Computer Networks | |||
Easy | Medium | Difficult | |
2020 | 1. NRZ encoding 2. TCP 3. TCP Header | 1. Transposition Cipher 2. Avalanche effect | — |
2018 | 1.Data link layer 2.MIs 3.Application layer 4.Asymmetric key | 1.Data link layer 2.Transport layer 3.Encryption/Decryption | — |
2017(Dec) | 1.IP Addressing 2.Transport layer 3.Transport layer | 1.encryption 2.Message digest 3.IP Addressing 4.Transport layer 5.Data link layer 6.Application layer | — |
2017(May) | 1.Topology(2) 2.cables 3.IP addressing 4.Application layer 5.MAC 6.Data link layer 7.Message digest 8.Internet layer 9.PGP 10.WPA 11.SATA | 1.Network Layer | — |
2016 | 1.Bit Stuffing 2.Routing algorithms 3.Data link layers 4.Network protocol | 1.Data link layer(2) 2.Subnet mask 3.Transport layer | 1.Data link layer |
2015 | 1.IP Addressing 2.cables 3.communication 4.IP addressing 5.Transport layer 5.network layer 6.OSI layers 7.compression techniques | 1.MIs 2.Data link layer(2) 3.IP addressing | 1.Routing techniques |
2014 | 1.Network Layer(3) 2.Routing Techniques 3.Data link layer(2) 4.Application Layer | 1.RSA Algorithm 2.Network Layer(2) | 1.Network Layer 2.Data link layer |
2013 | 1.Data link layer(2) 2.Network Layer(2) 3.Transport Layer(2) 4.Application layer | 1.Data link Layer(3) 2.Encryption algorithms | 1.Mis |
2011 | 1.Data Link layer 2.Current Trends 3.Layers | 1.Ethernet Technology 2.Encryption Techniques 3.IP addressing 4.Hamming Distance 5.Data link Layer | 1.Data Link Layer |
2009 | 1.Data Link layer(3) 2.Encryption techniques (2) 3.Network Layer | 1.IP Addressing 2.Cables | — |
2008 | 1. IP addressing 2. Network layer 3.Data link layer(3) 4.Transport layer 5.IP addressing 6.Encryption Methods | 1.Data Link layer | — |
2007 | 1.Cables 2.Data link Layer(4) 3. Mis(2) 4.Transport layer(2) 5.IP Addressing 6.Network layer 7.Routing techniques | 1.Baud rate & stop bits 2.Mis 3.Hashing | — |