Computer Networks is an exciting topic covered by the GATE CSE Question Paper. The candidates are also advised to solve and practise these Computer Networks GATE questions. Some of the main concepts that constitute the Computer Networks GATE questions with answers PDF are Data Link Layer, IP Addressing, Network Security and more. Candidates are also advised to refer to the collection of GATE Questions Computer Networks that we have listed here in this article below.

Computer Network is an important topic covered in the GATE CSE question paper. Candidates can refer to these Computer Network Questions for GATE to get the best results. Solving these questions will help the candidates to prepare more proficiently for the GATE exams. Candidates can first solve these questions and then refer back to the answers to gauge their performance. Meanwhile, candidates can find the Computer Networks GATE Question with Answers in this article below. They can also refer to these GATE previous year question papers and start preparing for the exams.

Note: We shall be updating the answers/ solutions for these questions soon.

Computer Network GATE Questions with Solutions

From The Computer Network Topic of the GATE CSE Question Paper

MCQ – Single Answer Computer Networks GATE Questions

1) What is the protocol data unit (PDU) for the application layer in the Internet stack?

a. Frame

b. Datagram

c. Segment

d. Message

2) Which among this is not a client-server application?

a. Ping

b. Web-browsing

c. Internet Chat

d. Email

3) If an Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it:245.248.128.0/20 and the ISP wants to give half of this chunk of address to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Then, which among the following is a valid allocation of addresses to A and B?

a. 245.248.132.0/22 and 245.248.132.0/21

b. 245.248.136.0/21 and 245.248.128.0/22

c. 245.248.128.0/21 and 245.248.128.0/22

d. 245.248.136.0/22 and 245.248.132.0/21

4) The pairs of OSI protocol layer/sub-layer and its functionality are given below, the INCORRECT pair from among these are:

  1. Data Link Layer and Bit synchronization
  2. Network Layer and Routing
  3. Medium Access Control sub-layer and Channel sharing
  4. Transport Layer and End-to-end process communication

5) A firewall is installed at the point where the secure internal network and untrusted external network meet, which is also known as______

  1. Secure point
  2. Meeting point
  3. Chock point
  4. Firewall point

6) What does DHCP stand for?

  1. Dynamic Host Configuration Protocol
  2. Dynamic Host Configuration Provider
  3. Digital Host Communication Provider
  4. Digital Host Communication Protocol

 

7) The growth of congestion window occurs_____

  1. Infinitely
  2. Up to timeout
  3. Up to threshold
  4. Up to the size of receiver’s window

8) When was Aloha developed?

  1. In 1990
  2. In 1980
  3. In 1970
  4. In 1960

9) Which of these is a Transmission media that can be used in LAN?

  1. fibre optics
  2. coaxial cable
  3. microwave
  4. satellite

 

10) Which of these protocols given below uses UDP as transport protocol?

  1. DNS
  2. Telnet
  3. HTTP
  4. SMTP

11) LANs can be connected by a device known as ______

  1. Ethernet card
  2. Modems
  3. Routers
  4. Bridges

12) What is the bit rate In Ethernet when Manchester encoding is used?

  1. Same as the baud rate
  2. Twice the baud rate
  3. Half the baud rate
  4. None of these

13) What is slot time for gigabit Ethernet?

  1. 0.612
  2. 0.512
  3. 0.412
  4. 0.312

14) Radio waves are _____

  1. directional
  2. bidirectional
  3. omnidirectional
  4. unidirectional

15) The term that refers to the shortest unit and carries data elements is______

  1. Single element
  2. Data carrier
  3. Signal element
  4. Both b and c

16) Which architecture is FTP built on?

  1. P2P
  2. Client-server
  3. Both the above
  4. None of these

17) What is the address resolution protocol (ARP) used for?

  1. Finding the IP address of the default gateway
  2. Finding the MAC address that corresponds to an IP address
  3. Finding the IP address that corresponds to a MAC address
  4. Finding the IP address from the DNS

18) Which of the following are not true characteristics of NetBEUI?

