COMPUTER NETWORK QUESTIONS -01

COMPUTER NETWORK QUESTIONS

http://everythingispossiblec.blogspot.in/



The ________ protocol is the transmission mechanism used by the TCP/IP suite.


A) ARP

This is the correct answer.
B) IP


C) RARP


D) None of the choices are correcIP is _________ datagram protocol.


The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.


A) reliable delivery


B) connection-oriented delivery

This is the correct answer.
C) best-effort delivery


D) None of the choices are correct
A best-effort delivery service such as IP includes _______.


A) error checking


B) error correction


C) datagram acknowledgment
    This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.


A) there are 10 bytes of options


B) there are 40 bytes of options

This is the correct answer.
C) there are 40 bytes in the header


D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.


A) the datagram has not been fragmented


B) the datagram is 100 bytes in size

This is the correct answer.
C) the first byte of the datagram is byte 800


D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?


A) offset number


B) total length

This is the correct answer.
C) both offset number and the total length


D) None of the choices are correct
The IP header size _______.

This is the correct answer.
A) is 20 to 60 bytes long


B) is 20 bytes long


C) is 60 bytes long


D) None of the choices are correct
Packets in the IP layer are called _________.


A) segments


B) datagrams


C) frames


D) None of the choices are correct
The total length field defines the total length of the datagram _________.

This is the correct answer.
A) including the header


B) excluding the header


C) header and option length


D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.


A) MUT


B) MAT


C) MTU


D) None of the choices are correct

Which IP option is used if exactly four specific routers are to be visited by the datagram?


A) record route

This is the correct answer.
B) strict source route


C) loose source route


D) None of the choices are correct


For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.

This is the correct answer.
A) 0


B) 1


C) 2


D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.


A) IETF


B) checksum

This is the correct answer.
C) differentiated services


D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.


A) processing


B) fragmentation

This is the correct answer.
C) reassembly


D) None of the choices are correct

The _______ module sends out an IP packet, the next-hop address, and interface information.


A) processing

This is the correct answer.
B) forwarding


C) fragmentation


D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.

This is the correct answer.
A) processing


B) forwarding


C) fragmentation


D) None of the choices are correct

The output of the _______ module is an IP packet destined for an upper-layer protocol.


A) processing


B) forwarding

This is the correct answer.
C) reassembly


D) None of the choices are correct

The _______ module consults the MTU table to determine the packet size necessary for transmission.


A) processing


B) forwarding

This is the correct answer.
C) fragmentation


D) None of the choices are correct

The value of the ________ subfield in an option controls the presence of the option in fragmentation.

This is the correct answer.
A) copy


B) class


C) number


D) None of the choices are correct

The value of the ________ subfield defines the general purpose of an option.


A) copy

This is the correct answer.
B) class


C) number


D) None of the choices are correct

Only ______ end of option option can be used in a datagram.


A) two


B) three

This is the correct answer.
C) one


D) None of the choices are correct

When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.

This is the correct answer.
A) last


B) first


C) last and first


D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.


A) first cell; last cell


B) last two cells; last three cells

This is the correct answer.
C) last cell; last two cells


D) None of the choices are correct

To find the physical address of the exiting-point router, ATM uses the services of _________.


A) ARP


B) IP

This is the correct answer.
C) ATMARP


D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.


A) SVC

This is the correct answer.
B) PVC


C) SVC and PVC


D) None of the choices are correct

The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.

This is the correct answer.
A) SVC


B) PVC


C) SVC and PVC


D) None of the choices are correct


 allows an ATM network to be divided into several logical subnets.


A) LAS


B) LAN

This is the correct answer.
C) LIS


D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.


A) physical

This is the correct answer.
B) logical


C) port


D) None of the choices are correct

The logical addresses in the TCP/IP protocol suite are called _______ addresses.


A) port

This is the correct answer.
B) IP


C) Email


D) None of the choices are correct




A ________ is a local address. Its jurisdiction is over a local network.

This is the correct answer.
A) physical


B) logical


C) port


D) None of the choices are correct




If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

This is the correct answer.
A) the destination IP address in the datagram header


B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct



If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.


A) the destination IP address in the datagram header

This is the correct answer.
B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct

The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.


A) the destination IP address in the datagram header

This is the correct answer.
B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct

In _______, a table associating a logical address with a physical address is updated manually.

