- Computer Network Practice Problems
A computer network is a collection of various computing machines that are able to share each other’s resources in a mannerly fashion . Computer network is at the centre of all the modern processes and computational exercises. A computer network makes the world wide web possible. It is through a computer network that all the technological advances are made and the concept of forming and maintaining a computer network is basic to almost all modern professions. Here we have a section that has most interesting questions testing your knowledge about computer networks. Let us see more!
Browse more Topics under Networking
- Computer Networks
- The OSI Model
- Computer and Network Security
- Internet and the WWW
- Security Tools, Virus, Hacking
Networking Practice Questions
Networking Practice Questions has questions based on the concepts of Computer Networks, The OSI Model , Computer and Network Security, Internet and the World Wide Web . Here we will see many previous years questions which will not only help you get a total recap of what you have learned but also let you understand the type of challenges and the level of difficulty that you must expect.
Q1: Hub is associated with ……. network. [S B I Clerk 2011]
A) Bus B) Ring C) Star D) Mesh E) All of the above
Q2: Multiplexing involves ……. path and …………….. channel. [S B I Clerk, 2011]
A) one, one B) one, multiple C) multiple, one D) multiple, multiple E) None of the above
Q3: The advantage of L A N is [S B I Clerk, 2012]
A) sharing peripherals B) backing up your data C) saving all your data D) accessing the web E) automatic printing of data
Q4: Which type of network would use phone lines ? [S B I Clerk 2012]
A) W A N B) L A N C) W W A N D) Wireless E) None of the above
Q5: Servers are those computers which provide resources to other computers connected by: [S B I Clerk 2009]
A) network B) backup system C) server D) peripheral E) modem
Q6: A combination of hardware and software that allows communication and electronic transfer of information between computers is a: [S B I Clerk 2012]
A) network B) backup system C) server D) peripheral E) modem
Q7: What type of resource is most likely to be a shared common resource in a computer network? [Allahbad Bank Clerk, 2010]
A) Printers B) Speakers C) Floppy Disk Drives D) Keyboards E) None of the above
Q8: A device that connects to a network without the use of cables is said to be: [I B P S Clerk, 2012]
A) distributed B) cabled C) centralized D) open source E) wireless
Find Your Answers Here
Q1: C), Q2: B), Q3: A), Q4: A), Q5: A), Q6: A), Q7: A), Q8: E)
Q1: ……… is the most important/ powerful computer in a typical network. [S B I P. O. 2013]
A) Network station B) Network Client C) Desktop D)Network server E) Network switch
Q2: P2P is a …….. application architecture. [I B P S Clerk 2012]
A) client/ server B) distributed C) centralised D) 1 – tier E) None of the above
Q3: Which of the following represents the fastest data transmission speed? [S B I Clerk, 2012]
A) Bandwidth B) bps C) gbps D) kbps E) mbps
Q4: In O S I network architecture, the routing is performed by: [I B P S Clerk 2012]
A) network layer B) data link layer C) transport layer D) session layer E) None of the above
Q5: Which of the following is considered a broadband communication channel? [S B I P. O. 2010]
A) Coaxial cable B) Fiber optics cable C) Microwave circuits D) All of these E) None of the above
Q6: How many bits are there in the ethernet address? [S B I clerk 2011]
A) 64 bits B) 48 bits C) 32 bits D) 16 bits E) None of these
Q7: How many layers are in the T C P/ I P model? [S B I Clerk 2011]
A) 4 layers B) 5 layers C) 6 layers D) 7 layers E) None of these
Q8: Ethernet, token ring and token bus are types of? [S B I Associates 2012]
A) W A N B) L A N C) Communication channels D) Physical medium E) None of the above
Q9: Which of the following items is not used in Local Area Networks (L A Ns)? [S S C C G L 2012]
A) Interfaced card B) Cable C) Computer D) Modem
Q10: Which is the name of the network topology in which there are bidirectional links between each possible node? [S S C C G L 2012]
A) Ring B) Start C) Tree D) Mesh
Q11: An alternate name for the completely interconnected network topology is: [S S C C G L 2012]
A) mesh B) star C) tree D) ring
Find Your Answer Here
Q1: D), Q2: A), Q3: C), Q4: A), Q5: D), Q6: B), Q7: B), Q8: B), Q9: D), Q10: D), Q11: A)
Q1: The secret code that gives you access to some program is? [Punjab And Sindh Bank Clerk, 2010]
A) clue B) cue C) password D) help E) None of the above
Q2: Sending an E-mail is similar to? [S B I Clerk 2011]
A) writing a letter B) drawing a picture C) talking on the phone D) sending a package E) None of the above
Q3: Which of the following is the communication protocol that sets the standard used by every computer that accesses web-based information? [S B I P. O. 2010]
A) X M L B) D M L C) H T T P D) H T M L E) None of the above
Q4: Which of the following is required to create an H T M L document? [I B P S Clerk, 2011]
A) Browser B) Internet C) Text Editor D) Search engine E) None of the above
Q5: If you receive an E-mail from someone you don’t know what should you do? [S B I Clerk, 2008]
A) Forward it to the police immediately.
B) Delete it without opening it.
C) Open it and respond to them saying that you don’t know them.
D) Reply and ask them for their personal information.
E) Reply and tell them you want to keep in touch with them.
Q1: C), Q2: A), Q3: C), Q4: C), Q5: B)
Customize your course in 30 seconds
Which class are you in.
- Internet and World Wide Web
Leave a Reply Cancel reply
Your email address will not be published. Required fields are marked *
Download the App
Administrivia
Lectures and assignments, second half.
If you're seeing this message, it means we're having trouble loading external resources on our website.
If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked.
To log in and use all the features of Khan Academy, please enable JavaScript in your browser.
Computers and the Internet
Course: computers and the internet > unit 3, computer networks.
- Wires, cables, and WiFi
- Physical network connections
- Bit rate, bandwidth, and latency
- Bit rate and bandwidth
- (Choice A) A
- (Choice B) B
- (Choice C) C
- (Choice D) D
Home Announcements Schedule Assignments Slides Projects Reading
Assignments
The homework assignments give you a chance to practice the math and knoweldge skill you've read about in the text book and heard in class. The point of the homework is to help you learn these concepts. You can certainly ignore this, and it will definitely lower your grade by a full letter, but I strongly advice you complete the homework. Doing so will ensure that you can answer the questions that will appear on the midterm and final exams.
The last 30 minutes of each lecture will be devoted to problem solving and programming lab work. Thus, if you are stuck on a problem, this is an excellent place to get your questions answered without having to go to additional office hours.
Homeworks are always due at the beginning of class on the day they are specified on the schedule. Late homework is not accepted without prior permission from the professor.
Homework 7: Wireless and Mobile Networks
Assigned: Mar. 4th Due: Mar. 9nd Problems: P1, P4, P6, P7, P10, P14
Homework 6: The Link Layer (Chapter 5)
Assigned: Feb. 23th Due: Mar. 2nd Problems: P1, P2, P6 (b only), P12, P19, P21, P33
All exercises are from the Problems section of the textbook.
Homework 5: The Network Layer (Chapter 4)
Assigned: Feb. 21st Due: Feb. 28th Problems: P8, P16, P20, P25c, P26, P33, P35, P40, P45
All exercises are from the Problems section (not Review Questions) of Chapter 4 the textbook (pages 424-435).
Homework 4: The Transport Layer (Chapter 3)
Assigned: Jan. 26th Due: Jan. 31st Problems: P4, P14, P19, P24, P27, P42, P47
All exercises are from the Problems section (not Review Questions) of Chapter 3 the textbook (pages 299-311).
Homework 3: The Application Layer (Chapter 2)
Assigned: Jan. 12th Due: Jan. 19th Problems: P6, P8, P9, P11, P18, P19 (do 2 sites for part b), P21, P30, P31
All problems are from the Problems section (not Review Questions) section of Chapter 2 of the Textbook (pages 181-189).
Exercise 1: Your first application layer protocol
Design a client/server protocol for a game lobby. What messages do you need? What occurs on the server when a particular message is received? A finite-state machine helps tremendously in the design!
Homework 2: Computer Networks and the Internet (Chapter 1)
Assigned: Jan. 5th Due: Jan. 12th Problems: P2, P5, P6, P10, P14, P16, P23, P30
All problems are from the Problems section (not Review Questions) section of Chapter 1 of the Textbook (pages 72-79).
Homework 1: The Topology of the Internet, kinda
Assigned: Jan. 3rd Due: Jan. 5th
In this assignment you will use the traceroute (tracert for Windows users) program to find the route to three (3) of your favorite sites on the Internet. Draw a graph of your results, labeling each node with the IP address of the hops between your location and the destinations. The links between them should be marked with the measured delays between each link.
In addition, you will need to download Wireshark (freely available) and run it somewhere on the DU network for 30 seconds. Record all the packet types you saw and make a simple pie chart showing divisions by packet type.
- Assignment 1
- Assignment 2
- Assignment 3
- Assignment 4
- Assignment 5
Announcements
- Instructions
Related links
- Kurose Ross
- Student Resources
- Assignments 30
- Attendance 2[bonus]
Browse Course Material
Course info.
- Prof. Hari Balakrishnan
Departments
- Electrical Engineering and Computer Science
As Taught In
- Computer Networks
Learning Resource Types
Assignments.
You are leaving MIT OpenCourseWare
Computer Networks
Important questions and answers, question paper download, online study material, lecturing notes, assignment, reference, wiki.
PHYSICAL LAYER
Data link layer, network layer, transport layer, application layer.
Privacy Policy , Terms and Conditions , DMCA Policy and Compliant , Contact
Contact Us(Customer Care) Via Social Media
Copyright © 2018-2024 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.
Assignments:
New York University
Computer Science Department
Courant Institute of Mathematical Sciences
Course Title: Data Communication & Networks Course Number: g22.2662-001
Instructor: Jean-Claude Franchitti Session: 4
Assignment #2
I. Due Thurday March 6, 2008, at the beginning of class.
II. Objectives
- See protocols in action.
III. References
- Slides and handouts posted on the course Web site
- Textbook chapters as applicable
IV. Software Required
- Wireshark Packet Sniffer and Packet Capture Library (see section V below).
- Microsoft Word.
- Win Zip as necessary.
V. Assignment
Preamble and Disclaimer:
As noted on the corresponding SourceForge site, the Ethereal development team switched names from Ethereal to Wireshark in May 2006 due to trademark issues (see http://www.wireshark.org/faq.html#q1.2 for more details on this). Incidentally, some people pronounce the name Ethereal as “ether-real,” while others pronounce it “e-thir-E-al,” as in the English word ethereal, which means ghostly or insubstantial. The Ethereal name’s origin comes from the Ethernet protocol, a link-level protocol that is studied extensively in Chapter 5 of the textbook, and in the class labs.
1. Wireshark Lab - Getting Started
One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that accompany the textbook take the first approach. In the Wireshark labs, we’ll take the latter approach. You’ll be running various network applications in different scenarios using a computer on your desk, at home, or in a lab. You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of “live” labs in this class. You’ll observe, and you’ll learn, by doing.
The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer . As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A packet sniffer itself is passive. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. Similarly, received packets are never explicitly addressed to the packet sniffer. Instead, a packet sniffer receives a copy of packets that are sent/received from/by application and protocols executing on your machine.
Figure 1 shows the structure of a packet sniffer. At the right of Figure 1 are the protocols (in this case, Internet protocols) and applications (such as a web browser or ftp client) that normally run on your computer. The packet sniffer, shown within the dashed rectangle in Figure 1 is an addition to the usual software in your computer, and consists of two parts. The packet capture library receives a copy of every link-layer frame that is sent from or received by your computer. Recall from the discussion from section 1.5.2 in the text (Figure 1.20 in the 4 th Edition of the textbook used for the class) that messages exchanged by higher layer protocols such as HTTP, FTP, TCP, UDP, DNS, or IP all are eventually encapsulated in link-layer frames that are transmitted over physical media such as an Ethernet cable. In Figure 1, the assumed physical media is an Ethernet, and so all upper layer protocols are eventually encapsulated within an Ethernet frame. Capturing all link-layer frames thus gives you all messages sent/received from/by all protocols and applications executing in your computer.
The second component of a packet sniffer is the packet analyzer , which displays the contents of all fields within a protocol message. In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the text.
We will be using the Wireshark packet sniffer (i.e., www.wireshark.org) for these labs, allowing us to display the contents of messages being sent/received from/by protocols at different levels of the protocol stack. (Technically speaking, Wireshark is a packet analyzer that uses a packet capture library in your computer). Wireshark is a free network protocol analyzer that runs on Windows, Linux/Unix, and Mac computers. It’s an ideal packet analyzer for our labs – it is stable, has a large user base and well-documented support that includes:
(a) A user-guide (i.e., http://www.wireshark.org/docs/ )
(b) Man pages (i.e., http://www.wireshark.org/docs/man-pages/ )
(c) A detailed FAQ (i.e., http://www.wireshark.org/faq.html )
(d) Rich functionality that includes the capability to analyze more than 500 protocols
(e) A well-designed user interface
The Wireshark packet sniffer operates in computers using Ethernet to connect to the Internet, as well as so-called point-to-point protocols such as PPP.
2. Wireshark Lab – Getting Wireshark
In order to run Wireshark, you will need to have access to a computer that supports both Wireshark and the libpcap packet capture library. If the libpcap software is not installed within your operating system, you will need to install libpcap or have it installed for you in order to use Wireshark. See http://www.wireshark.org/download.html for a list of supported operating systems and download sites.
Download and install the Wireshark and (if needed) the libpcap software:
· If needed, download and install the libpcap software. Pointers to the libpcap software are provided from the Wireshark download pages. For Windows machines, the libpcap software is known as WinPCap , and can be found at http://winpcap.mirror.ethereal.com/ .
· Go to www.wiresharkl.org and download and install the Wireshark binary for your computer. It is recommended to download from http://sourceforge.net/project/showfiles.php?group_id=255 which includes a WinPCap bundle option.
· Download the Wireshark user guide. You will most likely only need Chapters 1 and 3.
The Wireshark FAQ has a number of helpful hints and interesting tidbits of information, particularly if you have trouble installing or running Wireshark.
3. Wireshark Lab – Running Wireshark
When you run the Wireshark program, the Wireshark graphical user interface shown in Figure 2a will be displayed. Initially, no data will be displayed in the various windows.
Figure 2a: Wireshark Capture Options Window
Figure 2 below shows the original Ethereal graphical user interface along with an explanation of the various areas which applies to both Ethereal and Wireshark.
The Wireshark interface has five major components:
· The command menus are standard pulldown menus located at the top of the window. Of interest to us now are the File and Capture menus. The File menu allows you to save captured packet data or open a file containing previously captured packet data, and exit the Wireshark application. The Capture menu allows you to begin packet capture.
· The packet-listing window displays a one-line summary for each packet captured, including the packet number (assigned by Wireshark; this is not a packet number contained in any protocol’s header), the time at which the packet was captured, the packet’s source and destination addresses, the protocol type, and protocol-specific information contained in the packet. The packet listing can be sorted according to any of these categories by clicking on a column name. The protocol type field lists the highest level protocol that sent or received this packet, i.e., the protocol that is the source or ultimate sink for this packet.
