Computer Networks

Computer Networks is a crucial subject in the computer science engineering stream. Here I am listing multiple-choice questions (MCQs) in the field of networking. These MCQs are previous years questions of the GATE ( Graduate Aptitude Test in Engineering ) exam in India. But questions are good if you want to brush up on your knowledge of the subject.

Consider a network with 6 routers R1 and R6 connected with links having weights as shown in the following diagram.

Question 1 and 2 are based on the above statement

Q1. All the routers use the distance vector-based routing algorithm to update their routing tables. Each starts with its routing table initialized to contain an entry for each neighbor with the weight of the respective connecting link. After all the routing tables stabilize, how many links in the network will never be used for carrying any data?(Gate 2010)

  1. 4
  2. 3
  3. 2
  4. 1
Show Answer

Ans. (3) 2

Q2. Suppose the weights of all unused links in the previous question are changed to 2 and the distance vector algorithm is used again until all routing tables stabilize. How many links will now remain unused?(Gate 2010)

  1. 0
  2. 1
  3. 2
  4. 3
Show Answer

Ans. (2) 1

Q3. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the values of N given below should not be used if A and B should belong to the same network? (Gate 2010)

  1. 225.255.255.0
  2. 255.255.255.128
  3. 255.255.255.192
  4. 255.255.255.224
Show Answer

Ans. (4)255.255.255.224

Q4. Which one of the following is not a client-server application?(Gate 2010)

  1. Internet chat
  2. Web browsing
  3. E-mail
  4. Ping
Show Answer

Ans. (4) Ping

Q5. One of the header fields in an IP datagram is the Time-to-Live (TTL) field. Which of the following statements best explains the need for this field? (Gate 2010)

  1. It can be used to prioritize packets
  2. It can be used to reduce delays
  3. It can be used to optimize throughput
  4. It can be used to prevent packet looping
Show Answer

Ans. (4) It can be used to prevent packet looping

Frames of 1000 bits are sent over a 106 bps duplex link between two hosts. The propagation time is 25 ms. Frames are to be transmitted into to maximally pack them in transit (within the link).

Question 6 and 7 are based on above statement

Q6. What is the minimum number of bits (l) that will be required to represent the sequence numbers distinctly? Assume that no time gap needs to be given between transmission of two frames.(Gate 2009)

  1. l = 2
  2. l = 3
  3. l = 4
  4. l = 5
Show Answer

Ans. (4) l=5

Q7. Suppose that the sliding window protocol is used with the sender window size of 2l, where l is the number of bits identified in the earlier part and acknowledgments are always piggybacked. After sending 2l frames, what is the minimum time the sender will have to wait before starting transmission of the next frame? (Identify the closest choice ignoring the frame processing time)(Gate 2009)

  1. 16 ms
  2. 18 ms
  3. 20 ms
  4. 22 ms
Show Answer

Ans. (2) 18ms

Q8. LetG(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect an odd number of bits in error?(Gate 2009)

  1. G(x) contains more than two terms
  2. G(x) does not divide 1 + xk , for any K not exceeding the frame length
  3. 1 + x is a factor of G(x)
  4. G(x) has an odd number of terms
Show Answer

Ans. (3) 1 + x is a factor of G(x)

Q9.While opening a TCP connection, the initial sequence number is to be derived using a time-of-day (ToD) clock that keeps running even when the host is down. The low-order 32 bits of the counter of the TOD clock is to be used for the initial sequence numbers. The clock counter increments once per millisecond. The maximum packet lifetime is given to be 64s.
Which one of the choices given below is closest to the minimum permissible rate at which sequence numbers used for packets of a connection can increase? (Gate 2009)

  1. 0.015/s
  2. 0.064/s
  3. 0.135/s
  4. 0.327/s
Show Answer

Ans. (1) 0.015/s

Q10. In the RSA public key cryptosystem, the private and the public keys are (e, n) and (d, n) respectively, where n = p* and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer such that 0 < M < nand φ(n) = (p − 1) (q − 1). Now consider the following equations.
I.  M' = Mmod n
M = (M')mod n
II. ed ≡ 1mod n
III.ed ≡ 1modφ(n)
IV. M' = Memod φ(n)
M = (M')dmod φ(n)
Which of the above equations correctly represents the RSA cryptosystem? (Gate 2009)

  1. I and II
  2. I and III
  3. II and IV
  4. III and IV
Show Answer

Ans. (2) I and III

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

10 Blockchain Security Vulnerabilities OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues