Computer Network GATE previous year questions with answer
Ques 53 Gate 2015 Set-2
A link has a transmission speed of 106 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgment has negligible transmission delay, and that its propagation delay is the same as the data propagation delay. Also assume that the processing delays at nodes are negligible. The efficiency of the stop-and-wait protocol in this setup is exactly 25%. The value of the one-way propagation delay (in milliseconds) is ___________.
Ques 54 Gate 2015 Set-2
Which one of the following statements is NOT correct about HTTP cookies?
Ques 55 Gate 2015 Set-1
Consider a LAN with four nodes S1, S2, S3 and S4. Time is divided into fixed-size slots, and a node can begin its transmission only at the beginning of a slot. A collision is said to have occurred if more than one node transmit in the same slot. The probabilities of generation of a frame in a time slot by S1, S2, S3 and S4 are 0.1, 0.2, 0.3 and 0.4, respectively. The probability of sending a frame in the first slot without any collision by any of these four stations is_________
Ques 56 Gate 2015 Set-1
Suppose two hosts use a TCP connection to transfer a large file. Which of the following statements is/are False with respect to the TCP connection?
I. If the sequence number of a segment is m, then the sequence
number of the subsequent segment is always m+1.
II. If the estimated round trip time at any given point of time
is t sec, the value of the retransmission timeout is always
set to greater than or equal to t sec.
III. The size of the advertised window never changes during the
course of the TCP connection.
IV. The number of unacknowledged bytes at the sender is always
less than or equal to the advertised window.
Ques 57 Gate 2015 Set-1
Which one of the following fields of an IP header is NOT modified by a typical IP router?
Ques 58 Gate 2015 Set-1
Suppose that everyone in a group of N people wants to communicate secretly with the N–1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
Ques 59 Gate 2015 Set-1
In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?
Total Unique Visitors