· The packet-header details window provides details about the packet selected (highlighted) in the packet listing window. (To select a packet in the packet listing window, place the cursor over the packet’s one-line summary in the packet listing window and click with the left mouse button.). These details include information about the Ethernet frame and IP datagram that contains this packet. The amount of Ethernet and IP-layer detail displayed can be expanded or minimized by clicking on the right-pointing or down-pointing arrowhead to the left of the Ethernet frame or IP datagram line in the packet details window. If the packet has been carried over TCP or UDP, TCP or UDP details will also be displayed, which can similarly be expanded or minimized. Finally, details about the highest level protocol that sent or received this packet are also provided.
· The packet-contents window displays the entire contents of the captured frame, in both ASCII and hexadecimal format.
· Towards the top of the Wireshark graphical user interface, is the packet display filter field, into which a protocol name or other information can be entered in order to filter the information displayed in the packet-listing window (and hence the packet-header and packet-contents windows). In the example below, we’ll use the packet-display filter field to have Wireshark hide (not display) packets except those that correspond to HTTP messages.
4. Wireshark Lab – Taking Wireshark for a Test Run
The best way to learn about any new piece of software is to try it out! Do the following
1. Start up your favorite web browser, which will display your selected homepage.
2. Start up the Wireshark software. You will initially see a window similar to that shown in Figure 2, except that no packet data will be displayed in the packet-listing, packet-header, or packet-contents window, since Wireshark has not yet begun capturing packets.
3. To begin packet capture, select the Capture pull down menu and select Options . This will cause the “Wireshark: Capture Options” window to be displayed, as shown in Figure 3.
Figure 3: Wireshark Capture Options Window
4. You can use all of the default values in this window. The network interfaces (i.e., the physical connections) that your computer has to the network will be shown in the Interface pull down menu at the top of the Capture Options window. In case your computer has more than one active network interface (e.g., if you have both a wireless and a wired Ethernet connection), you will need to select an interface that is being used to send and receive packets (mostly likely the wired interface). After selecting the network interface (or using the default interface chosen by Wireshark), click Start . Packet capture will now begin - all packets being sent/received from/by your computer are now being captured by Wireshark!
5. After you begin packet capture, you can select Statistics > Protocol Hierarchy from the command menus to obtain a summary of the number of packets of various types that are being captured as shown in Figure 4.
Figure 4: Wireshark Protocol Hierarchy Statistics
6. While Wireshark is running, enter the URL: http://gaia.cs.umass.edu/ethereal-labs/INTRO-ethereal-file1.html and have that page displayed in your browser. In order to display this page, your browser will contact the HTTP server at gaia.cs.umass.edu and exchange HTTP messages with the server in order to download this page, as discussed in section 2.2 of the text. The Ethernet frames containing these HTTP messages will be captured by Wireshark.
7. After your browser has displayed the INTRO-ethereal-file1.html page, stop Wireshark packet capture by selecting Capture > Stop in the Wireshark in the command menus. The Wireshark window will display all packets captured since you began packet capture. The Wireshark window should now look similar to Figure 2. You now have live packet data that contains all protocol messages exchanged between your computer and other network entities! The HTTP message exchanges with the gaia.cs.umass.edu web server should appear somewhere in the listing of packets captured. But there will be many other types of packets displayed as well (see, e.g., the many different protocol types shown in the Protocol column in Figure 2). Even though the only action you took was to download a web page, there were evidently many other protocols running on your computer that are unseen by the user. We’ll learn much more about these protocols as we progress through the text! For now, you should just be aware that there is often much more going on than “meet’s the eye”!
8. Type in “http” (without the quotes, and in lower case – all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window. Then select Apply (to the right of where you entered “http”). This will cause only HTTP message to be displayed in the packet-listing window.
9. The HTTP GET message that was sent from your computer to the gaia.cs.umass.edu HTTP server should be shown among the first few http message shown in the packet-listing window. When you select the HTTP GET message, the Ethernet frame, IP datagram, TCP segment, and HTTP message header information will be displayed in the packet-header window. Recall that the HTTP GET message that is sent to the gaia.cs.umass.edu web server is contained within a TCP segment, which is contained (encapsulated) in an IP datagram, which is encapsulated in an Ethernet frame. If this process of encapsulation isn’t quite clear yet, review section 1.5 in the text. By clicking on the expansion buttons (+ or -) to the left side of the packet details window, you can minimize or maximize the amount of Frame, Ethernet, Internet Protocol, and Transmission Control Protocol information displayed. Maximize the amount information displayed about the HTTP protocol. Your Wireshark display should now look roughly as shown in Figure 5 (Note, in particular, the minimized amount of protocol information for all protocols except HTTP, and the maximized amount of protocol information for HTTP in the packet-header window).
10. Exit Wireshark
Figure 5: Wireshark Display After Step 9
Congratulations! You’ve now completed the first lab.
5. Wireshark Lab – What to hand in
The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation.
1. What is the MAC address of your Host? You can find this in the frame level information.
2. List the different protocols that appear in the protocol column in the unfiltered packet-listing window in step 4.7 above.
3. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet-listing window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format , then select Time-of-day .)
4. What is the Internet address of the gaia.cs.umass.edu (also known as www-net.cs.umass.edu)? What is the Internet address of your computer?
5. Print the two HTTP messages displayed in step 4.9 above. To do so, select Print from the Wireshark File command menu, and select “ Selected Packet Only” under Packet Range and “As displayed” under Packet Format and then click OK.
Save your capture in a capture file named Nxxx.cap where Nxxx is your student ID.
Submit this capture file and the answers to the questions above.
Email your assignment (archive) file to your TA.
VI. Deliverables
- Electronic: Your assignment (archive) file must be emailed to the TA. The file must be created and sent by the beginning of class. After the class period, the homework is late. The email clock is the official clock.
- Written: Printout of the file(s) included in your assignment (archive) file. The cover page supplied on the next page must be the first page of your assignment file
Fill in the blank area for each field.
The sequence of the hardcopy submission is:
1. Cover sheet
1. Assignment Answer Sheet(s)
VII. Sample Cover Sheet
Name ________________________ Username: ______________ Date: ____________ (last name, first name) Section: ___________
Assignment 2
Assignment Layout (25%)
o Assignment is neatly assembled on 8 1/2 by 11 paper.
o Cover page with your name (last name first followed by a comma then first name), username and section number with a signed statement of independent effort is included.
o Answers to all assignment questions are correct. o File name is correct.
Total in points ___________________ Professor’s Comments:
Affirmation of my Independent Effort: _____________________________
(Sign here)
Table of Contents
Basic computer networks interview questions, advanced computer networks interview questions, top 30 computer networks interview questions and answers.
A set of computers connected to share resources is known as a computer network. The primary resource shared over the network is the Internet. Another example is the sharing of a printer between different computers. However, the best example is the Internet. In this article, you are going to discover the most frequently asked computer network interview questions. If you are looking for a career in IT hardware and networking , you need to prepare them. Every interview is different, but we have covered the most critical computer network interview questions that can help you succeed.
The computer network interview questions are divided into two parts as follows:
- Basic computer network interview questions
- Advanced computer network interview questions
Let us start with some basic computer networks interview questions!
1. What is meant by a link and node?
A network includes two or more computers connected directly by a physical medium like coaxial cable or optical fiber. Link is the physical medium of connection in this setup, and nodes are the computers connected.
2. Define IP address.
In a network system, an IP address is a unique software address of a computer. It is 32 bit.
3. What do you understand by DNS?
There are two types of server/client programs. One is directly used by the user and the other support application programs. Domain Name system belongs to the second type as it is used by other programs, for example, to find the IP address of an e-mail recipient.
4. What is a peer-to-peer process?
A peer-to-peer process refers to all processes on a machine that communicates at a given layer.
5. Define network topology.
Network topology refers to the network's physical structure that defines how nodes or computers will be connected.
6. What is a firewall?
A firewall is a security system concept that helps in protecting computers from any cyber-attack or unauthorized access.
7. Tell us the maximum segment length of the 100Base-FX network.
The maximum length of a 100Base-FX network is 412 meters.
8. What is the role of the network layer in the OSI reference model?
The network layer is responsible for packet switching, control of network congestion, and data routing. This layer has routers operating under it.
9. Explain OSI and its role in computer networks.
OSI or Open Systems Interconnect is a reference model for data communication. It has seven layers, each defining a particular aspect of how network devices communicate and connect. One layer dictates how data is transmitted, while the other deals with physical media used.
10. Give the disadvantage of the peer-peer network.
As the resources to be accessed are shared by one of the workstations on the network, there is a performance hit.
11. Define ping.
Ping is a utility program that allows us to check connectivity on the network between network devices. A device can be pinged by using its device name(like computer name) or IP address.
12. What is meant by clustering support?
Clustering support is the ability of a network operating system in a fault-tolerant group to connect multiple servers. The primary purpose of clustering is that if one server fails, the processing can continue with the next server in the cluster.
13. How does dynamic host configuration protocol help in network administration?
The network administrator applies the dynamic host configuration protocol to create a pool of IP addresses instead of visiting each client computer to configure a static IP address. This pool is known as the scope that can be assigned to clients dynamically.
14. What do you understand by decoder?
The decoder is a type of circuit that converts the digital signal into an analog signal and encoded data into its original format.
15. Can you tell us about the use of Pseudo TTY?
It is a false terminal allowing external machines to log in or to connect through Telnet. No connection can take place without it.
16. Tell us about the advantages of a Modem.
Some advantages of modem are:
- Its speed depends on the cost
- It is more helpful in connecting LAN with the Internet
- It is the most widely used data communication roadway.
17. Explain Proxy Server and its function.
IP addresses are required for data transmission and are even used by DNS to route to the correct website. Without knowledge of the actual and correct IP address, it is not possible to identify the network's physical location. Proxy servers prevent unauthorized access of IP addresses and make the computer network virtually invisible to external users.
18. What are the characteristics of networking?
The characteristics of networking are:
- Medium- the channel used by computers for communication
- Topology- the way computers are arranged in the network physically or logically
- Protocols- deals with how computers communicate with one another.
19. What do you understand by beaconing?
When a network self-repair its issues, then it is known as beaconing. It is mainly used in Fiber Distributed Data Interface (FDDI) and token ring networks. If a device in the network faces any problem, then the devices that are not receiving any signal are notified. This way, the problem gets repaired within the network.
20. What is SLIP?
SLIP refers to Serial Line Interface Protocol. It is used for transmitting IP datagrams over a serial line.
Next up, we will cover the ten most advanced computer networks interview questions!
1. Can you explain what LAN is?
LAN refers to Local Area Network. It is the network between devices located in a remote physical location. It can be either wired or wireless. LANs differ from each other based on given factors:
- Protocol - rules for data transfer
- Media - medium for connecting like twisted pair wires and optic fibers
- Topology - arrangement of nodes in the network
2. What is an anonymous FTP?
Anonymous FTP allows users to access public data. The user need not identify himself to the server, and the login is anonymous. So, while using anonymous FTP, you are required to add 'anonymous' in place of the user id. Anonymous FTPs effectively distribute large files to many people without giving vast numbers of password and username combinations.
3. Tell us about UTP cable.
A UTP cable is made up of copper and has a resistance of 100 ohms. It includes 2-1800 unshielded twisted pairs surrounded by a non-metallic case. These twists provide immunity to EMI and electrical noise.
4. What do you understand by TCP?
Transmission Control Protocol or TCP is a connection-oriented protocol that maintains an established connection between communicating devices until both are done exchanging messages. This protocol is used to determine how application data can be delivered over a network using packets. It also receives and sends packets from and to the network layer and is in charge of flow control.
Become a Cyber Security Professional
- 3.5 Million Unfilled Cybersecurity Roles Globally
- 700 K Available Job Roles
CISSP ® - Certified Information Systems Security Professional
- 24x7 learner assistance and support
- Batches in alignment with the new version
Cyber Security Expert
- Get Lifetime access to self-paced videos
- CEH Exam Voucher with 6 months of complimentary iLabs access
Here's what learners are saying regarding our programs:
Peter Bartow
Sr project manager it pmo at university of miami , university of miami.
I enjoyed taking the class with so many people from all over the world.
Martin Beard
Lpl financial advisor , hfcu financial services.
My learning experience with Simplilearn was enriching and valuable. It will undoubtedly help me to transition into my new chosen field of Cybersecurity. I liked the live virtual classes as well as the recorded sessions.
5. What is meant by NOS?
NOS or Network Operating System is an operating system designed to support databases, workstations, personal computers, and networks. For example, Linux , MAC OS X, Windows Server 2008. These OS provide functionalities such as multiprocessing support, processor support, web services, authentication, etc.
6. Explain piggybacking.
In two-way communication, the receiver sends an acknowledgment to the sender on receiving the data packets. Suppose the receiver does not send the acknowledgment immediately and waits till the network layer passes in the following data packet. In that case, an acknowledgment is attached to the outgoing data frame. This process is known as piggybacking.
7. What do you understand by DHCP?
Dynamic Host Configuration Protocol or DHCP is a network management protocol. DHCP automatically assigns IP addresses to the devices on the network and is used on the UDP/IP networks. In turn, it reduces the need for a network admin to assign IP addresses manually; this further reduces errors.
8. What is the best place to install an antivirus program in a network containing twenty workstations and two servers?
The best option is to install antivirus on all the computers of the network. This will protect all devices from others in case there is a virus inserted into the server.
9. Tell us about IPv6.
IPv6 refers to the Internet Protocol version 6. This is the latest version of the Internet Protocol. Its IP address length is 128 bits which resolve the issue of approaching network addresses shortage.
10. What do you understand by sneakernet?
Sneakernet refers to the unofficial term for transferring electronic information by physically moving media like the USB flash, Floppy disk, optical disks, etc.
This article is going to be helpful for everyone attending a computer network interview. As it is a complex topic, you need to be careful while answering these computer networks interview questions. You can smoothly get through the network architect interview by preparing for the topics mentioned above. We have tried to cover most of the essential things in this article. However, if you want to learn more about networking and master it in and out, you can check out our CCNA routing and switching training. What are you waiting for? Start preparing for your next computer networks interview now!
Our Cyber Security Certifications Duration And Fees
Cyber Security Certifications typically range from a few weeks to several months, with fees varying based on program and institution.
Learn from Industry Experts with free Masterclasses
Cyber security.
CISSP Demo Session
Expert Webinar: Ask Our Cyber Security Expert
Recommended Reads
Cloud Computing Interview Guide
What Is a Computer Network? Definition, Components, Objectives, and Best Practices
Top 80+ JavaScript Interview Questions and Answers for 2024
Kubernetes Interview Guide
Top 65+ JQuery Interview Questions And Answers for 2024
180+ Core Java Interview Questions and Answers for 2024
Get Affiliated Certifications with Live Class programs
- PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.
Navigation Menu
Search code, repositories, users, issues, pull requests..., provide feedback.
We read every piece of feedback, and take your input very seriously.
Saved searches
Use saved searches to filter your results more quickly.
To see all available qualifiers, see our documentation .
- Notifications
aks2507/Computer-Networks-Assignments
Folders and files, repository files navigation, computer-networks-assignments, assignment:1.
- Create processes sequentially; P1 -> P2 -> P3 -> P4
- Create two processes from single process and the parent informs whenever and whichever of the children exit; P1 -> P2, P1 -> P3
- Alternatingly post statements from two processes and use semaphores for synchronization
- Use semaphores to read and write from and to shared memory
Assignment:2
- Alternate lines read by parent and child process from a file using semaphores
- Alternate lines read by two diffrent processes from a file using semaphores
- Create two shared memories X and Y. P1 writes to X. Then P2 reads from it, then P2 changes something, writes to Y and after that, P1 reads from Y, changes something and then writes to X and so on.
Assignment:3
- Basic pipes implementation
- Parent sends a string, child makes some changes to it and then sends it back
- Parent and child chatting system using threads and pipes
- P1 sends a string, P2 makes some changes to it and then sends it back(P1 & P2 are diffrent programs)
- P1 and P2 chatting system using threads and pipes
- Implement a program using popen()
- Use popen and create nested pipes; P1 <---> P2 <---> P3 <---> P4
Assignment:4
- Implement a program using polling
- Implement a program using mkfifo()
- Chat server using mkfifo()
- Code Checker
Assignment:5
- Implement a program using raise()
- Implement a program using different kinds of signals and use user signals as well; Communicate between both child and parent
- Use two shared memories and signals to implement two way communication between two processes
- Make a handler that nullifies the functioning of Ctrl+c
- Make a handler that nullifies the functioning of Ctrl+c for only the first 5 times you press Ctrl+c
Assignment:6
- P2 receives a signal from P1 and P2 knows it is from P1
- P1 executes P2, P3 and P4, and signals all of them at the same time as a group
- Communicate between two threads within a process
- Communication between two threads in two processes. P1 sends and P2 receives
Assignment:7
- Parent Process: S; Two other processes C1 and C2 send data to S via a fifo. Another process D sends signal to S, telling to send the message from C1 and C2 to either send to G1(children S`1 and S`2) or to G2(children A and B). There is one shared memory that tells how many times kill has been called.
Assignment:8
- Basic implementation of message passing system calls like msgget(),msgsnd(),msgrcv() and msgctl()
- Peer to Peer chat using message queues
- Print all the information reagarding the message queue
- Sequentially send messages to diffrent processes i.e. P1 -> P2 -> P3 -> P4 -> P1 -> ......
- Implement the Chat Server using message queues. If P1 sends a message then P2 and P3 should see it, If P2 sends a message then P1 and P3 should see it and If P3 sends a message then P1 and P2 should see it.
Assignment:9
- Use readv() and writev() in a client-server program
Assignment:10
- Create two groups of clients. If a client wants to send a message globally, it gets broadcasted to all the clients. If it wants to send locally, it gets broadcasted only to its group. Group the clients using gids.
Assignment:11
- Implement a basic device driver
- Implement a basic character based device driver
Assignment:12->Minor Exam questions implementation
- Clients join a server in a circular manner and get notified by the previosly joined client that they have joined the client-server system. Any new client joins between C1 and the last client that joined the system.
- P1 accepts the outputs of P2, P3 AND P4 as and when they are available, and then sends those outputs to P5 and P6 for printing them. P5 and P6 should get the outputs through scanf()/cin and you should not use any read(), write() commands in P1.
Assignment:13
- Iterative Connection Oriented Client-Server system -> Where the server directly serves the client
- Concurrent Connection Oriented Client-Server system -> Where we use fork to create a child process of the server that serves the client
- Multi-service Concurrent Connection Oriented Client-Server system -> Where we use execv() to run a service that serves a client
- Multi-threaded Concurrent Connection Oriented Client-Server system -> Where we use threads to manage different clients
Assignment:14
- Using select() to implement connection between one sever and multiple clients. In this case, a group chat is implemented.
Assignment:15
- Basic implementation of UDP(Connectionless) socket programming(Client-Server)
- Client-Server chat program implemented using UDP
- One server handles a 2 TCP clients and a UDP Client
- One server handles multiple TCP and UDP Clients(The program isn't complete)
Assignment:16
- Implementing Unix Domain sockets by passing the fd of a file being read. After sender reads half the file, it send the fd to receiver to read the other half of it
Assignment:17
- fd_pass: Accepting the client connections and then passing their fds to an alternate server that serves those clients
- NITW_News: Consider the following different processes at NitwNews Channel Studio as shown in sample figure below. Editor(E) gets news from Reporters(R). Reporters type news through keyboard and send to standard output, which in turn goes to Editor. Whenever Editor receives a news, he sends the news to News Reader’s table. The News Readers N1 and N2 reads the news alternatively, i.e. arrange to display the news onto the Screen.(A news will be displayed only once onto the screen). If a News Reader notices a decimal number(port address) in the start of news content, then it gets connected to a Live telecaster(L) whose IP address is IP5, and the noticed port number. After connecting, the News Reader arranges to echo onto the screen, whatever it gets from Live telecaster. At this moment the other News Reader should not read any news as live telecast is going on. Once live telecast is over, the news reading will be done alternatively by N1 and N2 as usual. The News Reader who has got connected to live telecast should also notify the Editor, so that the editor will maintain a total count of live telecasts at any moment. This count can be seen/known by anybody in the studio. If Editor notices a news message with prefix “/d” from any of the Reporters, then it passes that Reporter to Document Writer(D). The Document Writer stores the news messages that it gets from the Reporter in a file(document). Implement all the different type of processes involved in this News Channel Studio scenario. You must have to use all the IPC (Inter Process Communication) mechanisms, 90% of I/O multiplexing, required BSD socket system calls and other suitable system calls.(This question is not possible to complete with the given set of system calls that we are taught, so don't worry if it doesn't work. It didn't work for anyone)
Assignment:18
- Implement the inetd server with multiple clients(TCP and UDP)
- Implement the dynamic inetd server(not completed in this repository)
Assignment:19
- Hamming Code generation
- Hamming Code error detection
- rpc_calc(For simple arithmetic operations)
- rpc_math(For arithmetic operations and sorting)
- rpc_squaring(For squaring a number)
- rpc_practice(Digits' sum)
- test(Just a test progrom to see if rpcgen was working fine or not)
Assignment:20
- IP header printing
- Packet sniffing
- IP Spoofing
- Svayambhoo Server -> very similar to packet sniffing program, except this has to sniff only the packets that are sent to particular ports
- A Service server process Si can accept the first client and serves. After that it does not accept.
- Any Service Server Process Si , can start its execution at any time on a different sfdi.
- A Tracer process T observes a Service server process Si serving the first client. Then it sends that service port number to Ingenerate Super Server ( ISS ) so that ISS can start accepting the second client onwards for that service request.
- After receiving a service port number from T, the ISS only accepts service requests for any of the Service server processes and passes the accepted clients to the corresponding Si
- Any client Ci can also get service port numbers from T, and can get connected for the service.
- Implement the processes ISS, T , Si , Ci. See image in the folder for further clarification
- In this case, the code is not completed
Assignment:21
- A Client Process sends an enquiry message to Server computer system, asking for what are all the service server processes available in it. All the service server processes will receive this message and each one of them replies to the client about its service information (All of them may not send replies at the same time). The client now connects to the required service sever process. A client can connect to multiple server processes. Code to implement all processes. Check the image in the folder for further clarification.(The code for this is not perfect)
- NITW Passport(This question was not solved by me, but I am still putting it up here so that one can try, if they want): Assume that a process S in a server system is providing passport verification service as follows: client processes C1, C2, C3,…Ci, which are running in the same computer system, contact the sever process S, and sends a message containing its name(Aabhaas Das), postal address (eg, H-No : 10 -12- 45, Fathima Nagar, Warangal). Names will be different but postal address is same. A process called Verifier V, is also running in the same computer system of S. Now the server process S makes arrangements, so that process V can verify the details of a Ci. The process V has to send the same details (i.e. name, postal address) to client processes and should get a confirmed message from concerned Ci. Then it informs S about the result of verification. Depending on the result of verification, process S either can issue or deny passport to Ci. The process V and a process Ci should have to use only one descriptor. (Hint: no need of signals or any IPC)
Assignment:22
- Printing ARP Header
- Printing Ethernet frame
Mid Semester Laboratory Exam Quesitons
- All in one server(Refer the image in the folder for clarification)
- Training and Placement Server(Refer the image in the folder for clarification)
End Semester Laborartory Exam Question
There was a set of several questions, out of which, I got one. I will be putting both the pdfs in the folder as well, so that one might refer the questions, if they wish. My question was as follows.(It was the 3rd question)
- Nitnetd Super Server(Privileged): Nitnetd super server is similar to inetd super server except on the limit of maximum number of clients for a particular service. Assume that Nitnetd server provides services S1, S2 on ports say 1, 2. The Nitnetd server can accept a maximum of 2 clients for S1 service on port 1, maximum of 3 clients for S2 service on port2. Once the maximum limit reaches on a port , Nitnetd will be rejecting connection requests of clients, until the running S1, S2 server processes exit after servicing some of the clients. Suppose at a moment 2 clients are being served by 2 server processes of S1. Then Nitnetd keeps rejecting of connection requests for port 1. Now, if any one S1 server process completes its service and exits, then Nitnetd can accept one client for S1 service on port1. At any time, if Nitnetd is not able to service clients because of maximum limit, it notifies to another side by server N2, which will be serving any number of the clients. But a Client should be given first preference to get connected to Nitnetd. ( As Nitnetd is the main server , assume that it provides speedy service connection than that of N2. ) Implement all the processes in this scenario. Hint : After all, the Service server processes are children of Nitnetd super server process.
-----THE END-----
- Batchfile 11.7%
Networking Projects
Networking assignment Questions
This section of the website contains networking assignment questions, network security assignment questions, CCNA assignment questions ,interview and objective questions, lab assignments. Sample questions are provided below. The detailed answers to the questions are available in the respective ebooks which can be purchased from Amazon. ——————————————————————————————————————
The following are networking based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon
PC1 PC2 and PC3 are connected to the internet via a NAT router which does port address translation. If the three PC’s simultaneously initiate a HTTP session with the web server, explain how the NAT router would handle the communication
If NAT is configured for internet sharing on a router, is it required to setup additional routing for forwarding packets to the internet or would NAT take care of the same.
An organization has a main office and 5 branch offices. It is required to connect the offices with options of using leased lines and frame relay. Give one reason from a business perspective why the organization should use frame relay for its WAN design.
A computer is connected to the internet via an ADSL router. The ADSL router is configured with appropriate DNS server IP address. Is it required to configure the DNS server IP address on the computer as well for internet access.
Telnet uses TCP port 23. Does this imply that the telnet connection initiated by a user connecting to the router from a computer uses TCP port 23
The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon ——————————————————————————————————————
CCNA assignment Questions
The following are CCNA based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook CCNA Interview Questions and Answers
Two interfaces of a router is configured with IP addresses 192.168.1.1, subnet mask 255.255.255.0 and IP address 192.168.2.1, subnet mask 255.255.255.0. Would the routing table of the router contain any information?
There are two computers connected to a switch. The switch is powered on. After the switch boots, how many entries would be available in the mac-address table of the switch?
A network has to be designed for an organization. The organization has 5 departments each of which has different network addresses, which require communication with each other. What strategy and technology can be used for achieving the same?
A PC is connected to a 5 port ethernet hub operating at 100 Mbps. Other ports of the hub are free and not connected to any other devices. At what duplex setting can the hub operate?
The IP address of a PC is 192.168.1.2/24 and its default gateway is 192.168.1.1/24. The user on the PC pings an IP address which is on a different network (IP address: 192.168.2.2, Default gateway: 192.168.2.1). What would be the destination IP address in the IP header in the ping response packet coming from the IP address 192.168.2.2?
—————————————————————————————————————-
Network security assignment questions
The following are network security based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook Network Security Interview Questions and Answers
An organization uses a Cisco router for routing between its internal networks. What feature on the router can be used to block access specifically between two internal networks
An organization has a HTTPS based server behind a firewall. A website is hosted on the Web server. Which port should be open on the firewall for allowing outside users to access the HTTPS based website.
Two IPSEC routers are configured to communicate with each other. Pre-shared keys are used on both the routers. Are these keys used for encrypting data on the IPSEC tunnel
A user in an organization wishes to connect to a Web server, which is residing on the internet. The user is behind the organization firewall. What configuration should be setup on the firewall for the user to access the Web server.
A user receives a virus infected file in his email inbox. There is no antivirus on the system. Would the virus infect the system, if the user deletes the file from the inbox.
——————————————————————————————————————-
Recommended Ebooks for Assignments, Q&A, Self assessment.
250+ Network Engineer Interview Questions & Answers
The Ebook contains 250+ interview questions based on different networking and security concepts. Objective and scenario based questions with detailed answers are included.
- All Platforms
- First Naukri
- All Companies
- Cognizant GenC
- Cognizant GenC Next
- Cognizant GenC Elevate
- Goldman Sachs
- Infosys SP and DSE
- TCS CodeVita
- TCS Digital
- TCS iON CCQT
- TCS Smart Hiring
- Tech Mahindra
- Zs Associates
- Top 100 Codes
- Learn Python
- Learn Data Structures
- Learn Competitve & Advanced Coding
- Learn Operating System
- Software Engineering
- Online Compiler
- Microsoft Coding Questions
- Amazon Coding Questions
- Learn Logical
- Learn Verbal
- Learn Data Interp.
- Psychometric Test
- All Syllabus
- Cognizant-Off Campus
- L&T Infotech
- Mahindra ComViva
- Reliance Jio
- Wells Fargo
- ZS-Associates
- Interview Preparation
- HR Interview
- Virtual Interview
- Technical Interview
- Group Discussions
- All Interview Exp.
- Accenture ASE
- ZS Associates
- Get OffCampus updates
- On Instagram
- On LinkedIn
- On Telegram
- On Whatsapp
- AMCAT vs CoCubes vs eLitmus vs TCS iON CCQT
- Companies hiring via TCS iON CCQT
- Companies hiring via CoCubes
- Companies hiring via AMCAT
- Companies hiring via eLitmus
- Companies hiring from AMCAT, CoCubes, eLitmus
- Prime Video
PrepInsta Prime
- The Job Company
- Placement Stats
Notifications Mark All Read
No New notification
- Get Prime
- Persistent Home
- Previous Papers
Persistent Syllabus
- Logical Reasoning
- Verbal English
- Computer Science
- Automata Questions
- Coding Questions
- Advanced Coding
- Super Achiever Test
- Drona Interview
- Recruitment process
- Eligibility Criteria
Get Hiring Updates
Computer networks questions and answers, free material.
Computer Networks Quiz-1
Paid Material
Computer Networks Quiz-2
Computer Networks Quiz-3
Computer Networks Quiz-4
Complete Mock Subscription for Persistent
76% of prime members learners got selected in Persistent
7 out of 10 fresh grads in Persistent are from PrepInsta
3,110+ bought in last 1 Month
Login/Signup
Personalized Analytics only Availble for Logged in users
Analytics below shows your performance in various Mocks on PrepInsta
Your average Analytics for this topic
Topic Mocks completed
0 out of 4 Mocks
Related Banners
Prepinsta Prime
Get Prepinsta Prime
Get all 200+ courses offered by Prepinsta
Check out our instagram
Never Miss an OffCampus Update
Get OffCampus Updates on Social Media from PrepInsta
Follow us on our Media Handles, we post out OffCampus drives on our Instagram, Telegram, Discord, Whatsdapp etc.
Get over 200+ course One Subscription
Get PrepInsta Prime Subscription
TCS, Cognizant, Delloite, Infosys, Wipro, CoCubes, KPMG, Amazone, ZS Associates, Accenture, Congnizant & other 50+ companies
Programming
Data Structures, Top 500 Codes, C, C++, Java Python & other 10+ subjects
Full Stack Web Development, Data Science, Machine Learning, AWS Cloud, & other 10+ skills and 20+ projects
OffCampus Updates
Never Miss OffCampus Updates
Get OffCampus Update from PrepInsta
Follow us on our Social Media Handles
Related Pages
Persistent Aptitude Questions
Persistent Logical Questions
Persistent Verbal English
Persistent Advanced Coding Questions
Persistent Super Achiever Test
September 16, 2022
Computer Bits Daily
- Install Android App
- _C Programming App
- Privacy Policy
- Computer Basic
- Tutorial & More
- _C Programming
- _Computer Network
- _Operating System
- _Prog. & DS
- _Static Webpage
- _Basic Computer
- _Python PDA
- _JOC Python
Computer Networks And Internet Protocol | NPTEL
Computer networks and internet protocol - assignment: answer with explanation.
The broad objective of the course is to understand - (i) the architecture and principles of today's computer networks, (ii) the protocols and their functionalities, (iii) the requirements for the future Internet and its impact on the computer network architecture. In this course, we'll broadly cover the basic TCP/IP protocol stack and touch on the next generation computer networks. We'll take a top-down approach to cover different protocols at the TCP/IP protocol stack.
Computer Networks And Internet Protocol: Welcome to NPTEL Online Course - Jan 2023!!
Computer networks and internet protocol - week 1 | assignment 1 [jan 2023] - click for solution, computer networks and internet protocol - week 2 | assignment 2 [jan 2023] | nptel - click for solution, computer networks and internet protocol - week 3 assignment 3 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 4 assignment 4 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 5 assignment 5 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 6 assignment 6 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 7 assignment 7 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 8 assignment 8 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 9 assignment 9 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 10 assignment 10 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 11 assignment 11 | nptel | jan 2023 - click for solution, computer networks and internet protocol - week 12 assignment 12 | nptel | jan 2023 - click for solution, learn python at "computer courses - android app" - click to install .
Posted by: PRG
You may like these posts, post a comment, popular posts.
Run Python Program on android with termux
Run C plus plus Program on android with termux - Computer Bits Daily
Run C Program on android with termux
- Android App
- Basics of computer knowledge
- c on termux
- Compute Learning Android App
- Computer Fundamental
- Data Structure
- Excel
- html css javascript
- Operating System practical list 4330703
Search This Blog
Install android app, subscribe us.
Amazon Associate Disclosure
- Android App 2
- Basics of computer knowledge 26
- c programming 2
- Compute Learning Android App 2
- computer bits daily 5
- Computer Fundamental 26
- Data Structure 4
- Ethical Hacking 2
- Excel 7
- Excel formula 4
- google spreadsheet 3
- google tricks and tips 3
- Microsoft Word 1
- Motivational Quotes 1
- Operating System practical list 4330703 1
- Power Point MCQs 1
- powerpoint 1
- windows 10 1
- windows 11 7
Menu Footer Widget
Contact form.
Engineering Mathematics
Discrete mathematics, operating system.
- Computer Networks
Digital Logic and Design
- C Programming
- Data Structures
Theory of Computation
Compiler design.
- Computer Org and Architecture
- Previous Years GATE CSE and IT Papers Download Link
Data Structure & C Programming
- Data Structures & C Programming - GATE CSE Previous Year Questions
- Top MCQs on Array Data Structure with Answers
- Top MCQs on Linked List Data Structure with Answers
- Top MCQs on Stack Data Structure with Answers
- Top MCQs on Queue Data Structure with Answers
- Top MCQs on Binary Trees Data Structure with Answers
- Top MCQs on Binary Search Tree (BST) Data Structure with Answers
- Top MCQs on Tree Traversal with Interview Question and Answers | DSA Quiz
- Top MCQs on B and B+ Trees with Answers
- Top MCQs on Heap Data Strcuture with Answers
- Top MCQs on Graph Data Strcuture with Answers
- Top MCQs on Hash Data Strcuture with Answers
- Algorithms - GATE CSE Previous Year Questions
- Top MCQs on Complexity Analysis of Algorithms with Answers
- Top MCQs on Recursion Algorithm with Answers
- Top MCQs on Searching Algorithm with Answers
- Top MCQs on Divide and Conquer Algrithm with Answers
- Top MCQs on Greedy Algorithms with Answers
- Top MCQs on Dynamic Programming with Answers
- Top MCQs on Complexity Analysis using Recurrence Relations with Answers
- Top MCQs on NP Complete Complexity with Answers
- Top MCQs on Graph Traversals with Answers
- Top MCQs on Shortest Paths in Graphs with Answers
- Top MCQs on Minimum Spanning Tree (MST) in Graphs with Answers
- Network Layer
- Transport Layer
- Application Layer
- Network Security
- Database Design(Normal Forms)
- Transactions and concurrency control
- File structures (sequential files, indexing, B and B+ trees)
- OS CPU Scheduling
- OS Memory Management
- OS Input Output Systems
Computer Organization and Architecture
- CPU control design and Interfaces
- Secondary memory and DMA
- Combinational Circuits
- Sequential circuits
- Number Representation
- Set Theory & Algebra
- Combinatorics
- Top MCQs on Graph Theory in Mathematics
- Numerical Methods and Calculus
- Linear Algebra
- Theory of Computation - GATE CSE Previous Year Questions
- Recursively enumerable sets and Turing machines
- Undecidability
- Parsing and Syntax directed translation
- Code Generation and Optimization
Computer Networks – GATE CSE Previous Year Questions
Solving GATE Previous Year’s Questions (PYQs) not only clears the concepts but also helps to gain flexibility, speed, accuracy, and understanding of the level of questions generally asked in the GATE exam, and that eventually helps you to gain good marks in the examination. Previous Year Questions help a candidate practice and revise for GATE, which helps crack GATE with a good score.
Computer Networks Previous Year GATE Questions help in analyzing the question pattern of a subject and marking scheme as well as it helps in time management which overall increases the score in the GATE exam. With regular practice of PYQs, candidates can easily crack GATE with a good GATE Score.
Before 2006, questions asked in GATE were mainly theoretical, but in recent years, the questions asked were multiple-choice questions with a single correct option or multiple correct options. We are looking to provide the multiple-choice questions that are asked in GATE.
Computer Networks GATE Previous Year Questions
In this article, we are mainly focusing on the Computer Networks GATE Questions that are asked in Previous Years with their solutions, and where an explanation is required, we have also provided the reason.
In Computer Networks , we will deal with the following concepts. We have also provided GATE Previous Year’s Questions on these topics. Here is the list of those topics along with their links.
- Physical Layer
- Data Link Layer
Below mentioned are the links to the Computer Networks PYQ’s pages. On each page, you will get the questions asked in CN along with the years asked.
Also, here we are going to discuss some basic PYQs related to Computer Networks.
1. Which one of the following is not a client-server application? [GATE CSE 2010] (A) Internet Chat (B) Web Browsing (C) Email (D) ping Solution: Correct answer is ( D )
For more, refer to GATE CS 2010 | Question 16.
2. Match the following. [GATE CSE 2007] (P) SMTP (1) Application layer (Q) BGP (2) Transport layer (R) TCP 3) Data link layer (S) PPP (4) Network layer (5) Physical layer (A) P-2, Q-1. R-3, S-5 (B) P-1, Q-4, R-2, S-3 (C) P-1, Q-4, R-2, S-5 (D) P-2, Q-4, R-1, S-3 Solution: Correct answer is ( B )
For more, refer to GATE | GATE-CS-2007 | Question 70.
3. Choose the best match between Group 1 and Group 2. [GATE CSE 2004] Group-1 Group-2 P. Data Link Layer 1. Ensures reliable transport of data over a physical point-to-point link Q. Network layer 2. Encoder/Decoder data for physical transmission R. Transport layer 3. Allows end-to-end communication between two processes 4. Routes data from one network node to the next (A) P-1, Q-4, R-3 (B) P-2, Q-4, R-1 (C) P-2, Q-3, R-1 (D) P-1, Q-3, R-2 Solution: Correct answer is ( A )
For more, refer to GATE | GATE-CS-2004 | Question 15 .
GATE CSE Previous Year Question Papers
These previous year’s questions help you in understanding the question patterns followed by GATE that directly help a candidate in scoring good marks in GATE. Below are the mentioned links of year-wise GATE Previous Question Papers.
Please Login to comment...
Similar reads.
- GATE-CS-2012
COMMENTS
Assignment Code : BCA (5)CS-68/Assignment/08. Note : Attempt all Questions. Question 1: Draw the TCP/IP network architectural model and explain the features of various layers. Also list the important protocols at each layer and describe its purpose. Briefly describe the difference between the OSI and TCP/IP architectural model.
A computer network is a collection of various computing machines that are able to share each other's resources in a mannerly fashion. A computer network is at the centre of all the modern processes and computational exercises. ... Networking Practice Questions has questions based on the concepts of Computer Networks, The OSI Model, Computer and ...
Question 9. Consider the set of activities related to e-mail A : Send an e-mail from a mail client to mail server B : Download e-mail headers from mail box and retrieve mails from server to a cache C : Checking e-mail through a web browser The application level protocol used for each activity in the same sequence is. SMTP, HTTPS, IMAP.
Text: Computer Networking by Kurose and Ross TCP/IP Sockets in Java by Calvert and Donahoo (optional) electronic versions of both available on Amazon Professor Jon Turner, Bryan 522C, 935-8552 ... The table below lists reading assignments, homework questions and review questions. (Reading assignments from K&R are identified by chapter and ...
Learn for free about math, art, computer programming, economics, physics, chemistry, biology, medicine, finance, history, and more. Khan Academy is a nonprofit with the mission of providing a free, world-class education for anyone, anywhere.
In this network model, all the net flows are typically zeros. options: a. transportation b. maximal flow c. assignment d. solver View Answer TCO A) A backbone network is -a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information....
Modules 1 - 3: Basic Network Connectivity and Communications Exam Answers. Test. Modules 4 - 7: Ethernet Concepts Exam Answers. Test. Modules 8 - 10: Communicating Between Networks Exam Answers. Test. Modules 11 - 13: IP Addressing Exam Answers. Test. Modules 14 - 15: Network Application Communications Exam Answers.
Homework 1: The Topology of the Internet, kinda. Assigned: Jan. 3rd. Due: Jan. 5th. In this assignment you will use the traceroute (tracert for Windows users) program to find the route to three (3) of your favorite sites on the Internet. Draw a graph of your results, labeling each node with the IP address of the hops between your location and ...
The course will cover protocols at the Application, Transport, Network, Data link, as well as Physical layers. Lab. Assignment 1; Assignment 2; Assignment 3; Assignment 4; Assignment 5; Announcements Here is a set of sample questions for your practice. You can expect similar or more difficult questions in quizzes and other examinations ...
Computer Networks. Menu. More Info Syllabus Calendar Readings Lecture Notes Assignments Projects Tools Related Resources Assignments. ASSIGNMENTS USEFUL FILES FAQ SOLUTIONS Problem Set 1 20001206.byte ... assignment_turned_in Problem Sets with Solutions. Download Course.
If the message is sent to all the nodes in a network it is called Broadcasting. This is typically used in Local networks, for examples DHCP and ARP use broadcasting. What are layers in OSI model? There are a total of 7 layers. 1. Physical Layer. 2. Data Link Layer. 3.
COMPUTER NETWORK ASSIGNMENTS Assignments based on CS-333 (Computer Networks -I) and CS-343 (Computer Networks -II ) ... Self study questions for students : 1. List the stages of Linux boot process 2. What is runlevel? ... Network mapper tool to discover hosts and services on a computer network. $ nmap <ip-address> Output : $ nmap <server-ip ...
Gigabit Ethernet. IEEE 802.11. Bluetooth: Architecture and Devices. Connecting Devices. Backbone Networks. Virtual LANs. Virtual-Circuit Networks: Frame Relay and ATM. Asynchronous Transfer Mode (ATM) Important Short Questions and Answers: Computer Networks - Data Link Layer.
4. MCQ on Application Layer. The section contains Computer Network multiple choice questions and answers on application layer, http, ftp, smtp, dns, dhcp, ipsecurity, virtual private networks, smi, and telnet. Application Layer - 1. Application Layer - 2. HTTP.
Computer Networks -- Assignments. This page contains the assignments (and their solutions) for Computer Networks. All assignments are due in class (at the beginning of class!) on the due date noted in the syllabus. Assignments: Assignment #7 (due 11/27/18 at the start of class) is here. The solutions are here.
Assignment 2 . Assignment Layout (25%) o Assignment is neatly assembled on 8 1/2 by 11 paper. o Cover page with your name (last name first followed by a comma then first name), username and section number with a signed statement of independent effort is included. o Answers to all assignment questions are correct. o File name is correct.
10. Give the disadvantage of the peer-peer network. As the resources to be accessed are shared by one of the workstations on the network, there is a performance hit. 11. Define ping. Ping is a utility program that allows us to check connectivity on the network between network devices.
Assignment:1. Create processes sequentially; P1 -> P2 -> P3 -> P4. Create two processes from single process and the parent informs whenever and whichever of the children exit; P1 -> P2, P1 -> P3. Alternatingly post statements from two processes and use semaphores for synchronization.
The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon. Question 1. PC1 PC2 and PC3 are connected to the internet via a NAT router which does port address translation. If the three PC's simultaneously initiate a HTTP session with the web server, explain how the NAT router ...
Basic Networking Interview Questions. Now, let's get started with the list of top Networking Interview Questions: 1. Name two technologies by which you would connect two offices in remote locations. Two technologies that would connect two offices in remote locations are VPN and Cloud computing. 2.
Computer Networks Questions and Answers. Quiz; Free Material. Computer Networks Quiz-1. 0%. Start. Paid Material. Computer Networks Quiz-2. 0%. Start. Computer Networks Quiz-3. 0%. Start. Computer Networks Quiz-4. 0%. Start. Prime Mock. Complete Mock Subscription for Persistent. Get Prime Mock. 76% of prime members learners got selected in ...
Computer Networks And Internet Protocol - Assignment: Answer with Explanation. The broad objective of the course is to understand - (i) the architecture and principles of today's computer networks, (ii) the protocols and their functionalities, (iii) the requirements for the future Internet and its impact on the computer network architecture.
Computer Networks Previous Year GATE Questions help in analyzing the question pattern of a subject and marking scheme as well as it helps in time management which overall increases the score in the GATE exam. With regular practice of PYQs, candidates can easily crack GATE with a good GATE Score. Before 2006, questions asked in GATE were mainly ...