Following questions have been asked in GATE CS 2007 exam.
1) Which one of the following uses UDP as the transport protocol?
DNS primarily uses User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server.
2) In Ethernet when Manchester encoding is used, the bit rate is:
(A) Half the baud rate.
(B) Twice the baud rate.
(C) Same as the baud rate.
(D) none of the above
3) There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONLY one station transmits in a given time slot?
The probability that a particular station transmits and no body else transmits = p*(1-p)^(n-1)
The probability that any station can transmit = n*(probability that a particular station transmits) = n*p*(1-p)^(n-1). See this for details.
4) In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1-bit delay in this network is equivalent to:
(A) 500 metres of cable.
(B) 200 metres of cable.
(C) 20 metres of cable.
(D) 50 metres of cable.
Transmission delay for 1 bit t = 1/(10^7) = 0.1 micro seconds.
200 meters can be traveled in 1 micro second. Therefore, in 0.1 micro seconds, 20 meters can be traveled.
Please see GATE Corner for all previous year paper/solutions/explanations, syllabus, important dates, notes, etc.
Please write comments if you find any of the answers/explanations incorrect, or you want to share more information about the topics discussed above
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Computer Networks | Set 10
- Computer Networks | Set 7
- Computer Networks | Set 8
- Computer Networks | Set 11
- Computer Networks | Set 6
- Computer Networks | Set 3
- Computer Networks | Set 14
- Computer Networks | Set 2
- Computer Networks | Set 1
- Computer Networks | Set 5
- Computer Networks | Set 12
- Computer Networks | Set 4
- Computer Networks | Set 13
- Introduction of Botnet in Computer Networks
- Last Minute Notes - Computer Networks
- End to End Encryption (E2EE) in Computer Networks
- Congestion Control in Computer Networks
- Error Detection in Computer Networks
- Computer Networks | IP Addressing | Question 6
- Computer Networks | IP Addressing | Question 5