let host H1 send
out a broadcast ping packet. Which of the following options represents the correct
for forwarding table on B3 ?
(A)
(B)
Hosts
Ports
Hosts
Port
H1,H2,H3,H4
H1, H2
H5,H6,H9,H10
H3, H4
H7,H8,H11,H12
H5, H6
H11, H12
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
(D)
(C)
Sol. 25
Hosts
Port
Hosts
Port
n
i
.
o
c
.
a
i
d
o
n
.
w
GATE 2007
Sol. 26
Sol. 26
In Manchester encoding each bit is described by 2 voltage levels. The bit rate is
the half the baud rate.
Q. 27
Q. 26
GATE 2007
Sol. 27
Q. 28
GATE 2007
n
i
.
o
c
i
d
o
n
.
w
.
a
There are n stations in a slotted LAN. Each station attempts to transmit with a
probability p in each time slot. What is the probability that ONLY one station
transmits in a given time slot?
(A) np (1 p) n 1
(B) (1 p) n 1
(C) p (1 p) n 1
(D) 1 (1 p) n 1
Sol. 28
Q. 29
In a token ring network the transmission speed is 10 bps and the propagation
speed is 200 metres/ s . The 1-bit delay in this network is equivalent to;
(A) 500 metres of cable
(B) 200 metres of cable
GATE 2007
COMPUTER NETWORK
Q. 30
GATE 2007
Sol. 30
Q. 31
GATE 2007
Sol. 31
n
i
.
o
c
.
a
i
d
The address of a class B host is to be split into subnets with a 6-bit subnet
number. What is the maximum number of subnets and the maximum number of
hosts in each subnet?
(A) 62 subnets and 262142 hosts
(B) 64 subnets and 262142 hosts
(C) 62 subnets and 1022 hosts
(D) 64 subnets and 1024 hosts
o
n
.
w
n
i
.
o
c
i
d
.
a
.
w
o
n
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
n
i
.
o
c
.
a
i
d
o
n
The 3 bit remainder is 011, So we transmit the original message with this remainder
appended, or 11001001011.
Q. 32
GATE 2007
Sol. 32
.
w
The distance between two stations M and N is L kilo metres. All frames are K
bits long. The propagation delay per kilo metre is t seconds Let R bits/second be
the channel capacity. Assuming that processing delay is negligible, the minimum
number of bits for the sequence number field in a frame for maximum utilization,
when the sliding window protocol is used, is;
(B) :log2 2LtR D
(A) :log2 2LtR + 2K D
K
K
.
w
.
a
i
d
o
n
n
i
.
o
c
Q. 33
GATE 2007
1. Application layer
2. Transport layer
3. Data link layer
S.
COMPUTER NETWORK
PPP
4. Network layer
5. Physical layer
(A) P-2,Q-1,R-3,S-5
(B) P-1,Q-4,R-2,S-3
(C) P-1,Q-4,R-2,S-5
(D) P-2,Q-4,R-1,S-3
Sol. 33
Q. 34
GATE 2008
n
i
.
o
c
.
a
i
d
o
n
.
w
What is the maximum size of data that the application layer can pass on to the
TCP layer below?
(A) Any size
(B) 216 bytes size of TCP header
(C) 2 bytes
16
n
i
.
o
c
Sol. 34
Q. 35
In the slow start phase of TCP congesting control algorithm, the size of the
congestion window
(A) Does not increase
(B) Increases linearly
(C) Increases quadratically
(D) Increases exponentially
GATE 2008
.
w
o
n
i
d
.
a
Sol. 35
Q. 36
GATE 2008
Sol. 36
*Shipping Free*
*Maximum Discount*
Q. 37
GATE 2008
Sol. 37
Q. 38
GATE 2008
n
i
.
o
c
.
a
i
d
o
n
.
w
C + pS = MS
or
S = C = 16 = 2 sec
M p 10 2
A client process P needs to make a TCP connection to a server Process S .
Consider the following situation; the server process S executes a socket (), a
bind() and a listen () system call in that order, following which it is preempted.
Subsequently, the client Process P executes a socket () system call followed by
connect () system call to connect to the server process S . The server process has
not executed any accept() system call. Which one of the following events could
take place?
(A) connect ( ) system call returns successfully
(B) connect ( ) system call blocks
(C) connect ( ) system call returns an error
(D) connect ( ) system call results in a core dump
Sol. 38
COMPUTER NETWORK
o
n
.
w
.
a
i
d
n
i
.
o
c
Since accept () call is not executed then connect () gets no response for a time
stamp to wait and then return no response server error.
Q. 39
GATE 2009
In the RSA public key cryptosystem, the private and the public keys are (e , n )
and (d , n ) respectively, where n = p) and p and q are large primes. Besides, n
is public and p and q are private. Let M be an integer such that 0 < M < n and
(n) = (p 1) (q 1). Now consider the following equations.
I. M = Me mod n
M= M
II ed /
III ed /
IV M = Me
COMPUTER NETWORK
n
n
n
n
M= M
n
Which of the above equations correctly represent RSA cryptosystem ?
(A) I and II
(B) I and III
(C) II and IV
(D) III and IV
n
i
.
o
c
Sol. 39
Q. 40
GATE 2009
Sol. 40
Q. 41
GATE 2009
.
a
i
d
o
n
.
w
n
i
.
o
c
i
d
.
a
.
w
o
n
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
n
i
.
o
c
.
a
Frames of 1000 bits are sent over a 106 bps duplex link between two hosts. The
propagation time is 25 ms. Frames are to be transmitted into to maximally pack
them in transit (within the link).
Q. 42
GATE 2009
Sol. 42
i
d
o
n
What is the minimum number of bits (l) that will be required to represent the
sequence numbers distinctly ? Assume that no time gap needs to be given between
transmission of two frames.
(A) l = 2
(B) l =
(C) l =
(D) l = 5
.
w
n
i
.
o
c
Propagation time = 25 ms
Total data = 106 # 25 # 10 3 = 25 kb
Frame size = 1000 bits
No. of frames (N ) = 25 # 1000 = 25 = 25
1000
So minium number of bits required to represent 25 frames distinctly is l = 5 bits.
Q. 43
GATE 2009
.
a
i
d
Suppose that the sliding window protocol is used with the sender window size of 2l
, where l is the number of bits identified in the earlier part and acknowledgements
are always piggy backed. After sending 2l frames, what is the minimum time the
sender will have to wait before starting transmission of the next frame ? (Identify
the closest choice ignoring the frame processing time)
(A) 16 ms
(B) 18 ms
(C) 20 ms
(D) 22 ms
.
w
o
n
Sol. 43
Q. 44
GATE 2010
COMPUTER NETWORK
Which of the following statements best explains the need for this field ?
(A) It can be used to prioritize packets
(B) It can be used to reduce delays
(C) It can be used to optimize throughput
(D) It can be used to prevent packet looping
Sol. 44
Q. 45
GATE 2010
Sol. 45
GATE 2010
Sol. 46
.
a
i
d
o
n
.
w
Q. 46
n
i
.
o
c
n
i
.
o
c
.
a
.
w
o
n
i
d
*Shipping Free*
*Maximum Discount*
Q. 47
GATE 2010
Sol. 47
COMPUTER NETWORK
n
i
.
o
c
.
a
All the routers use the distance vector based routing algorithm to update their
routing tables. Each starts with its routing table initialized to contain an entry
for each neighbour with the weight of the respective connecting link. After all
the routing tables stabilize, how many links in the network will never be used for
carrying any data ?
(A) 4
(B) 3
(C) 2
(D) 1
i
d
o
n
.
w
.
w
.
a
i
d
o
n
n
i
.
o
c
Similarly
never be used as we have alternative short routes
with a weight of 5 See highlighted entry in table for R4.
So, after all the routing tables stabilize, these two links never be used for carrying
data.
Q. 48
GATE 2010
COMPUTER NETWORK
Suppose the weights of all unused links in the previous question are changed to 2
and the distance vector algorithm is used again until all routing tables stabilize.
How many links will now remain unused ?
