COMPUTER NETWORK QUESTIONS
http://everythingispossiblec.blogspot.in/
The ________ protocol is the transmission mechanism used by the TCP/IP suite.
A) ARP
This is the correct answer.
B) IP
C) RARP
D) None of the choices are correcIP is _________ datagram protocol.
The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
A) reliable delivery
B) connection-oriented delivery
This is the correct answer.
C) best-effort delivery
D) None of the choices are correct
A best-effort delivery service such as IP includes _______.
A) error checking
B) error correction
C) datagram acknowledgment
This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 40 bytes of options
This is the correct answer.
C) there are 40 bytes in the header
D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
This is the correct answer.
C) the first byte of the datagram is byte 800
D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?
A) offset number
B) total length
This is the correct answer.
C) both offset number and the total length
D) None of the choices are correct
The IP header size _______.
This is the correct answer.
A) is 20 to 60 bytes long
B) is 20 bytes long
C) is 60 bytes long
D) None of the choices are correct
Packets in the IP layer are called _________.
A) segments
B) datagrams
C) frames
D) None of the choices are correct
The total length field defines the total length of the datagram _________.
This is the correct answer.
A) including the header
B) excluding the header
C) header and option length
D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) None of the choices are correct
Which IP option is used if exactly four specific routers are to be visited by the datagram?
A) record route
This is the correct answer.
B) strict source route
C) loose source route
D) None of the choices are correct
For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.
This is the correct answer.
A) 0
B) 1
C) 2
D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.
A) IETF
B) checksum
This is the correct answer.
C) differentiated services
D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.
A) processing
B) fragmentation
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module sends out an IP packet, the next-hop address, and interface information.
A) processing
This is the correct answer.
B) forwarding
C) fragmentation
D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.
This is the correct answer.
A) processing
B) forwarding
C) fragmentation
D) None of the choices are correct
The output of the _______ module is an IP packet destined for an upper-layer protocol.
A) processing
B) forwarding
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module consults the MTU table to determine the packet size necessary for transmission.
A) processing
B) forwarding
This is the correct answer.
C) fragmentation
D) None of the choices are correct
The value of the ________ subfield in an option controls the presence of the option in fragmentation.
This is the correct answer.
A) copy
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the general purpose of an option.
A) copy
This is the correct answer.
B) class
C) number
D) None of the choices are correct
Only ______ end of option option can be used in a datagram.
A) two
B) three
This is the correct answer.
C) one
D) None of the choices are correct
When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.
This is the correct answer.
A) last
B) first
C) last and first
D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.
A) first cell; last cell
B) last two cells; last three cells
This is the correct answer.
C) last cell; last two cells
D) None of the choices are correct
To find the physical address of the exiting-point router, ATM uses the services of _________.
A) ARP
B) IP
This is the correct answer.
C) ATMARP
D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.
A) SVC
This is the correct answer.
B) PVC
C) SVC and PVC
D) None of the choices are correct
The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.
This is the correct answer.
A) SVC
B) PVC
C) SVC and PVC
D) None of the choices are correct
allows an ATM network to be divided into several logical subnets.
A) LAS
B) LAN
This is the correct answer.
C) LIS
D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.
A) physical
This is the correct answer.
B) logical
C) port
D) None of the choices are correct
The logical addresses in the TCP/IP protocol suite are called _______ addresses.
A) port
This is the correct answer.
B) IP
C) Email
D) None of the choices are correct
A ________ is a local address. Its jurisdiction is over a local network.
This is the correct answer.
A) physical
B) logical
C) port
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
In _______, a table associating a logical address with a physical address is updated manually.
This is the correct answer.
A) static mapping
B) dynamic mapping
C) physical mapping
D) None of the choices are correct
The target hardware address on an Ethernet is _______ in an ARP request.
This is the correct answer.
A) 0x000000000000
B) 0.0.0.0
C) variable
D) class dependent
An ARP reply is normally _______.
A) broadcast
B) multicast
This is the correct answer.
C) unicast
D) None of the choices are
A _______ is an ARP that acts on behalf of a set of hosts.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are correct
ICMP is a _________ layer protocol.
A) data link
B) transport
This is the correct answer.
C) network
D) None of the choices are correct
An ICMP message has _____ header and a variable-size data section.
A) a 16-byte
B) a 32-byte
This is the correct answer.
C) an 8-byte
D) None of the choices are correct
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated for each fragment.