This is the correct answer.
A) static mapping


B) dynamic mapping


C) physical mapping


D) None of the choices are correct

The target hardware address on an Ethernet is _______ in an ARP request.

This is the correct answer.
A) 0x000000000000


B) 0.0.0.0


C) variable


D) class dependent

An ARP reply is normally _______.


A) broadcast


B) multicast

This is the correct answer.
C) unicast


D) None of the choices are
A _______ is an ARP that acts on behalf of a set of hosts.


A) ARP


B) RARP

This is the correct answer.
C) proxy ARP


D) None of the choices are correct
ICMP is a _________ layer protocol.


A) data link


B) transport

This is the correct answer.
C) network


D) None of the choices are correct

An ICMP message has _____ header and a variable-size data section.


A) a 16-byte


B) a 32-byte

This is the correct answer.
C) an 8-byte


D) None of the choices are correct


Which of the following is true about ICMP messages?


A) An ICMP error message may be generated for an ICMP error message.


B) An ICMP error message may be generated for each fragment.


C) An ICMP error message may be generated for a multicast datagram.

This is the correct answer.
D) none is true


If a host needs to synchronize its clock with another host, it sends a _______ message.

This is the correct answer.
A) timestamp-request


B) source-quench


C) router-advertisement


D) None of the choices are correct

The purpose of echo request and echo reply is to _______.


A) report errors

This is the correct answer.
B) check node-to-node communication


C) check packet lifetime


D) None of the choices are correct

In error reporting the encapsulated ICMP packet goes to _______.

This is the correct answer.
A) the original sender


B) the receiver


C) a router


D) None of the choices are correct

What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?

This is the correct answer.
A) type


B) code


C) option ID


D) None of the choices are correct

When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.


A) destination-unreachable

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct


A) report errors

This is the correct answer.
B) check node-to-node communication


C) check packet lifetime


D) None of the choices are correct

In error reporting the encapsulated ICMP packet goes to _______.

This is the correct answer.
A) the original sender


B) the receiver


C) a router


D) None of the choices are correct

What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?

This is the correct answer.
A) type


B) code


C) option ID


D) None of the choices are correct

When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.


A) destination-unreachable

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct

When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.


A) source-quench

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct

Errors in the header or option fields of an IP datagram require a _______ error message.

This is the correct answer.
A) parameter-problem


B) source-quench


C) router-solicitation


D) None of the choices are correct

A _______ can learn about network _______ by sending out a router-solicitation packet.


A) router, routers


B) router, hosts

This is the correct answer.
C) host, routers


D) None of the choices are correct

Who can send ICMP error-reporting messages?


A) routers


B) destination hosts

This is the correct answer.
C) routers or destination hosts


D) None of the choices are correct

One method to alert a source host of congestion is the _______ message.


A) redirection


B) echo-request

This is the correct answer.
C) source-quench


D) None of the choices are correct

A time-exceeded message is generated if _______.


A) the round-trip time between hosts is close to zero


B) fragments of a message do not arrive within a set time

This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time


D) None of the choices are correct

To determine whether or not a node is reachable, _______ message can be sent.


A) an echo-reply

This is the correct answer.
B) an echo-request


C) a redirection


D) None of the choices are correct

In calculating the time difference between two clocks, a negative value indicates _______.


A) an invalid calculation


B) the source clock lags behind the destination clock

This is the correct answer.
C) the destination clock lags behind the source clock


D) None of the choices are correct

An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.


A) only the ICMP header

This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A


C) only datagram A


D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.


A) connecting


B) forwarding

This is the correct answer.
C) addressing


D) None of the choices are correct

The original IP addressing was based on the assumption that a host is ________.

This is the correct answer.
A) stationary


B) mobile


C) moving


D) None of the choices are correct



The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.

This is the correct answer.
A) stationary


B) mobile


C) moving


D) None of the choices are correct

A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.


A) care-of; home

This is the correct answer.
B) home; care-of


C) home; foreigner


D) None of the choices are correct

When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.


A) common


B) shared

This is the correct answer.
C) co-located


D) None of the choices are correct

To communicate with a remote host, a mobile host goes through ________ phases.

This is the correct answer.
A) three


B) two


C) four


D) None of the choices are correct

The first phase in mobile communication is called _________.


A) registration

This is the correct answer.
B) agent discovery


C) data transfer


D) None of the choices are correct
The second phase in mobile communication is called _________.