(A) 0
(B) 1
(C) 2
(D) 3
n
i
.
o
c
Sol. 48
.
a
i
d
o
n
.
w
.
w
.
a
i
d
o
n
n
i
.
o
c
A layer-4 firewall (a device that can look at all protocal headers up to the transport
layer) CANNOT
(A) block entire HTTP traffic during 9:00 pm and 5:00 am
(B) block all ICMP traffic
(C) stop incoming traffic from a specific IP address but allow outgoing traffic to
the same IP address
(D) Block TCP traffic from a specific user on a multi-user system during 9:00
pm and 5:00 am
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
Sol. 49
Q. 50
GATE 2011
Sol. 50
n
i
.
o
c
.
a
i
d
o
n
.
w
n
i
.
o
c
.
a
i
d
.
w
o
n
The network uses a Distance Vector Routing protocol. Once the routes have stabilized,
the distance vectors at different nodes are following.
N1 : (0, 1, 7, 8, 4)
N2 : (1, 0, 6, 7, 3)
N3 : (7, 6, 0, 2, 6)
N4 : (8, 7, 2, 0, 4)
N5 : (4, 3, 6, 4, 0)
Each distance vector is the distance of the best known path at that instance to nodes,
N1 to N5, where the distance to itself is 0. Also, all links are symmetric and the cost
is identical in both directions. In each round, all nodes exchange their distance vectors
with their respective neighbors. Then all nodes update their distance vecotrs. In
betweeen two rounds, any change in cost of a link will cause the two incident nodes to
change only that entry in their distance vectors.
Q. 51
GATE 2011
Sol. 51
COMPUTER NETWORK
The cost of link N2-N3 reduces to 2(in both directions). After the next round of
updates, what will be the new distance vector at node, N3?
(A) (3, 2, 0, 2, 5)
(B) (3, 2, 0, 2, 6)
(C) (7, 2, 0, 2, 5)
(D) (7, 2, 0, 2, 6)
n
i
.
o
c
.
a
i
d
o
n
.
w
n
i
.
o
c
i
d
.
a
o
n
Q. 52
After the update in the previous question, the link N1-N2 goes down. N2 will
reflect this change immediately in its distance vector as cost 3. After the NEXT
ROUND of update, what will be the cost to N1 in the distance vector of N3 ?
(A) 3
(B) 9
(C) 10
(D) 3
Sol. 52
Q. 53
The Protocol Data Unit (PDU) for the application layer in the Internet stack is
(A) Segment
(B) Datagram
(C) Message
(D) Frame
GATE 2012
.
w
Sol. 53
Q. 54
GATE 2012
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
mail?
(A) SMTP
(C) TCP
(B) IP
(D) UDP
Sol. 54
Q. 55
In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
(A) 214
(B) 27
(C) 221
(D) 224
GATE 2012
n
i
.
o
c
.
a
i
d
o
n
Sol. 55
Q. 56
GATE 2012
Sol. 56
GATE 2012
n
i
.
o
c
.
a
Q. 57
.
w
o
n
.
w
i
d
COMPUTER NETWORK
n
i
.
o
c
.
a
i
d
o
n
dP1 = 100 #8 10 = 1 ms
10
Total prorogation delay to travel from S to D
.
w
dP = 3dP1 = 3 ms
Total transmission delay for 1 packet
dT = 3 # Number of bits
Bandwidth
dT = 3 # 1006 = 3 ms
10
The first packet will take dP + dT = 6 ms to reach D. While first packet was
reaching D, other packets must have been processing in parallel. So D will receive
remaining packets 1 packet per 1 ms from R2. So remaining 999 packets will take
999 ms. And total time will be 999 + 6 = 1005 ms.
Q. 58
GATE 2012
Sol. 58
n
i
.
o
c
.
w
o
n
i
d
.
a
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
Sol. 59
Q. 60
GATE 2013
2 MARK
Sol. 60
n
i
.
o
c
Determine the maximum length of the cable (in km) for transmitting data at a
rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the
signal speed in the cable to be 2,00,000 km/s.
(A) 1
(B) 2
(C) 2.5
(D) 5
.
a
i
d
o
n
.
w
n
i
.
o
c
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total
length is 400 and the fragment offset value if 300. The position of the datagram,
the sequence numbers of the first and the last bytes of the payload, respectively
are
(A) Last fragment, 2400 and 2789
(B) First fragment, 2400 and 2759
(C) Last fragment, 2400 and 2759
(D) Middle fragment, 300 and 689
.
a
i
d
o
n
.
w
= 400 40 = 360
Fragmentation offset field indicates the location of a fragments in its whole
datagram. The value measures the offset in units of 8 bytes. The data length of
each fragment, except the last one, must be a multiple of eight bytes. Therefore,
the sequence number of the first byte of payload is 300 # 8 = 2400
Since the length of the data is 360 Bytes, so sequence number of last byte on this
datagram will be 2400 + 359 = 2759
Q. 61
GATE 2013
1 MARK
Sol. 61
The transport layer protocols used for real time multimedia, file transfer, DNS
and email respectively are
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP
Option (C) is correct.
