What is the UDP datagram format?
A. Source Port - 16 bits, Destination Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
B. Destination Port - 16 bits, Source Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
C. Source Port - 16 bits, Destination Port - 16 bits,
Checksum - 16 Bits, Length - 16 bits, Data
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8
Bits, Checksum - 8 bits, Data
Answer / guest
Answer: A
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits
| Is This Answer Correct ? | 8 Yes | 0 No |
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP
Which three functions are supported by connection oriented servkps? (Choose three) A. connection parameters are synchronized B. any loss or duplication of packets can be corrected C. the data packet is independently routed and the service does not guarantee the packet will be processed in order D. a data communication path is established between a requesting entity and the peer device on the remote end system
Why subnetting is used?
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
Mention what is the matric of eigrp protocol?
how we can creat VPN..??? how it can be configured on cisco switches..??? can we creat VPN on different networks..??? why we need to create VPN..??? kindly write complete activity of commands to configure a VPN on switch..??? me specially looking towards Jatendra and Shahin
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
Which NetWare protocol provides link-state routing? A. NLSP B. RIP C. SAP D. NCP
What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers