Two of the protocols that can be carried in the Protocol
field of an IP packet are?
A. TCP
B. UDP
C. FTP
D. TFTP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A & B
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow
different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different
MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow
different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others
- 4 bits)
Data (4 bits).
| Is This Answer Correct ? | 7 Yes | 1 No |
In IPSec what is SAD, SPD and SA's?
Which layer are called upper layer?
What command do we give if router ios is stucked?
Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc
hi friends i have a problem.plz solve this. i am working some where and i have the number of swtitch.once my project manger says that we are going to exapnd our number of employ so plz attech an another switch.i asked to my jr network engineer that take a witch and implemnt on that n/w,as he implement the switch on that n/w.thats network get down, plz tell me what is the reason of that.
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255 B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255 C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0 D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa
what is burst rate
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control
Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)
Which command we give for see routing table?