This is the correct answer.
A) registration


B) agent discovery


C) data transfer


D) None of the choices are correc
The third phase in mobile communication is called _________.


A) registration


B) agent discovery


C) data transfer


D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.


A) IGMP


B) IP

This is the correct answer.
C) ICMP


D) None of the choices are correct

A registration request or reply is sent by ________ using the well-known port 434.


A) TCP


B) IP

This is the correct answer.
C) UDP


D) None of the choices are c
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.


A) Triple crossing


B) Double crossing

This is the correct answer.
C) Triangle routing


D) None of the choices are correct


In the _______ phase, a mobile host must learn the address of its foreign agent.

This is the correct answer.
A) agent discovery


B) registration


C) data transfer


D) None of the choices are correct

If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.


A) solicitation

This is the correct answer.
B) advertisement


C) discovery


D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.

This is the correct answer.
A) solicitation


B) discovery


C) registration


D) None of the choices are correct

When a mobile host wants to register with its foreign agent, it sends _______ message.


A) an agent solicitation


B) an agent advertisement


C) a registration request


D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.

This is the correct answer.
A) home


B) care-of


C) discovery


D) None of the choices are correct

The _______ uses a registry table to find the care-of address of the mobile host.


A) home agent

This is the correct answer.
B) foreign agent


C) remote host






The ________ protocol is the transmission mechanism used by the TCP/IP suite.


A) ARP

This is the correct answer.
B) IP


C) RARP


D) None of the choices are correcIP is _________ datagram protocol.


The term _______s that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.


A) reliable delivery


B) connection-oriented delivery

This is the correct answer.
C) best-effort delivery


D) None of the choices are correct
A best-effort delivery service such as IP includes _______.


A) error checking


B) error correction


C) datagram acknowledgment
    This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.


A) there are 10 bytes of options


B) there are 40 bytes of options

This is the correct answer.
C) there are 40 bytes in the header


D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.


A) the datagram has not been fragmented


B) the datagram is 100 bytes in size

This is the correct answer.
C) the first byte of the datagram is byte 800


D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?


A) offset number


B) total length

This is the correct answer.
C) both offset number and the total length


D) None of the choices are correct
The IP header size _______.

This is the correct answer.
A) is 20 to 60 bytes long


B) is 20 bytes long


C) is 60 bytes long


D) None of the choices are correct
Packets in the IP layer are called _________.


A) segments


B) datagrams


C) frames


D) None of the choices are correct
The total length field defines the total length of the datagram _________.

This is the correct answer.
A) including the header


B) excluding the header


C) header and option length


D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.


A) MUT


B) MAT


C) MTU


D) None of the choices are correct

Which IP option is used if exactly four specific routers are to be visited by the datagram?


A) record route

This is the correct answer.
B) strict source route


C) loose source route


D) None of the choices are correct


For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.

This is the correct answer.
A) 0


B) 1


C) 2


D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.


A) IETF


B) checksum

This is the correct answer.
C) differentiated services


D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.


A) processing


B) fragmentation

This is the correct answer.
C) reassembly


D) None of the choices are correct

The _______ module sends out an IP packet, the next-hop address, and interface information.


A) processing

This is the correct answer.
B) forwarding


C) fragmentation


D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.

This is the correct answer.
A) processing


B) forwarding


C) fragmentation


D) None of the choices are correct

The output of the _______ module is an IP packet destined for an upper-layer protocol.


A) processing


B) forwarding

This is the correct answer.
C) reassembly


D) None of the choices are correct

The _______ module consults the MTU table to determine the packet size necessary for transmission.


A) processing


B) forwarding

This is the correct answer.
C) fragmentation


D) None of the choices are correct

The value of the ________ subfield in an option controls the presence of the option in fragmentation.

This is the correct answer.
A) copy


B) class


C) number


D) None of the choices are correct

The value of the ________ subfield defines the general purpose of an option.


A) copy

This is the correct answer.
B) class


C) number


D) None of the choices are correct

The value of the ________ subfield defines the types of an option.


A) copy


B) class

This is the correct answer.
C) number


D) None of the choices are correct

Only ______ end of option option can be used in a datagram.


A) two


B) three

This is the correct answer.
C) one


D) None of the choices are correct

When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.

This is the correct answer.
A) last


B) first


C) last and first


D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.