  1. Fast for small networks to Self-tuning
  2. Little configuration required
  3. Routable
  4. Highly customizable

19) Identify the correct option for the given assertion and reason

Assertion: In IEEE 802.3 is not suitable for client server application

Reason: In Ethernet, there is a restriction on minimum size.

a. Assertion and Reason, both are true

b. Assertion and reason are false

c. Assertion is true and reason is false

d. Assertion and reason are true, but this is not the correct reason for the given assertion

20) Consider that a computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16 Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?

  1. 8 seconds
  2. 5 seconds
  3. 2 seconds
  4. 1.6 seconds

21) In Unicast Routing, we use shortest path tree method for finding shortest path of the______

  1. Nodes
  2. Networks
  3. Packets
  4. Frames

22) Which is the network that provides high speed connectivity?

  1. Internetwork
  2. WAN
  3. LAN
  4. MAN

23) What is the maximum number of subnets and the maximum number of hosts in each subnet, if the address of a class B host is to be split into subnets with a 6-bit subnet number?

a. 64 subnets and 262142 hosts

b.62 subnets and 262142 hosts

c. 64 subnets and 1024 hosts

d.  62 subnets and 1022 hosts

24) Which of the following statements about HTTP are false?

  1. HTTP describe the structure of web page
  2. HTTP run over TCP
  3. HTTP can be used to test the validity of hyper link test
  4. HTTP allows information to be stored in url

25) What is an anticipated result from multi programming operations?

  1. Handling of more jobs
  2. Reduced computer idle time
  3. Better scheduling of work
  4. All of the above

26) What is the Network, in which every computer is capable of playing the role of client, server or both at the same time?

  1. dedicated server network
  2. local area network
  3. wide area network
  4. peer-to-peer network

27) Match the following:

(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer

(a) P – 2 Q – 1 R – 3 S – 5

(b) P – 1 Q – 4 R – 2 S – 5

(c) P – 1 Q – 4 R – 2 S – 3

(d) P – 2 Q – 4 R – 1 S – 3

28) If a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits second) over a 1 km(kilometer) cable with no repeaters and the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable?

  1. 16000
  2. 20000
  3. 10000
  4. 8000

29) One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of these below given statements best explains the need for this field?

(a) It can be used to reduce delays

(b) It can be used to optimize throughput

(c) It can be used to prioritize packets

(d) It can be used to prevent packet looping

30) A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide, and A wins the first back off race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second back off race is_____

  1. 0.625
  2. 0.75
  3. 0.5
  4. 1.0

31) In a packet switching network, packets are routed from source to destination along a single path having two intermediate nodes. If the message size is 24 bytes and each packet contains a header of 3 bytes, then what is the optimum packet size?

  1. 4
  2. 6
  3. 7
  4. 9

32) Station B needs to send a message consisting of 9 packets to Station C using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that B transmits gets lost (but no acks from C ever get lost), then what is the number of packets that B will transmit for sending the message to C?

  1. 14
  2. 16
  3. 12
  4. 18

33) Which of the following assertions about the Internet Protocol (IP) is False?

  1. IP Packets from the same source to the same destination can take different routes in the network
  2. The packet source cannot set the route of an ongoing packets; the route is only determined by the routing tables in the routers on the way
  3. IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops
  4. It is possible for a computer to have multiple IP addresses

34) For an organization that has a class B network and wishes to form subnets for 64 departments, what will the subnet mask be?

  1. 255.255.64.0
  2. 255.255.64.0
  3. 255.255.128.0
  4. 255.255.252.0

35) The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is______

a.  11001001011

b. 11001001000

c. 110010010011

d.  11001010

36) If two computers C1 and C2 are configured as follows and C1 has IP address 203.197.2.53 and netmask 255.255.128.0, while C2 has IP address 203.197.75.201 and netmask 255.255.192.0, then which of the following statements is true?

