What is the protocol number for TCP?
A.) 80
B.) 21
C.) 11
D.) 6
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Transmission Control Protocol - TCP is a connection oriented
transport
layer protocol with built in reliability. It takes a large
block of data
and breaks it down into segments. It numbers and sequences
each segment
so the destination's TCP protocol can re-assemble it back
into the
original order. TCP uses acknowledgements via sliding
windows. It has a
large overhead due to built in error checking. The protocol
use protocol
# 6.
| Is This Answer Correct ? | 22 Yes | 4 No |
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.
hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
When you mistakenly type the wrong command at the Router# prompt the router does a DNS lookup which takes about 20 seconds. Which command can you enter to prevent the router doing this in future?
What are the difference between IPv4 & IPv6?? Can anyone explain more details about it..!!
In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. host B. any C. all D. include
Which protocol will let neighbor routers know if your internetwork experienced congestion on a serial port? A.) BootP B.) IP C.) ICMP D.) ARP E.) FTP F.) RARP
What is a vlan?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What is ping? What is the usage of ping?
How many ports are present in a router?
The PDU at the network layer is a ________ Packet Frame Segment Bit