Computer Network


Q21.

HELO and PORT, respectively, are commands from the protocols:
GateOverflow

Q22.

Which one of the following is not a client server application?
GateOverflow

Q23.

Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the technique used by traceroute to identify these hosts:
GateOverflow

Q24.

Consider the three commands : PROMPT, HEAD and RCPT. Which of the following options indicate a correct association of these commands with protocols where these are used?
GateOverflow

Q25.

Consider the following statements: I. telnet, ftp and http are application layer protocols. II. EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise Edition) application server. III. If two languages conform to the Common Language Specification (CLS) of the Microsoft.NET frame work, then a class defined in any one of them may be inherited in the other. Which statements are true?
GateOverflow

Q26.

A packet filtering firewall can
GateOverflow

Q27.

Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web server. 3. The web server sends the requested webpage using HTTP. 4. The web browser resolves the domain name using DNS.
GateOverflow

Q28.

Consider a network using the pure ALOHA medium access control protocol, where each frame is of length 1,000 bits. The channel transmission rate is 1 Mbps (=10^6 bits per second). The aggregate number of transmissions across all the nodes (including new frame transmissions and retransmitted frames due to collisions) is modelled as a Poisson process with a rate of 1,000 frames per second. Throughput is defined as the average number of frames successfully transmitted per second. The throughput of the network (rounded to the nearest integer) is ______________
GateOverflow

Q29.

Consider the cyclic redundancy check (CRC) based error detecting scheme having the generator polynomial X^3+X+1. Suppose the message m_4m_3m_2m_1m_0=11000 is to be transmitted. Check bits c_2c_1c_0 are appended at the end of the message by the transmitter using the above CRC scheme. The transmitted bit string is denoted by m_4m_3m_2m_1m_0c_2c_1c_0. The value of the checkbit sequence c_2c_1c_0 is
GateOverflow

Q30.

Consider a 100 Mbps link between an earth station (sender) and a satellite (receiver) at an altitude of 2100 km. The signal propagates at a speed of 3 \times 10^8 m/s. The time taken (in milliseconds, rounded off to two decimal places) for the receiver to completely receive a packet of 1000 bytes transmitted by the sender is
GateOverflow