C) An ICMP error message may be generated for a multicast datagram.
This is the correct answer.
D) none is true
If a host needs to synchronize its clock with another host, it sends a _______ message.
This is the correct answer.
A) timestamp-request
B) source-quench
C) router-advertisement
D) None of the choices are correct
The purpose of echo request and echo reply is to _______.
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
A) source-quench
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
Errors in the header or option fields of an IP datagram require a _______ error message.
This is the correct answer.
A) parameter-problem
B) source-quench
C) router-solicitation
D) None of the choices are correct
A _______ can learn about network _______ by sending out a router-solicitation packet.
A) router, routers
B) router, hosts
This is the correct answer.
C) host, routers
D) None of the choices are correct
Who can send ICMP error-reporting messages?
A) routers
B) destination hosts
This is the correct answer.
C) routers or destination hosts
D) None of the choices are correct
One method to alert a source host of congestion is the _______ message.
A) redirection
B) echo-request
This is the correct answer.
C) source-quench
D) None of the choices are correct
A time-exceeded message is generated if _______.
A) the round-trip time between hosts is close to zero
B) fragments of a message do not arrive within a set time
This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time
D) None of the choices are correct
To determine whether or not a node is reachable, _______ message can be sent.
A) an echo-reply
This is the correct answer.
B) an echo-request
C) a redirection
D) None of the choices are correct
In calculating the time difference between two clocks, a negative value indicates _______.
A) an invalid calculation
B) the source clock lags behind the destination clock
This is the correct answer.
C) the destination clock lags behind the source clock
D) None of the choices are correct
An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.
A) only the ICMP header
This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A
C) only datagram A
D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.
A) connecting
B) forwarding
This is the correct answer.
C) addressing
D) None of the choices are correct
The original IP addressing was based on the assumption that a host is ________.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.
A) care-of; home
This is the correct answer.
B) home; care-of
C) home; foreigner
D) None of the choices are correct
When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.
A) common
B) shared
This is the correct answer.
C) co-located
D) None of the choices are correct
To communicate with a remote host, a mobile host goes through ________ phases.
This is the correct answer.
A) three
B) two
C) four
D) None of the choices are correct
The first phase in mobile communication is called _________.
A) registration
This is the correct answer.
B) agent discovery
C) data transfer
D) None of the choices are correct
The second phase in mobile communication is called _________.
This is the correct answer.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correc
The third phase in mobile communication is called _________.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.
A) IGMP
B) IP
This is the correct answer.
C) ICMP
D) None of the choices are correct
A registration request or reply is sent by ________ using the well-known port 434.
A) TCP
B) IP
This is the correct answer.
C) UDP
D) None of the choices are c
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.
A) Triple crossing
B) Double crossing
This is the correct answer.
C) Triangle routing
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its foreign agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.
A) solicitation
This is the correct answer.
B) advertisement
C) discovery
D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.
This is the correct answer.
A) solicitation
B) discovery
C) registration
D) None of the choices are correct
When a mobile host wants to register with its foreign agent, it sends _______ message.
A) an agent solicitation
B) an agent advertisement
C) a registration request
D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.
This is the correct answer.
A) home
B) care-of
C) discovery
D) None of the choices are correct
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
The ________ protocol is the transmission mechanism used by the TCP/IP suite.
A) ARP
This is the correct answer.
B) IP
C) RARP
D) None of the choices are correcIP is _________ datagram protocol.
The term _______s that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
A) reliable delivery
B) connection-oriented delivery
This is the correct answer.
C) best-effort delivery
D) None of the choices are correct
A best-effort delivery service such as IP includes _______.
A) error checking
B) error correction
C) datagram acknowledgment
This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 40 bytes of options
This is the correct answer.
C) there are 40 bytes in the header
D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
This is the correct answer.
C) the first byte of the datagram is byte 800
D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?
A) offset number
B) total length
This is the correct answer.
C) both offset number and the total length
D) None of the choices are correct
The IP header size _______.
This is the correct answer.
A) is 20 to 60 bytes long
B) is 20 bytes long
C) is 60 bytes long
D) None of the choices are correct
Packets in the IP layer are called _________.
A) segments
B) datagrams
C) frames
D) None of the choices are correct
The total length field defines the total length of the datagram _________.
This is the correct answer.
A) including the header
B) excluding the header
C) header and option length
D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) None of the choices are correct
Which IP option is used if exactly four specific routers are to be visited by the datagram?
