Use these filters to find papers

B.Tech 5th Sem Computer Networks paper

UniversityBIT, Mesra, Ranchi
CourseB.TECH
Semester5
SubjectComputer Networks
Year2015
Downloads69
Uploaded By User Image
Sourabh Bajaj
200
 
  Question Marks
0
requests

What do you understand by service and peer interfaces in a protocol?

This question has 0 answers so far.
2
0
requests

What are the different types of multiplexing commonly employed in a network?

This question has 0 answers so far.
4
0
requests

How do you define the throughput of a network? Calculate the bandwidth x delay product for a 1.5Mbps T1 link through a geo stationary satellite at a height of 35,900 Kms. The only delay is the speed of light propagation delay.

This question has 0 answers so far.
6
0
requests

What is a network adapter? Explain with a block diagram.

This question has 0 answers so far.
2
0
requests

Explain how spread spectrum is useful in communication in the "license-exempt frequency spectrum.

This question has 0 answers so far.
4
0
requests

Assume a sliding window protocol for a 1 Mbps point to point link to the moon which latency of 1.25 seconds and each frame carries 1 KB of data. What is the minimum number of bits you need for the sequence number.

This question has 0 answers so far.
6
0
requests

Differentiate between synchronous and asynchronous data in the FDDI.

This question has 0 answers so far.
2
0
requests

Why does the 802.11 (Wifi) Frame format require four address fields. Explain with the frame format diagram. 

This question has 0 answers so far.
4
0
requests

Explain the sequence of events in the Ethemet protocol once a collision has been detected by a sending adapter. In this context clearly explain the reasoning behind the "exponential backoff" strategy.

This question has 0 answers so far.
6
0
requests

Why CIDR is also called supernetting?

This question has 0 answers so far.
2
0
requests

Explain with suitable header diagrams how an IP packet of size 1420 bytes get fragmented when crossing a point to point link of MTU 532 bytes. (Only relevant fields may be shown in the header diagram).

This question has 0 answers so far.
4
0
requests

Use the Distance Vector Routing Protocol to obtain a final routing table for node A in the following topology.
                                                           

This question has 0 answers so far.
6
0
requests

What do you understand by Source Specific Multicast (SSM) and Any Source Multicast (ASM).

This question has 0 answers so far.
2
0
requests

In the context of MPLS what do you understand by destination based routing?

This question has 0 answers so far.
4
0
requests

Explain the PIM protocol with a suitable example.

This question has 0 answers so far.
6
0
requests

How is the checksum field calculated in the case of UDP?

This question has 0 answers so far.
2
0
requests

Explain the Silly Window Syndrome and provide an algorithm to prevent it from happening.

This question has 0 answers so far.
4
0
requests

Explain the three way handshake in TCP using a state diagram that moves CLIENTS from active and passive open states to the ESTB state.

This question has 0 answers so far.
6
0
requests

Differentiate between the Best effort service model and Qos service Models

This question has 0 answers so far.
2
0
requests

Briefly describe two different queuing models used in routers and compare their performances.

This question has 0 answers so far.
4
0
requests

Explain the "Slow Start" mechanism used by TCP to avoid congestion in the network.

This question has 0 answers so far.
6
Chat with us