Q. 62
GATE 2013
1 MARK
Q. 63
GATE 2013
1 MARK
.
a
i
d
o
n
.
w
n
i
.
o
c
.
a
.
w
o
n
i
d
Assume that source S and destination D are connected through two intermediate
routers labels R. Determine how many times each packet has to visit the network
layer and the data link layer during a transmission from S to D .
(A)
(B)
(C)
(D)
Sol. 63
n
i
.
o
c
Sol. 62
COMPUTER NETWORK
Network
Network
Network
Network
layer
layer
layer
layer
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
processing upto the network layer. The layers accessed by sender, receiver, routers
and links are shown in Figure below.
n
i
.
o
c
.
a
i
d
We can seen that network layer is visited 4 times and data link layer is visited 6
times.
Q. 64
GATE 2014
1 MARK
Sol. 64
Q. 65
GATE 2014
1 MARK
Sol. 65
o
n
.
w
Consider the following three statements about link state and distance vector
routing protocols, for a large network with 500 network nodes and 4000 links.
S1: The computational overhead in link state protocols is higher than in distance
vector protocols.
S2: A distance vector protocol (with split horizon) avoids persistent routing loops,
but not a link state protocol.
S3: After a topolgy change, a link sate protocol will converge faster than a distance
vector protocol.
Which one of the following is correct about S1, S2, and S3?
(A) S1, S2, and S3 are all true.
(B) S1, S2, and S3 are all false.
(C) S1 and S2 are true, but S3 is false.
(D) S1 and S3 are ture, but S2 is false.
n
i
.
o
c
.
a
o
n
.
w
i
d
Which of the following are used to generate a message digest by the network
security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
(A) P and R only
(B) Q and R only
(C) Q and S only
(D) R and S only
Option (C) is correct.
A Message Digest is a digitally created hash (fingerprint) created from a plaintext
block. All the information of the message is used to construct the Message Digest
COMPUTER NETWORK
hash, but the message cannot be recovered from the hash. For this reason,
Message Digests are also known as one way hash functions. There are serval hash
algorithms such as MD2, MD4, and MD5, where MD stands for Message Digest.
MD hash algorithms was insecure, so another hash algorithm was invented called
Secure Hash Algorithm (SHA). It has serval versions.
Q. 66
GATE 2014
1 MARK
n
i
.
o
c
Which one of the following is TRUE about the interior gateway routing protocols
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
(A) RIP uses distance vector routing and OSPF uses link state routing
(B) OSPF uses distance vector routing and RIP uses link state routing
(C) Both RIP and OSPF use link state routing
(D) Both RIP and OSPF use distance vector routing
.
a
i
d
o
n
.
w
Sol. 66
Q. 67
GATE 2014
2 MARK
Sol. 67
GATE 2014
1 MARK
.
w
.
a
i
d
o
n
n
i
.
o
c
Q. 68
In the following pairs of OSI protocol layer/sub-layer and its functionality, the
INCORRECT pair is
(A) Network layer and Routing
(B) Data Link Layer and Bit synchronization
(C) Transport layer and End-to-end process communication
(D) Medium Access Control sub-layer and Channel sharing
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
Sol. 68
Q. 69
GATE 2014
1 MARK
Sol. 69
n
i
.
o
c
.
a
i
d
o
n
.
w
Sol. 70
n
i
.
o
c
3
Propagation delay = dis tan ce = 2 # 108 = 10 sec
speed
2 # 10
Since, each station is allowed to hold the token for 2 sec , total interface delay
would be 10 # 2 = 20 sec . Minimum time for which the monitoring station
should wait before assuming that the token is lost is the latency. So
Ring latency = Propagation delay + Interface delay
Ring latency = 10 + 20 = 30 sec
Q. 71
GATE 2014
2 MARK
Sol. 71
GATE 2014
2 MARK
Sol. 72
i
d
o
n
.
w
Q. 72
.
a
Consider a selective repeat sliding window protocol that uses a frame size of 1 KB
to send data on a 1.5 Mbps link with a one way latency of 50 msec. To achieve
a link utilization of 60%, the minimum number of bits required to represent the
sequence number field is ______.