A) record route
This is the correct answer.
B) strict source route
C) loose source route
D) None of the choices are correct
For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.
This is the correct answer.
A) 0
B) 1
C) 2
D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.
A) IETF
B) checksum
This is the correct answer.
C) differentiated services
D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.
A) processing
B) fragmentation
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module sends out an IP packet, the next-hop address, and interface information.
A) processing
This is the correct answer.
B) forwarding
C) fragmentation
D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.
This is the correct answer.
A) processing
B) forwarding
C) fragmentation
D) None of the choices are correct
The output of the _______ module is an IP packet destined for an upper-layer protocol.
A) processing
B) forwarding
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module consults the MTU table to determine the packet size necessary for transmission.
A) processing
B) forwarding
This is the correct answer.
C) fragmentation
D) None of the choices are correct
The value of the ________ subfield in an option controls the presence of the option in fragmentation.
This is the correct answer.
A) copy
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the general purpose of an option.
A) copy
This is the correct answer.
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the types of an option.
A) copy
B) class
This is the correct answer.
C) number
D) None of the choices are correct
Only ______ end of option option can be used in a datagram.
A) two
B) three
This is the correct answer.
C) one
D) None of the choices are correct
When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.
This is the correct answer.
A) last
B) first
C) last and first
D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.
A) first cell; last cell
B) last two cells; last three cells
This is the correct answer.
C) last cell; last two cells
D) None of the choices are correct
To find the physical address of the exiting-point router, ATM uses the services of _________.
A) ARP
B) IP
This is the correct answer.
C) ATMARP
D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.
A) SVC
This is the correct answer.
B) PVC
C) SVC and PVC
D) None of the choices are correct
The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.
This is the correct answer.
A) SVC
B) PVC
C) SVC and PVC
D) None of the choices are correct
allows an ATM network to be divided into several logical subnets.
A) LAS
B) LAN
This is the correct answer.
C) LIS
D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.
A) physical
This is the correct answer.
B) logical
C) port
D) None of the choices are correct
The logical addresses in the TCP/IP protocol suite are called _______ addresses.
A) port
This is the correct answer.
B) IP
C) Email
D) None of the choices are correct
A ________ is a local address. Its jurisdiction is over a local network.
This is the correct answer.
A) physical
B) logical
C) port
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) source IP address
D) None of the choices are correct
In _______, a table associating a logical address with a physical address is updated manually.
This is the correct answer.
A) static mapping
B) dynamic mapping
C) physical mapping
D) None of the choices are correct
The target hardware address on an Ethernet is _______ in an ARP request.
This is the correct answer.
A) 0x000000000000
B) 0.0.0.0
C) variable
D) class dependent
An ARP reply is normally _______.
A) broadcast
B) multicast
This is the correct answer.
C) unicast
D) None of the choices are correct
An ARP request is normally _______.
This is the correct answer.
A) broadcast
B) multicast
C) unicast
D) None of the choices are correct
A technique called ______ is used to create a subnetting effect.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are corre
A _______ is an ARP that acts on behalf of a set of hosts.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are correct
ICMP is a _________ layer protocol.
A) data link
B) transport
This is the correct answer.
C) network
D) None of the choices are correct
An ICMP message has _____ header and a variable-size data section.
A) a 16-byte
B) a 32-byte
This is the correct answer.
C) an 8-byte
D) None of the choices are correct
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated for each fragment.
C) An ICMP error message may be generated for a multicast datagram.
This is the correct answer.
D) none is true
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
This is the correct answer.
B) An ICMP error message may be generated only for the first fragment.
C) An ICMP error message may be generated for a multicast datagram.
D) none is true
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated only for each fragment.
This is the correct answer.
C) No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
D) none is true
If a host needs to synchronize its clock with another host, it sends a _______ message.
This is the correct answer.
A) timestamp-request
B) source-quench
C) router-advertisement
D) None of the choices are correct
The purpose of echo request and echo reply is to _______.
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
A) source-quench
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
Errors in the header or option fields of an IP datagram require a _______ error message.
This is the correct answer.
A) parameter-problem
B) source-quench
C) router-solicitation
D) None of the choices are correct
A _______ can learn about network _______ by sending out a router-solicitation packet.
A) router, routers
B) router, hosts
This is the correct answer.
C) host, routers
D) None of the choices are correct
Who can send ICMP error-reporting messages?
A) routers
B) destination hosts
This is the correct answer.
