Computer Networks | |||
Easy | Medium | Difficult | |
2020 | 1. NRZ encoding
2. TCP 3. TCP Header |
1. Transposition Cipher
2. Avalanche effect |
— |
2018 | 1.Data link layer
2.MIs 3.Application layer 4.Asymmetric key |
1.Data link layer
2.Transport layer 3.Encryption/Decryption |
— |
2017(Dec) | 1.IP Addressing
2.Transport layer 3.Transport layer |
1.encryption
2.Message digest 3.IP Addressing 4.Transport layer 5.Data link layer 6.Application layer |
— |
2017(May) | 1.Topology(2)
2.cables 3.IP addressing 4.Application layer 5.MAC 6.Data link layer 7.Message digest 8.Internet layer 9.PGP 10.WPA 11.SATA |
1.Network Layer | — |
2016 | 1.Bit Stuffing
2.Routing algorithms 3.Data link layers 4.Network protocol |
1.Data link layer(2)
2.Subnet mask 3.Transport layer |
1.Data link layer |
2015 | 1.IP Addressing
2.cables 3.communication 4.IP addressing 5.Transport layer 5.network layer 6.OSI layers 7.compression techniques |
1.MIs
2.Data link layer(2) 3.IP addressing |
1.Routing techniques |
2014 | 1.Network Layer(3)
2.Routing Techniques 3.Data link layer(2) 4.Application Layer |
1.RSA Algorithm
2.Network Layer(2) |
1.Network Layer
2.Data link layer |
2013 | 1.Data link layer(2)
2.Network Layer(2) 3.Transport Layer(2) 4.Application layer |
1.Data link Layer(3)
2.Encryption algorithms |
1.Mis |
2011 | 1.Data Link layer
2.Current Trends 3.Layers |
1.Ethernet Technology
2.Encryption Techniques 3.IP addressing 4.Hamming Distance 5.Data link Layer |
1.Data Link Layer |
2009 | 1.Data Link layer(3)
2.Encryption techniques (2) 3.Network Layer |
1.IP Addressing
2.Cables |
— |
2008 | 1. IP addressing
2. Network layer 3.Data link layer(3) 4.Transport layer 5.IP addressing 6.Encryption Methods |
1.Data Link layer | — |
2007 | 1.Cables
2.Data link Layer(4) 3. Mis(2) 4.Transport layer(2) 5.IP Addressing 6.Network layer 7.Routing techniques |
1.Baud rate & stop bits
2.Mis 3.Hashing |
— |