You can prepare effectively for Computer Science Engineering (CSE) GATE Computer Science Engineering(CSE) 2027 Mock Test Series with this dedicated MCQ Practice Test (available with solutions) on the important topic of "Test: Routers & Routing Algorithms". These 20 questions have been designed by the experts with the latest curriculum of Computer Science Engineering (CSE) 2026, to help you master the concept.
Test Highlights:
Sign up on EduRev for free to attempt this test and track your preparation progress.
In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair is
Detailed Solution: Question 1
Which of the following is NOT true with respect to a transparent bridge and a router?
Detailed Solution: Question 2
In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Sincemore than one path may exist between two LANs, packets may have to be routed through multiple bridges. Why is thespanning tree algorithm used for bridge-routing?
Detailed Solution: Question 3
Consider a simple graph with unit edge costs. Each node in the graph represents a router. Each node maintains a routing table indicating the next hop router to be used to relay a packet to its destination and the cost of the path to the destination through that router. Initially, the routing table is empty. The routing table is synchronously updated as follows. In each updation interval, three tasks are performed.
i. A node determines whether its neighbours in the graph are accessible. If so, it sets the tentative cost to each accessible
neighbour as 1. Otherwise, the cost is set to ∞.
ii. From each accessible neighbour, it gets the costs to relay to other nodes via that neighbour (as the next hop).
iii. Each node updates its routing table based on the information received in the previous two steps by choosing the minimum cost.
For the graph given above, possible routing tables for various nodes after they have stabilized, are shown in the following options. Identify the correct table.
Detailed Solution: Question 4
Consider a simple graph with unit edge costs. Each node in the graph represents a router. Each node maintains a routing table indicating the next hop router to be used to relay a packet to its destination and the cost of the path to the destination through that router. Initially, the routing table is empty. The routing table is synchronously updated as follows. In each updation interval, three tasks are performed.
i. A node determines whether its neighbours in the graph are accessible. If so, it sets the tentative cost to each accessible neighbour as 1. Otherwise, the cost is set to ∞.
ii. From each accessible neighbour, it gets the costs to relay to other nodes via that neighbour (as the next hop).
iii. Each node updates its routing table based on the information received in the previous two steps by choosing the minimum cost.
Continuing from the earlier problem, suppose at some time t, when the costs have stabilized, node A goes down. The cost from node F to node A at time (t + 100) is :
Detailed Solution: Question 5
A group of 15 routers are interconnected in a centralized complete binary tree with a router at each tree node. Router icommunicates with router j by sending a message to the root of the tree. The root then sends the message back down torouter j. The mean number of hops per message, assuming all possible router pairs are equally likely is
Detailed Solution: Question 6
A group of 15 routers are interconnected in a centralized complete binary tree with a router at each tree node. Router icommunicates with router j by sending a message to the root of the tree. The root then sends the message back down torouter j. The mean number of hops per message, assuming all possible router pairs are equally likely is
Detailed Solution: Question 7
Which of the following is TRUE about the interior gateway routing protocols Routing Information Protocol (RIP) and Open Shortest Path First OSPF
Consider the following statements about the routing protocols. Routing Information Protocol (RIP) and Oprn Shortest Path
First (OSPF) in an IPv4 network.
I. RIP uses distance vector routing
II. RIP packets are sent using UDP
III. OSPF packets are sent using TCP
IV. OSPF operation is based on link-state routing
Which of the above statements are CORRECT?
Detailed Solution: Question 9
In a RSA cryptosystem, a participant A uses two prime numbers P = 13 and q = 17 to generate here public and private keys. If the public key of A is 35 , then the private key of A is __________ .
Detailed Solution: Question 10
In a RSA cryptosystem, a participant A uses two prime numbers P = 13 and q = 17 to generate here public and private keys. If the public key of A is 35 , then the private key of A is __________ .
Detailed Solution: Question 11
In a RSA cryptosystem, a participant A uses two prime numbers P = 13 and q = 17 to generate here public and private keys. If the public key of A is 35 , then the private key of A is __________ .
Detailed Solution: Question 12
Consider a 128 x 103bits/second satellite communication link with one way propagation delay of 150 milliseconds.
Selective retransmission (repeat) protocol is used on this link to send data with a frame size of 1 kilobyte. Neglect the transmission time of acknowledgement. The minimum number of bits required for the sequence number field to achieve 100% utilization is ________.
Detailed Solution: Question 13
Start and stop bits do not contain any "information" but are used in serial communication for
In serial communication employing 8 data bits, a parity bit and 2 stop bits, the minimum band rate required to sustain atransfer rate of 300 characters per second is
Detailed Solution: Question 15
How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with oddparity and two stop bits in the frame?
Detailed Solution: Question 16
Count to infinity is a problem associated with
Detailed Solution: Question 17
For the network given in the figure below, the routing tables of the four nodes A, E, D and G are shown. Suppose that F has estimated its delay to its neighbors, A, E, D and G as 8, 10, 12 and 6 msecs respectively and updates its routing table using distance vector routing technique.
Detailed Solution: Question 18
Consider the following three statements about link state and distance vector routing protocols, for a large network with 500network nodes and 4000 links.
[S1]: The computational overhead in link state protocols is higher than in distance vector protocols.
[S2]: A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol.
[S3]: After a topology change, a link state protocol will converge faster than a distance vector protocol.Which one of the following is correct about S1, S2, and S3 ?
Detailed Solution: Question 19
A router uses the following routing table:
packet bearing a destination address 144.16.68.117 arrives at the router. On which interface will it be forwarded?
Detailed Solution: Question 20