C) routers or destination hosts
D) None of the choices are correct
One method to alert a source host of congestion is the _______ message.
A) redirection
B) echo-request
This is the correct answer.
C) source-quench
D) None of the choices are correct
A time-exceeded message is generated if _______.
A) the round-trip time between hosts is close to zero
B) fragments of a message do not arrive within a set time
This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time
D) None of the choices are correct
To determine whether or not a node is reachable, _______ message can be sent.
A) an echo-reply
This is the correct answer.
B) an echo-request
C) a redirection
D) None of the choices are correct
In calculating the time difference between two clocks, a negative value indicates _______.
A) an invalid calculation
B) the source clock lags behind the destination clock
This is the correct answer.
C) the destination clock lags behind the source clock
D) None of the choices are correct
An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.
A) only the ICMP header
This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A
C) only datagram A
D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.
A) connecting
B) forwarding
This is the correct answer.
C) addressing
D) None of the choices are correct
The original IP addressing was based on the assumption that a host is ________.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.
A) care-of; home
This is the correct answer.
B) home; care-of
C) home; foreigner
D) None of the choices are correct
When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.
A) common
B) shared
This is the correct answer.
C) co-located
D) None of the choices are correct
To communicate with a remote host, a mobile host goes through ________ phases.
This is the correct answer.
A) three
B) two
C) four
D) None of the choices are correct
The first phase in mobile communication is called _________.
A) registration
This is the correct answer.
B) agent discovery
C) data transfer
D) None of the choices are correct
The second phase in mobile communication is called _________.
This is the correct answer.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correc
The third phase in mobile communication is called _________.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.
A) IGMP
B) IP
This is the correct answer.
C) ICMP
D) None of the choices are correct
A registration request or reply is sent by ________ using the well-known port 434.
A) TCP
B) IP
This is the correct answer.
C) UDP
D) None of the choices are correct
_________ occurs when a remote host communicates with a mobile host that has moved to the same network (or site) as the remote host.
A) Triple crossing
This is the correct answer.
B) Double crossing
C) Triangle routing
D) None of the choices are correct
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.
A) Triple crossing
B) Double crossing
This is the correct answer.
C) Triangle routing
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its home agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its foreign agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.
A) solicitation
This is the correct answer.
B) advertisement
C) discovery
D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.
This is the correct answer.
A) solicitation
B) discovery
C) registration
D) None of the choices are correct
When a mobile host wants to register with its foreign agent, it sends _______ message.
A) an agent solicitation
B) an agent advertisement
C) a registration request
D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.
This is the correct answer.
A) home
B) care-of
C) discovery
D) None of the choices are correct
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
Read more:-02
http://everythingispossiblec.blogspot.in/
The ________ protocol is the transmission mechanism used by the TCP/IP suite.
A) ARP
This is the correct answer.
B) IP
C) RARP
D) None of the choices are correcIP is _________ datagram protocol.
The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
A) reliable delivery
B) connection-oriented delivery
This is the correct answer.
C) best-effort delivery
D) None of the choices are correct
A best-effort delivery service such as IP includes _______.
A) error checking
B) error correction
C) datagram acknowledgment
This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 40 bytes of options
This is the correct answer.
C) there are 40 bytes in the header
D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
This is the correct answer.
C) the first byte of the datagram is byte 800
D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?
A) offset number
B) total length
This is the correct answer.
C) both offset number and the total length
D) None of the choices are correct
The IP header size _______.
This is the correct answer.
A) is 20 to 60 bytes long
B) is 20 bytes long
C) is 60 bytes long
D) None of the choices are correct
Packets in the IP layer are called _________.
A) segments
B) datagrams
C) frames
D) None of the choices are correct
The total length field defines the total length of the datagram _________.
This is the correct answer.
A) including the header
B) excluding the header
C) header and option length
D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) None of the choices are correct
Which IP option is used if exactly four specific routers are to be visited by the datagram?
A) record route
This is the correct answer.
B) strict source route
C) loose source route
D) None of the choices are correct
For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.
This is the correct answer.
A) 0
B) 1
C) 2
D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.
A) IETF
B) checksum
This is the correct answer.
C) differentiated services
D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.
A) processing
B) fragmentation
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module sends out an IP packet, the next-hop address, and interface information.
A) processing
This is the correct answer.
B) forwarding
C) fragmentation
D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.
This is the correct answer.
