Computer Networks

Q41. How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using the asynchronous mode of transmission with one start bit, eight data bits, and one parity bit? (Gate 2004)

  1. 600
  2. 800
  3. 876
  4. 1200
Show Answer

Ans. (2) 800

Q42. Which of the following is NOT true with respect to a transparent bridge and a router? (Gate 2004)

  1. Both bridge and router selectively forward data packets
  2. A bridge uses IP addresses while a router uses MAC addresses
  3. A bridge builds up its routing table by inspecting incoming packets
  4. A router can connect between a LAN and a WAN.
Show Answer

Ans. (2) A bridge uses IP addresses while a router uses MAC addresses

Q43. Choose the best matching Group 1 and Group 2. (Gate 2004)

Group-1Group-2
P. Data link layer1. Ensures reliable transport of data over a physical point-to-point link
Q. Network layer2. Encodes/ decodes data for physical transmission
R. Transport layer3. Allowed-to-end communication between two processes
4. Routes data from one network node to the next

  1. P-1, Q-4, R-3
  2. P-2, Q-4, R-1
  3. P-2, Q-3, R-1
  4. P-1, Q-3, R-2
Show Answer

Ans. (1) P-1, Q-4, R-3

Q44. Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for flow control. The send and receive window sizes are 5 packets each. Data packets (sent only from A to B) are all 1000 bytes long and the transmission time for such a packet is 50 μs. Acknowledgment packets (sent only from B to A), are very small and require negligible transmission time. The propagation delay over the link is 200 μs. What is the maximum achievable throughput in this communication? (Gate 2003)

  1. 7.69 × 106  bps
  2. 11.11 × 106  bps
  3. 12.33 × 106  bps
  4. 15.00 × 106  bps
Show Answer

Ans. (2) 11.11 × 106  bps

Q45. A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 108 # m/s. What is the minimum packet size that can be used on this network? (Gate 2003)

  1. 50 bytes
  2. 100 bytes
  3. 200 bytes
  4. None of the above
Show Answer

Ans. (4)None of the above

Q46. The subnet mask for a particular network is 255.255.31.0 Which of the following pairs of IP addresses could belong to this network? (Gate 2003)

  1. 172.57.88.62 and 172.56.87.23.2
  2. 10.35.28.2 and 10.35.29.4
  3. 191.203.31.87 and 191.234.31.88
  4. 128.8.129.43 and 128.8.161.55
Show Answer

Ans. (4) 128.8.129.43 and 128.8.161.55

Q47. Which of the following functionalities must be implemented by a transport protocol over and above the network protocol? (Gate 2003)

  1. Recovery from packet losses
  2. Detection of duplicate packets
  3. Packet delivery in the correct order
  4. End-to-end connectivity
Show Answer

Ans. (4) End to end connectivity

Q48. Which of the following assertions is false about the Internet Protocol (IP)? (Gate 2003)

  1.  It is possible for a computer to have multiple IP addresses
  2. IP packets from the same source to the same destination can take different routes in the network
  3.  IP ensures that a packet is forwarded if it is unable to reach its destination within a given number of hopes
  4. The packet source cannot set the route of outgoing packets; the route is determined only by the routing tables in the routers on the way.
Show Answer

Ans. (4) The packet source cannot set the route of outgoing packets; the route is determined only by the routing tables in the routers on the way.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

10 Blockchain Security Vulnerabilities OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues