adplus-dvertising
frame-decoration

Question

In link state routing algorithm after the construction of link state packets, new routes are computed using:

a.

DES algorithm

b.

Dijkstra's algorithm

c.

RSA algorithm

d.

Packets

Answer: (b).Dijkstra's algorithm

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In link state routing algorithm after the construction of link state packets, new routes are computed using:

Similar Questions

Discover Related MCQs

Q. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................

Q. Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is

Q. Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:

Q. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................

Q. A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.

Q. Which of the following statements is not true with respect to microwaves?

Q. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............

Q. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?

Q. Match the following:

List – I                           List – II
a. Session layer           i. Virtual terminal software
b. Application layer     ii. Semantics of the information transmitted
c. Presentation layer   iii. Flow control
d. Transport layer         iv. Manage dialogue control

Codes :
      a   b   c   d

Q. Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?

Q. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............

Q. Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................

Q. Consider the following statements :

a. High speed Ethernet works on optic fiber.
b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.
c. High speed Ethernet does not work on optic fiber.
d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.

Which of the following is correct ?

Q. In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.

After implementing CRC encoder, the encoded word sent from sender side is .............

Q. A slotted ALOHA network transmits 200 bits frames using a shared channel with 200 kbps bandwidth. If the system (all stations put together) produces 1000 frames per second, then the throughput of the system is .................

Q. An analog signal has a bit rate of 8000 bps and a baud rate of 1000.
Then analog signal has .............. signal elements and carry ............ data elements in each signal.

Q. The plain text message BAHI encrypted with RSA algorithm using e=3, d=7 and n=33 and the characters of the message are encoded using the values 00 to 25 for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is ............

Q. If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ...............

Q. Given the following statements:

(a) Frequency Division Multiplexing is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.
(b) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.
(c) WDM is a Digital Multiplexing Technique.
(d) TDM is a Digital Multiplexing Technique.

Which of the following is correct?

Q. A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ..............