Question
a.
n(n + 1)
b.
n(n - 1)
c.
n(n + 1) /2
d.
n(n - 1)/2
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. For n devices in a network, ____ , number of duplex-mode links are required, for a mesh topology.
nivedita : June 26, 2023
In a fully mesh network every node should be connected to every other node, hence = n ( n − 1 ) / 2 links will be there
Click to add ReplySimilar Questions
Discover Related MCQs
Q. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous? (Assuming 1 start bit and 1 stop bit)
View solution
Q. Which of the following is not a field in TCP header ?
View solution
Q. What is the propagation time if the distance between the two points is 48,900 ? Assume the propagation speed to be 2.4 x 108 meter/second in cable.
View solution
Q. _________________ is a bit-oriented protocol for communication over point-to-point and multi-point links .
View solution
Q. Which one of the following is true for asymmetric-key cryptography?
View solution
Q. A Trojan horse is
View solution
Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text
View solution
Q. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
View solution
Q. Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?
View solution
Q. Match the following port numbers with their uses :
(a) 23 (i) World wide web
(b) 25 (ii) Remote Login
(c) 80 (iii) USENET news
(d) 119 (iv) Email
code (a) (b) (c) (d)
View solution
Q. Which of the following is not associated with the session layer ?
View solution
Q. What is the size of the 'total length' field in IPv4 datagram ?
View solution
Q. Which of the following is/are restriction(s) in classless addressing ?
View solution
Q. The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :
View solution
Q. Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?
View solution
Q. Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?
View solution
Q. Which are the two modes of IP security?
View solution
Q. A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :
View solution
Q. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
View solution
Q. The maximum payload of a TCP segment is :
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Operating System
Dive deep into the core of computers with our Operating System MCQs. Learn about...
Microprocessor
Understand the heart of your computer with our Microprocessor MCQs. Topics include...