Question
a.
nP(1-P)^n-1
b.
nP
c.
P(1-P)^n-1
d.
n^P(1-P)^n-1
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given...
Similar Questions
Discover Related MCQs
Q. Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is
View solution
Q. Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:
View solution
Q. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................
View solution
Q. A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.
View solution
Q. Which of the following statements is not true with respect to microwaves?
View solution
Q. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............
View solution
Q. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?
View solution
Q. Match the following:
List – I List – II
a. Session layer i. Virtual terminal software
b. Application layer ii. Semantics of the information transmitted
c. Presentation layer iii. Flow control
d. Transport layer iv. Manage dialogue control
Codes :
a b c d
View solution
Q. Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?
View solution
Q. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............
View solution
Q. Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................
View solution
Q. Consider the following statements :
a. High speed Ethernet works on optic fiber.
b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.
c. High speed Ethernet does not work on optic fiber.
d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.
Which of the following is correct ?
View solution
Q. In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.
After implementing CRC encoder, the encoded word sent from sender side is .............
View solution
Q. A slotted ALOHA network transmits 200 bits frames using a shared channel with 200 kbps bandwidth. If the system (all stations put together) produces 1000 frames per second, then the throughput of the system is .................
View solution
Q. An analog signal has a bit rate of 8000 bps and a baud rate of 1000.
Then analog signal has .............. signal elements and carry ............ data elements in each signal.
View solution
Q. The plain text message BAHI encrypted with RSA algorithm using e=3, d=7 and n=33 and the characters of the message are encoded using the values 00 to 25 for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is ............
View solution
Q. If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ...............
View solution
Q. Given the following statements:
(a) Frequency Division Multiplexing is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.
(b) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.
(c) WDM is a Digital Multiplexing Technique.
(d) TDM is a Digital Multiplexing Technique.
Which of the following is correct?
View solution
Q. A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ..............
View solution
Q. Match the following:
(a) Line coding (i) A technique to change analog signal to digital data.
(b) Block coding (ii) Provides synchronization without increasing
number of bits
(c) Scrambling (iii) Process of converting digital data to digital signal.
(d) Pulse code modulation (iv) Provides redundancy to ensure synchronization
and inherits error detection.
Codes:
(a) (b) (c) (d)
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!