What is the protocol number for UDP?
A.) 6
B.) 17
C.) 25
D.) 21
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
User Datagram Protocol - UDP is a connectionless oriented
transport
protocol for use when the upper layers provide
error-recovery and
reliability. UDP does not sequence data or re-assemble it
into any order
after transmission. This protocol uses Port 17.
| Is This Answer Correct ? | 37 Yes | 5 No |
Answer / shafika syuhada
Flag is set in segment header. If this flag actually reads 17, it is identified as a UDP header.
| Is This Answer Correct ? | 5 Yes | 0 No |
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering
What do you mean by Port Mirroring?
what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
Tell me which multicast ip eigrp protocol use?
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A. trace B. ping C. telnet D. bootp
What is the default size of frame?
Explain the difference between igp and eigrp?
Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
Does a bridge divides a network into smaller segments?
Why do you use ‘service password encryption’?