  1. C2 assumes C1 is on the same network, but C1 assumes C2 is on a different network
  2. C1 assumes C2 is on the same network, but C2 assumes C1 is on a different network
  3. C1 and C2 both assume they are on different networks
  4. C1 and C2 both assume they are on the same networks

37) Look at these three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links

  • [S1] The computational overhead in link state protocols is higher than in distance vector protocols.
  • [S2] A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol.
  • [S3] After a topology change, a link state protocol will converge faster than a distance vector protocol.

Which one of the following is correct about S1, S2, and S3?

  1. S1, S2, and S3 are all false
  2. S1, S2, and S3 are all true
  3. S1 and S2 are true, but S3 is false
  4. S1 and S3 are true, but S2 is false

38) Which of these functionalities should be implemented by a transport protocol over and above the network protocol?

  1. Detection of duplicate packets
  2. End to end connectivity
  3. Packet delivery in the correct order
  4. Recovery from packet losses

39) If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth and uses CSMA/CD and the signal travels along the wire at 2108m/s, then what is the minimum size of the packet?

  1. 100 bytes
  2. 200 bytes
  3. 50 bytes
  4. None of these

40) Which is one of the pairs of protocols given below from both the protocols that can use multiple TCP connections between the same client and the server?

  1. HTTP, TELNET
  2. HTTP, SMTP
  3. FTP, SMTP
  4. HTTP, FTP

41) What is the number of 8-bit characters that can be transmitted per second over a 9600 baud serial communication link that use asynchronous mode of transmission with 8 data bits, one start bit and one parity bit?

  1. 800
  2. 600
  3. 876
  4. 1200

42) In the starting phase of TCP congestion control algorithm size of congestion control window______

  1. Increase Linearly
  2. Does not increase
  3. Increase exponentially
  4. Increase

43) If a sender is employing public key Cryptography to send a secret message to a receiver, which one of the following statements is true?

  1. Sender encrypts using his own public key
  2. Receiver decrypts using his own public key
  3. Sender encrypts using receiver’s public key
  4. Receiver decrypts using sender’s public key

44) If everyone in a group of N people want to communicate secretly with the N – 1 others using symmetric key cryptographic system and the communication between any two persons should not be decodable by the others in the group, then what is the number of keys required in the system as a whole to satisfy the confidentiality requirement?

  1. N(N-1)
  2. N(N-1) / 2
  3. 2N
  4. (N-1)2

45) Internetwork is made of five networks. Which are those?

  1. Four LANs and One MAN
  2. Four LANs and One WAN
  3. Three LANs and Two WAN
  4. Four MANs and One WAN

46) This is one of two protocols that let a network administrator supervise and distribute IP addresses from a central point. It automatically sends a new IP address when a computer is plugged into a different place in the network.

  1. UDP
  2. TCP
  3. TCPMAN
  4. DHCP

47) A sender B sends a message m to receiver A, which is digitally signed by B with its private key. In this scenario, one or more of the following security violations can take place.

I. B can launch a birthday attack to replace m with a fraudulent message

II. A third party attacker can launch a birthday attack to replace m with a fraudulent message

III. A can launch a birthday attack to replace m with a fraudulent message

Which of the following are possible security violations?

  1. I only
  2. II only
  3. II and III only
  4. I and II only

48) Take the example of 1 Mbps error-free line, with the maximum frame size of 1000 bits and new packets generated about 1 second apart . Timeout interval is 10 m/sec if the special acknowledgement timer were eliminated, unnecessary timeout would occur . In the scenario, how any times average msg would have been transmitted?

  1. Twice
  2. Only once
  3. Thrice
  4. None of the above

49) _______ has the responsibility for Accounting functions.

  1. Transport layer
  2. Data link layer
  3. Data layer
  4. Network layer

50) In a class C address, if 3 bits are borrowed for subnetting of host ID part, the total possible number of subnet masks are _________________.

Candidates can also access additional study materials such as the GATE preparation materials or the GATE previous year papers at BYJU’S. Stay tuned and get more information when they go live!

Comments

Leave a Comment

Your Mobile number and Email id will not be published.

*

*