A) first cell; last cell


B) last two cells; last three cells

This is the correct answer.
C) last cell; last two cells


D) None of the choices are correct

To find the physical address of the exiting-point router, ATM uses the services of _________.


A) ARP


B) IP

This is the correct answer.
C) ATMARP


D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.


A) SVC

This is the correct answer.
B) PVC


C) SVC and PVC


D) None of the choices are correct

The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.

This is the correct answer.
A) SVC


B) PVC


C) SVC and PVC


D) None of the choices are correct


 allows an ATM network to be divided into several logical subnets.


A) LAS


B) LAN

This is the correct answer.
C) LIS


D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.


A) physical

This is the correct answer.
B) logical


C) port


D) None of the choices are correct

The logical addresses in the TCP/IP protocol suite are called _______ addresses.


A) port

This is the correct answer.
B) IP


C) Email


D) None of the choices are correct




A ________ is a local address. Its jurisdiction is over a local network.

This is the correct answer.
A) physical


B) logical


C) port


D) None of the choices are correct




If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

This is the correct answer.
A) the destination IP address in the datagram header


B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct



If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.


A) the destination IP address in the datagram header

This is the correct answer.
B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct

The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.


A) the destination IP address in the datagram header

This is the correct answer.
B) the IP address of the router found in the routing table


C) the source IP address


D) None of the choices are correct

The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.

This is the correct answer.
A) the destination IP address in the datagram header


B) the IP address of the router found in the routing table


C) source IP address


D) None of the choices are correct

In _______, a table associating a logical address with a physical address is updated manually.

This is the correct answer.
A) static mapping


B) dynamic mapping


C) physical mapping


D) None of the choices are correct

The target hardware address on an Ethernet is _______ in an ARP request.

This is the correct answer.
A) 0x000000000000


B) 0.0.0.0


C) variable


D) class dependent

An ARP reply is normally _______.


A) broadcast


B) multicast

This is the correct answer.
C) unicast


D) None of the choices are correct

An ARP request is normally _______.

This is the correct answer.
A) broadcast


B) multicast


C) unicast


D) None of the choices are correct
A technique called ______ is used to create a subnetting effect.


A) ARP


B) RARP

This is the correct answer.
C) proxy ARP


D) None of the choices are corre
A _______ is an ARP that acts on behalf of a set of hosts.


A) ARP


B) RARP

This is the correct answer.
C) proxy ARP


D) None of the choices are correct
ICMP is a _________ layer protocol.


A) data link


B) transport

This is the correct answer.
C) network


D) None of the choices are correct

An ICMP message has _____ header and a variable-size data section.


A) a 16-byte


B) a 32-byte

This is the correct answer.
C) an 8-byte


D) None of the choices are correct


Which of the following is true about ICMP messages?


A) An ICMP error message may be generated for an ICMP error message.


B) An ICMP error message may be generated for each fragment.


C) An ICMP error message may be generated for a multicast datagram.

This is the correct answer.
D) none is true

Which of the following is true about ICMP messages?


A) An ICMP error message may be generated for an ICMP error message.

This is the correct answer.
B) An ICMP error message may be generated only for the first fragment.


C) An ICMP error message may be generated for a multicast datagram.


D) none is true

Which of the following is true about ICMP messages?


A) An ICMP error message may be generated for an ICMP error message.


B) An ICMP error message may be generated only for each fragment.

This is the correct answer.
C) No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.


D) none is true
If a host needs to synchronize its clock with another host, it sends a _______ message.

This is the correct answer.
A) timestamp-request


B) source-quench


C) router-advertisement


D) None of the choices are correct

The purpose of echo request and echo reply is to _______.


A) report errors

This is the correct answer.
B) check node-to-node communication


C) check packet lifetime


D) None of the choices are correct

In error reporting the encapsulated ICMP packet goes to _______.

This is the correct answer.
A) the original sender


B) the receiver


C) a router


D) None of the choices are correct

What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?

This is the correct answer.
A) type


B) code


C) option ID


D) None of the choices are correct

When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.


A) destination-unreachable

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct

When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.


A) source-quench

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct

Errors in the header or option fields of an IP datagram require a _______ error message.

This is the correct answer.
A) parameter-problem


B) source-quench


C) router-solicitation


D) None of the choices are correct

A _______ can learn about network _______ by sending out a router-solicitation packet.


