Which fields of an IP packet provide for fragmentation of
datagrams to allow differing MTUs in the internet?
A. Identification
B. Flags
C. Frag Offset
D. Type of Service
E. Total Length
Answer / guest
Answer: A, B & C
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow
different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different
MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow
different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others
- 4 bits)
Data (4 bits).
| Is This Answer Correct ? | 2 Yes | 0 No |
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) RPC
What is the cladding?
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking
Explain the term 'unicast'.
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
which portecol is faster tcp udp spx
Can you explain the difference between trusted and untrusted networks?
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
Explain what is 5-4-3 rule?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Mention what BOOTP is?
What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolution C.) Mac to IP address resolution D.) IP to Mac address resolution