The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
GATE Overflow
Facebook Login
or
Email or Username
Password
Remember
Login
Register
|
I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
First time here? Checkout the
FAQ
!
x
×
Close
Use the google search bar on side panel. It searches through all previous GATE/other questions. For hardcopy of previous year questions please see
here
Recent questions in Computer Networks
Recent
Hot!
Most votes
Most answers
Most views
Featured
Previous GATE
Web Page
Concept of layering.
LAN technologies (Ethernet).
Flow
and
error control
techniques,
Swithing.
IPv4
/
IPv6,
Routers and routing algorithms (distance vector, link state).
TCP
/
UDP
and
Sockets,
Congestion control.
Application layer protocols (DNS, SMTP, POP, FTP, HTTP).
Basics of Wi-Fi.
Network security: authentication, basics of public key and private key cryptography, digital signatures and certificates,
Firewalls.
Recent
Hot!
Most votes
Most answers
Most views
Featured
Previous GATE
0
votes
0
answers
1
Made Easy Test Series: Computer Network-Dijkstra Algo
Consider Dijkstra's algorithm in linked state routing protocol at node $u.$ Professor Ram first sets the route for each directly connected node $v.$ to be the link connecting $u$ to $v.$ Ram then implements the rest of the algorithm ... costs where all routing table entry will be correct. $D)$ Both $A)$ and $B)$ How Dijkstra working here?
asked
May 14
in
Computer Networks
by
srestha
Veteran
(
114k
points)
|
22
views
computer-networks
made-easy-test-series
0
votes
0
answers
2
ISI2018-PCB-B9
The data link layer uses a fixed-size sliding window protocol, where the window size for the connection is equal to twice the bandwidth-delay product of the network path. Consider the following three scenarios, in each of which only the given parameter changes as specified (no ... minimum value of the round trip time $R$ increases to $1.8R$; the window size $W$ decreases to $W/3$
asked
May 12
in
Computer Networks
by
akash.dinkar12
Boss
(
40.5k
points)
|
21
views
isi2018pcb-b
computer-networks
data-link-layer
descriptive
+1
vote
1
answer
3
Self Doubt :Bit Stuffing
End delimeter is → 0111 data to be sent 0111111111. What is the data we should send to the reciever?
asked
May 8
in
Computer Networks
by
Hirak
Active
(
2k
points)
|
89
views
computer-networks
bit
bit-stuffing
0
votes
0
answers
4
Pgee mock exam
asked
Apr 23
in
Computer Networks
by
Dipanshu Rana
(
383
points)
|
24
views
0
votes
0
answers
5
Made Easy Test Series: Computer Network-ICMP
Consider a very large network $10000$ routers. Two host $A$ and $B$ connected with this network. Host $A$ sends a data to host $B$. and after some unit of time host $A$ receives $ICMP$ time exceed message for the samedata ... some ICMP message generated? Say if $ICMP$ message generated in $9999th$ router, then where it give error of time exceed message?
asked
Apr 20
in
Computer Networks
by
srestha
Veteran
(
114k
points)
|
111
views
made-easy-test-series
computer-networks
0
votes
0
answers
6
Kurose and Ross Edition 6 Exercise 3 Question R18 (Page No 288)
True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value.
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
62
views
computer-networks
transport-layer
congestion-control
descriptive
tcp
0
votes
0
answers
7
Kurose and Ross Edition 6 Exercise 3 Question R17 (Page No 287)
Suppose two TCP connections are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link). The transmissions of the files start at the same time. What transmission rate would TCP like to give to each of the connections?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
30
views
computer-networks
transport-layer
tcp
congestion-control
descriptive
0
votes
0
answers
8
Kurose and Ross Edition 6 Exercise 3 Question R15 (Page No 287)
Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. How much data is in the first segment? Suppose that the ... segment arrives at B. In the acknowledgment that Host B sends to Host A, what will be the acknowledgment number?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
39
views
computer-networks
transport-layer
tcp
descriptive
0
votes
0
answers
9
Kurose and Ross Edition 6 Exercise 3 Question R14 (Page No 287)
True or false? Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknowledgments to Host A because Host B cannot piggyback the acknowledgments ... 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily 42.
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
24
views
computer-networks
transport-layer
tcp
descriptive
0
votes
0
answers
10
Kurose and Ross Edition 6 Exercise 3 Question R13 (Page No 287)
Visit the Selective Repeat Java applet at the companion Web site. Have the source send five packets, and then pause the animation before any of the five packets reach the destination. Then kill the first packet and resume ... what happens. Finally, try sending six packets. What happens? How selective repeat and go back-n is different?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
11
views
computer-networks
transport-layer
descriptive
0
votes
1
answer
11
Kurose and Ross Edition 6 Exercise 3 Question R12 (Page No 286)
Visit the Go-Back-N Java applet at the companion Web site. Have the source send five packets, and then pause the animation before any of the five packets reach the destination. Then kill the first packet and ... destination and kill the first acknowledgment. Describe again what happens. Finally, try sending six packets. What happens?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
16
views
computer-networks
transport-layer
descriptive
go-back-n
0
votes
0
answers
12
Kurose and Ross Edition 6 Exercise 3 Question R11 (Page No 286)
Suppose that the roundtrip delay between the sender and receiver is constant and known to the sender. Would a timer still be necessary for protocol rdt 3.0 as shown in the figure, assuming that packets can be lost? Explain.