A) router, routers


B) router, hosts

This is the correct answer.
C) host, routers


D) None of the choices are correct

Who can send ICMP error-reporting messages?


A) routers


B) destination hosts

This is the correct answer.
C) routers or destination hosts


D) None of the choices are correct

One method to alert a source host of congestion is the _______ message.


A) redirection


B) echo-request

This is the correct answer.
C) source-quench


D) None of the choices are correct

A time-exceeded message is generated if _______.


A) the round-trip time between hosts is close to zero


B) fragments of a message do not arrive within a set time

This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time


D) None of the choices are correct

To determine whether or not a node is reachable, _______ message can be sent.


A) an echo-reply

This is the correct answer.
B) an echo-request


C) a redirection


D) None of the choices are correct

In calculating the time difference between two clocks, a negative value indicates _______.


A) an invalid calculation


B) the source clock lags behind the destination clock

This is the correct answer.
C) the destination clock lags behind the source clock


D) None of the choices are correct

An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.


A) only the ICMP header

This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A


C) only datagram A


D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.


A) connecting


B) forwarding

This is the correct answer.
C) addressing


D) None of the choices are correct

The original IP addressing was based on the assumption that a host is ________.

This is the correct answer.
A) stationary


B) mobile


C) moving


D) None of the choices are correct



The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.

This is the correct answer.
A) stationary


B) mobile


C) moving


D) None of the choices are correct

A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.


A) care-of; home

This is the correct answer.
B) home; care-of


C) home; foreigner


D) None of the choices are correct

When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.


A) common


B) shared

This is the correct answer.
C) co-located


D) None of the choices are correct

To communicate with a remote host, a mobile host goes through ________ phases.

This is the correct answer.
A) three


B) two


C) four


D) None of the choices are correct

The first phase in mobile communication is called _________.


A) registration

This is the correct answer.
B) agent discovery


C) data transfer


D) None of the choices are correct
The second phase in mobile communication is called _________.

This is the correct answer.
A) registration


B) agent discovery


C) data transfer


D) None of the choices are correc
The third phase in mobile communication is called _________.


A) registration


B) agent discovery


C) data transfer


D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.


A) IGMP


B) IP

This is the correct answer.
C) ICMP


D) None of the choices are correct

A registration request or reply is sent by ________ using the well-known port 434.


A) TCP


B) IP

This is the correct answer.
C) UDP


D) None of the choices are correct




_________ occurs when a remote host communicates with a mobile host that has moved to the same network (or site) as the remote host.


A) Triple crossing

This is the correct answer.
B) Double crossing


C) Triangle routing


D) None of the choices are correct




_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.


A) Triple crossing


B) Double crossing

This is the correct answer.
C) Triangle routing


D) None of the choices are correct

In the _______ phase, a mobile host must learn the address of its home agent.

This is the correct answer.
A) agent discovery


B) registration


C) data transfer


D) None of the choices are correct

In the _______ phase, a mobile host must learn the address of its foreign agent.

This is the correct answer.
A) agent discovery


B) registration


C) data transfer


D) None of the choices are correct

If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.


A) solicitation

This is the correct answer.
B) advertisement


C) discovery


D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.

This is the correct answer.
A) solicitation


B) discovery


C) registration


D) None of the choices are correct

When a mobile host wants to register with its foreign agent, it sends _______ message.


A) an agent solicitation


B) an agent advertisement


C) a registration request


D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.

This is the correct answer.
A) home


B) care-of


C) discovery


D) None of the choices are correct

The _______ uses a registry table to find the care-of address of the mobile host.


A) home agent

This is the correct answer.
B) foreign agent


C) remote host





The _______ uses a registry table to find the care-of address of the mobile host.


A) home agent

This is the correct answer.
B) foreign agent


C) remote host

Read more:-02

3 comments:

  1. If you really want to succeed, you have to rely on your customers to do all the work for you. To learn more about computer repair Perth, visit on hyperlinked site.

    ReplyDelete
  2. If the configuration is inconsistent or if the user cannot easily change the configuration to meet their needs, they could lose their customers to a more reputable provider.If you are curious to know more about virtual server, check here.

    ReplyDelete
  3. For example, you may need a managed server which is capable of handling thousands of users and can be accessed from any computer on the planet. If you want to get more interesting details about brisbane servers, visit this site right here.

    ReplyDelete