Correct answer is 5
We first calculate the average round-trip time (RTT) and the number of packets.
Average RTT = 2 # propogation delay
COMPUTER NETWORK
= 2 # 50 = 100 ms
The bandwidth-delay product = 1.5 Mbps # 100 ms = 150000 bits
packets
150000
Maximum No. of packets = 150000 bits =
= 18.75
1 KB
1 # 8 # 103 bit
n
i
.
o
c
Since link utilization of 60%, number of packets is 18.75 # 0.6 = 11.25 . We know
that the (window size) # ^2m 1h or 11.25 # ^2m 1h. This means that we need to
choose ^m 1h to be at least 4 or m = 5 .
Q. 73
GATE 2014
1 MARK
.
a
Which one of the following socket API functions converts an unconnected active
TCP socket into a passive socket?
(A) connect
(B) bind
(C) listen
(D) accept
i
d
o
n
.
w
Sol. 73
Q. 74
GATE 2014
1 MARK
Sol. 74
Correct answer is 26
.
w
.
a
i
d
o
n
n
i
.
o
c
TTL is used to indicate the maximum number of hops the packet is allowed to
traverse in the network. Initially this field is set to some value. Each router that
processes the datagram decrements this value by one. From the above Figure, we
can see that there are 5 visits at 5 routers and one visit at receiver, so maximum
possible value of TTL is 32 6 = 26 .
Q. 75
GATE 2014
2 MARK
Consider the store and forward packet switched network given below. Assume
that the bandwidth of each link is 106 bytes/sec. A user on host A sends a file of
size 103 bytes to host B through routers R1 and R2 in three different ways. In
the first case a single packet containing the complete file is transmitted from A
to B . In the second case, the file is split into 10 equal parts, and these packets
are transmitted from A to B . In the third case, the file is split into 20 equal parts
and these packets are sent from A to B . Each packet contains 100 bytes of header
information along with the user data. Consider only transmission time and ignore
processing, queuing and propagation delays. Also assume that there are no errors
*Shipping Free*
*Maximum Discount*
COMPUTER NETWORK
during transmission. Let T1, T2 and T3 be the times taken to transmit the file
in the first, second and third case respectively. Which one of the following is
CORRECT?
n
i
.
o
c
Sol. 75
.
a
i
d
o
n
.
w
.
w
.
a
i
d
o
n
n
i
.
o
c
COMPUTER NETWORK
n
i
.
o
c
Sol. 76
Q. 77
GATE 2014
2 MARK
.
a
i
d
o
n
.
w
Prefix
131.16.0.0/12
131.28.0.0/14
131.19.0.0/16
131.22.0.0/15
1
The identifier of the output interface on which this packet will be forwarded is
___.
Sol. 77
Q. 78
GATE 2014
2 MARK
Sol. 78
Correct answer is 1
From the given options we can see that only possible prefix are 131.16.0.0/12 and
131.22.0.0. By using longest prefix match
131.23.151.76 = 10000011.00010111.10010111.01001100
131.16.0.0/12 = 10000011.00010000.00000000.00000000
131.22.0.0/15 = 10000011.00010110.00000000.00000000
Longest prefix match is: 131.22.0.0/15 which corresponds to Interface 1.
GATE 2014
2 MARK
i
d
.
a
Every host in an IPv4 network has a 1-second resolution real-time clock with
battery backup. Each host needs to generate up to 1000 unique identifiers per
second. Assume that each host has a globally unique IPv4 address. Design a 50bit globally unique ID for this purpose. After what period (in seconds) will the
identifiers generated by a host wrap around?
.
w
o
n
Q. 79
n
i
.
o
c
*Shipping Free*
*Maximum Discount*
Sol. 79
COMPUTER NETWORK
i
d
o
n
.
a
.
w
n
i
.
o
c
.
a
i
d
o
n
.
w
n
i
.
o
c