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
20
views
computer-networks
transport-layer
descriptive
reliable-transfer
0
votes
0
answers
13
Kurose and Ross Edition 6 Exercise 3 Question R10 (Page No 286)
In our rdt protocols, why did we need to introduce timers?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
28
views
computer-networks
transport-layer
descriptive
tcp
udp
0
votes
0
answers
14
Kurose and Ross Edition 6 Exercise 3 Question R9 (Page No 286)
In our rdt protocols, why did we need to introduce sequence numbers?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
21
views
computer-networks
transport-layer
communication
descriptive
0
votes
0
answers
15
Kurose and Ross Edition 6 Exercise 3 Question R8 (Page No 286)
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections and is currently receiving requests from two different Hosts, A and B. Are all of the requests being sent through the ... If they are being passed through different sockets, do both of the sockets have port 80? Discuss and explain.
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
8
views
computer-networks
transport-layer
sockets
descriptive
0
votes
0
answers
16
Kurose and Ross Edition 6 Exercise 3 Question R7 (Page No 286)
Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789. Will both of these segments be directed to the same ... Host C? If so, how will the process at Host C know that these two segments originated from two different hosts?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
9
views
computer
transport-layer
descriptive
udp
0
votes
0
answers
17
Kurose and Ross Edition 6 Exercise 3 Question R6 (Page No 286)
Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, how?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
18
views
computer-networks
transport-layer
udp
descriptive
0
votes
0
answers
18
Kurose and Ross Edition 6 Exercise 3 Question R5 (Page No 286)
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestion-control mechanism.)
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
5
views
computer-networks
transport-layer
tcp
descriptive
0
votes
0
answers
19
Kurose and Ross Edition 6 Exercise 3 Question R4 (Page No 286)
Describe why an application developer might choose to run an application over UDP rather than TCP.
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
24
views
computer-networks
transport-layer
tcp
udp
descriptive
0
votes
0
answers
20
Kurose and Ross Edition 6 Exercise 3 Question R3 (Page No 286)
Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number x and destination port number y. What are the source and destination port numbers for the segments traveling from Host B to Host A?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
22
views
computer-networks
transport-layer
descriptive
tcp
0
votes
0
answers
21
Kurose and Ross Edition 6 Exercise 3 Question R2 (Page No 285)
Consider a planet where everyone belongs to a family of six, every family lives in its own house, each house has a unique address, and each person in a given house has a unique name. Suppose this planet has a mail ... protocol, does the mail service ever have to open the envelope and examine the letter in order to provide its service?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
19
views
computer-networks
transport-layer
descriptive
0
votes
0
answers
22
Kurose and Ross Edition 6 Exercise 3 Question R1 (Page No 285)
Suppose the network layer provides the following service. The network layer in the source host accepts a segment of maximum size 1,200 bytes and a destination host address from the transport layer. The network layer then guarantees ... In your protocols, does the transport layer have to do anything in the core of the computer network?
asked
Apr 18
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
6
views
computer-networks
transport-layer
descriptive
0
votes
1
answer
23
Kurose and Ross Edition 6 Exercise 2 Question P14 (Page No 174)
How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
34
views
computer-networks
descriptive
application-layer-protocols
application-layer
0
votes
1
answer
24
Kurose and Ross Edition 6 Exercise 2 Question P13 (Page No 174)
What is the difference between MAIL FROM: in SMTP and From: in the mail message itself?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
20
views
computer-networks
application-layer-protocols
descriptive
0
votes
1
answer
25
Kurose and Ross Edition 6 Exercise 2 Question P3 (Page No 171)
Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application-layer protocols besides HTTP are needed in this scenario?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
24
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
26
Kurose and Ross Edition 6 Exercise 2 Question P2 (Page No 171)
Read RFC 959 for FTP. List all of the client commands that are supported by the RFC.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
9
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
27
Kurose and Ross Edition 6 Exercise 2 Question P1 (Page No 171)
True or false? A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. Two distinct Web pages (for example, ... indicates when the object in the response was last modified. HTTP response messages never have an empty message body.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
18
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
28
Kurose and Ross Edition 6 Exercise 2 Question R20 (Page No 170)
Look over your received emails, and examine the header of a message sent from a user with a .edu email address. Is it possible to determine from the header the IP address of the host from which the message was sent? Do the same for a message sent from a Gmail account.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
11
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
29
Kurose and Ross Edition 6 Exercise 2 Question R19 (Page No 170)
Is it possible for an organization’s Web server and mail server to have exactly the same alias for a hostname (for example, $foo.com$)? What would be the type for the RR that contains the hostname of the mail server?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
19
views
computer-networks
application-layer-protocols
application-layer
descriptive
0
votes
1
answer
30
Kurose and Ross Edition 6 Exercise 2 Question R18 (Page No 170)
From a user’s perspective, what is the difference between the download-and delete mode and the download-and-keep mode in POP3?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.1k
points)
|
22
views
computer-networks
application-layer-protocols
application-layer
descriptive
Page:
1
2
3
4
5
6
...
142
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
IIT Kanpur MS Interview experience
My GATE preparation and what you can learn from it
IIT Bombay RA (2019) Programming Questions
COAP Round 1 has started
MTECH (COUURSE WORK) AI INTERVIEW EXPERIENCE 2019
All categories
General Aptitude
1.7k
Engineering Mathematics
7.4k
Digital Logic
2.9k
Programming & DS
4.9k
Algorithms
4.3k
Theory of Computation
6k
Compiler Design
2k
Operating System
4.2k
Databases
4.1k
CO & Architecture
3.4k
Computer Networks
4.2k
Non GATE
1.4k
Others
1.6k
Admissions
591
Exam Queries
643
Tier 1 Placement Questions
23
Job Queries
72
Projects
23
Follow @csegate
Recent questions in Computer Networks
Recent Blog Comments
It was free when I gave them, maybe they made it...
The tests are there but it ain't free. Cost is...
They removed their tests recently, I think it'll...
how did you get Success gateway test series for...
49,781
questions
53,593
answers
185,825
comments
70,880
users