Which fields of an IP packet provide for fragmentation of

datagrams to allow differing MTUs in the internet?

A. Identification

B. Flags

C. Frag Offset

D. Type of Service

E. Total Length



Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in th..

Answer / guest

Answer: A, B & C

The following are the fields in an IP segment,

their length, and their definitions:

VERS (Version number - 16 bits)

HLEN (Number of 32-bit words in the header - 4 bits)

Type of Server (How the datagram should be handled - 32 bits)

Total Length (Total length of header and data - 32 bits)

Identification (Provide fragmentation of datagrams to allow

different MTUs in the internet - 4 bits)

Flags (Provide fragmentation of datagrams to allow different

MTUs in the internet - 4 bits)

Frag Offset (Provide fragmentation of datagrams to allow

different MTUs in the internet - 6 bits)

TTL (Time-To-Live - 6 bits)

Protocol (Upperlayer protocol sending the datagram - 16 bits)

Header Checksum )Integrity check on the header - 16 bits)

Source IP Address (32 bits)

Destination IP Address (32 bits)

IP Options (network testing, debugging, security and others

- 4 bits)

Data (4 bits).

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

what is firewall how fiarewall work how many interfaeces in the cisco pix 501 firewall what is the working of that dmz interface

3 Answers   Aptron, Volvo,


Which updates called incremental updates?

0 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link

2 Answers  


Why is distributed processing useful?

0 Answers  


What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA

1 Answers  


Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'

3 Answers  


Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace

2 Answers  


What are the different types of password used in securing a cisco router?

0 Answers  


Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address

1 Answers  


WHAT IS RIP PROTOCAL ?

3 Answers   NIC,


What is the default LMI type? A.) Cisco B.) ANSI C.) IETF D.) Q933a

3 Answers  


Categories