Why Operating System Have only 65,535 port Numbers
Answers were Sorted based on User's Feedback
Answer / dez
In older computers with processors operating with a 16-bit
address bus (such as the MOS Technology 6502 and the Zilog
Z80), 65535 was the highest addressable memory location.
Such processors thus supported at most 64 kibibytes (64
KiB) of total memory. Of course, this is assuming byte-
addressed memory.
Is This Answer Correct ? | 5 Yes | 1 No |
Answer / sonu singh
Any application identify by TCP/UDP through port number .
in tcp/udp header field we see that port number is 16 bit
calculated value . so operating system have only 65535 port
number.....
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / shailendra pandey
becoz no of protocol is also 65535,so we difine to every protocol a port no
Is This Answer Correct ? | 2 Yes | 8 No |
Answer / s.m.feroz ahmed
Hi,
It is by default provided by Microsoft a maximum of 65,535
ports and one can open 65,535 IE browser sessions at a time
on each computer.
Is This Answer Correct ? | 2 Yes | 10 No |
Which show underrate serial 1 status statement indicates that the shutdown command was issued on that interface? A. Serial 1 is up line protocol is up B. Serial 1 is up line protocol is down C. Serial 1 is down line protocol is down D. Serial 1 is administratively down the line protocol is down
In how many ways you can access router?
"sap" is used by the Cisco IOS for which encapsulation types? A. Ethernet_802.2 B. Token-Ring C. FDDI_SNAP D. Ethernet_802.3 E. FDDI_802.2
What will you do if ur IOS in coorrupt/deleted/Wrong Type/No IOS image ?
How many types of nat?
Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Which of the following are examples of the Network Layer? A.) Token Ring B.) LLC C.) SQL D.) IP E.) TCP F.) IPX
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
what is the full fom of ping
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.