Download the BYJU'S Exam Prep App for free GATE/ESE preparation videos & tests - Download the BYJU'S Exam Prep App for free GATE/ESE preparation videos & tests -

Computer Network GATE Questions

A highly popular method used to prepare for the GATE Exam is to sincerely practise all the previous years’ GATE Questions. Candidates can practise, analyse and understand concepts while solving them. It will also help you strengthen your time management skills. We have attempted to compile, here in this article, a collection of GATE Questions on Computer Networks.

Candidates are urged to practise these Computer Networks GATE previous year questions to get the best results. Computer Networks is an important topic in the GATE CSE question paper, and solving these questions will help the candidates to prepare more proficiently for the GATE exams. Meanwhile, candidates can find the GATE Questions for Computer Networks here, in this article below, to solve and practise before the exams. They can also refer to the GATE previous year question papers and start preparing for the exams.

GATE Questions on Computer Networks

    1. The value of 351 mod 5 is_________

(GATE CSE 2019)

      1. 0
      2. 2
      3. 5
      4. 10

Answer (b)

    1. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.

I. S can launch a birthday attack to replace m with a fraudulent message

II. A third party attacker can launch a birthday attack to replace m with a fraudulent message

III. R can launch a birthday attack to replace m with a fraudulent message

Which of the following are possible security violations?

(GATE CSE 2017 Set 1)

      1. I and II only
      2. I only
      3. II only
      4. II and III only

Answer (b)

    1. Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires

(GATE CSE 2016 Set 2)

      1. Anarkali’s public key
      2. Salim’s public key
      3. Salim’s private key
      4. Anarkali’s private key

Answer (a)

    1. Suppose everyone in a group of N people wants to communicate secretly with the N – 1 others using a symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

(GATE CSE 2016 Set 2)

      1. 2N
      2. N(N-1)
      3. \(\begin{array}{l}\frac{N(N-1)}{2}\end{array} \)
      4. \(\begin{array}{l}(N-1)^{2}\end{array} \)

Answer (c)

    1. A link has a transmission speed of 106 bits/sec. It uses data packets of size 1000 bytes each. Assume that the acknowledgement has negligible transmission delay, and that its propagation delay is the same as the data propagation delay. Also assume that the processing delays at the nodes are negligible. The efficiency of the stop-and-wait protocol in this setup is exactly 25%. The value of the one-way propagation delay (in milliseconds) is ___________

(GATE CSE 2015 Set 2)

      1. 10
      2. 12
      3. 15
      4. 20

Answer (b)

    1. A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is

(GATE CSE 2014 Set 3)

      1. 0111110100
      2. 0111110101
      3. 0111111101
      4. 0111111111

Answer (b)

    1. Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images. The minimum number of TCP connections required to display the web page completely in your browser is ______

(GATE CSE 2020)

      1. 0
      2. 1
      3. 10
      4. 6

Answer (d)

    1. Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a web page from a remote server, assuming that the host has just been restarted

(GATE CSE 2016 Set 2)

      1. HTTP GET request, DNS query, TCP SYN
      2. DNS query, HTTP GET request, TCP SYN
      3. DNS query, TCP SYN, HTTP GET request
      4. TCP SYN, DNS query, HTTP GET request

Answer (c)

    1. Which of the following is/are example(s) of stateful application layer protocols?

I. HTTP

II. FTP

III. TCP

IV. POP3

(GATE CSE 2016 Set 1)

      1. I and II only
      2. II and III only
      3. II and IV only
      4. IV only

Answer (c)

    1. Which one of the following protocols is NOT used to resolve one form of address to another one?

(GATE CSE 2016 Set 1)

      1. DNS
      2. ARP
      3. DHCP
      4. RARP

Answer (c)

    1. Consider the following statements about the functionality of an IP based router.

I. A router does not modify the IP packets during forwarding.

II. It is not necessary for a router to implement any routing protocol.

III. A router should reassemble IP fragments if the MTU of the outgoing link is larger than the size of the incoming IP packet.

Which of the above statements is/are TRUE?

(GATE CSE 2020)

      1. I and II only
      2. II only
      3. I only
      4. II and III only

Answer (b)

    1. Host A (on TCP/IPv4 network A) sends an IP datagram D to host B (also on TCP/IPv4 network B). Assume that no error occurred during the transmission of D. When D reaches B, which of the following IP header field(s) may be different from that of the original datagram D?

I. TTL

II. Checksum

III. Fragment Offset

(GATE CSE 2014 Set 3)

      1. I only
      2. II and III only
      3. I and II only
      4. I, II and III

Answer (d)

    1. Consider the following three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links
[S1] The computational overhead in link state protocols is higher than in distance vector protocols.

[S2] A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol.

[S3] After a topology change, a link state protocol will converge faster than a distance vector protocol.

Which one of the following is correct about S1, S2, and S3?

(GATE CSE 2014 Set 1)

      1. S1, S2 and S3 are all true
      2. S1, S2 and S3 are all false
      3. S1 and S2 are true, but S3 is false
      4. S1 and S3 are true, but S2 is false

Answer (d)

    1. Which one of the following is TRUE about the interior gateway routing protocols – Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)?

(GATE CSE 2014 Set 2)

      1. RIPL uses distance vector routing and OSPF uses link state routing
      2. OSPF uses distance vector routing and RIP uses link state routing
      3. Both RIP and OSPF use link state routing
      4. Both RIP and OSPF use distance vector routing

Answer (a)

    1. In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair is

(GATE CSE 2014 Set 3)

      1. Network layer and Routing
      2. Transport layer and End-to-end process communication
      3. Data Link Layer and Bit synchronisation
      4. Medium Access Control sub-layer and Channel sharing

Answer (c)

Keep learning and stay tuned to get the latest updates on GATE Exam along with GATE Eligibility Criteria, GATE 2023, GATE Admit Card, GATE Syllabus, GATE Previous Year Question Paper, and more.

Also Explore,

Comments

Leave a Comment

Your Mobile number and Email id will not be published.

*

*