A) processing
B) forwarding
C) fragmentation
D) None of the choices are correct
The output of the _______ module is an IP packet destined for an upper-layer protocol.
A) processing
B) forwarding
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module consults the MTU table to determine the packet size necessary for transmission.
A) processing
B) forwarding
This is the correct answer.
C) fragmentation
D) None of the choices are correct
The value of the ________ subfield in an option controls the presence of the option in fragmentation.
This is the correct answer.
A) copy
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the general purpose of an option.
A) copy
This is the correct answer.
B) class
C) number
D) None of the choices are correct
Only ______ end of option option can be used in a datagram.
A) two
B) three
This is the correct answer.
C) one
D) None of the choices are correct
When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.
This is the correct answer.
A) last
B) first
C) last and first
D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.
A) first cell; last cell
B) last two cells; last three cells
This is the correct answer.
C) last cell; last two cells
D) None of the choices are correct
To find the physical address of the exiting-point router, ATM uses the services of _________.
A) ARP
B) IP
This is the correct answer.
C) ATMARP
D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.
A) SVC
This is the correct answer.
B) PVC
C) SVC and PVC
D) None of the choices are correct
The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.
This is the correct answer.
A) SVC
B) PVC
C) SVC and PVC
D) None of the choices are correct
allows an ATM network to be divided into several logical subnets.
A) LAS
B) LAN
This is the correct answer.
C) LIS
D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.
A) physical
This is the correct answer.
B) logical
C) port
D) None of the choices are correct
The logical addresses in the TCP/IP protocol suite are called _______ addresses.
A) port
This is the correct answer.
B) IP
C) Email
D) None of the choices are correct
A ________ is a local address. Its jurisdiction is over a local network.
This is the correct answer.
A) physical
B) logical
C) port
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
In _______, a table associating a logical address with a physical address is updated manually.
This is the correct answer.
A) static mapping
B) dynamic mapping
C) physical mapping
D) None of the choices are correct
The target hardware address on an Ethernet is _______ in an ARP request.
This is the correct answer.
A) 0x000000000000
B) 0.0.0.0
C) variable
D) class dependent
An ARP reply is normally _______.
A) broadcast
B) multicast
This is the correct answer.
C) unicast
D) None of the choices are
A _______ is an ARP that acts on behalf of a set of hosts.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are correct
ICMP is a _________ layer protocol.
A) data link
B) transport
This is the correct answer.
C) network
D) None of the choices are correct
An ICMP message has _____ header and a variable-size data section.
A) a 16-byte
B) a 32-byte
This is the correct answer.
C) an 8-byte
D) None of the choices are correct
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated for each fragment.
C) An ICMP error message may be generated for a multicast datagram.
This is the correct answer.
D) none is true
If a host needs to synchronize its clock with another host, it sends a _______ message.
This is the correct answer.
A) timestamp-request
B) source-quench
C) router-advertisement
D) None of the choices are correct
The purpose of echo request and echo reply is to _______.
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
A) source-quench
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
Errors in the header or option fields of an IP datagram require a _______ error message.
This is the correct answer.
A) parameter-problem
B) source-quench
C) router-solicitation
D) None of the choices are correct
A _______ can learn about network _______ by sending out a router-solicitation packet.
A) router, routers
B) router, hosts
This is the correct answer.
C) host, routers
D) None of the choices are correct
Who can send ICMP error-reporting messages?
A) routers
B) destination hosts
This is the correct answer.
C) routers or destination hosts
D) None of the choices are correct
One method to alert a source host of congestion is the _______ message.
A) redirection
B) echo-request
This is the correct answer.
C) source-quench
D) None of the choices are correct
A time-exceeded message is generated if _______.
A) the round-trip time between hosts is close to zero
B) fragments of a message do not arrive within a set time
This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time
D) None of the choices are correct
To determine whether or not a node is reachable, _______ message can be sent.
A) an echo-reply
This is the correct answer.
B) an echo-request
C) a redirection
D) None of the choices are correct
In calculating the time difference between two clocks, a negative value indicates _______.
A) an invalid calculation
B) the source clock lags behind the destination clock
This is the correct answer.
C) the destination clock lags behind the source clock
D) None of the choices are correct
An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.
A) only the ICMP header
This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A
C) only datagram A
D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.
A) connecting
B) forwarding
This is the correct answer.
C) addressing
D) None of the choices are correct
The original IP addressing was based on the assumption that a host is ________.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.
A) care-of; home
This is the correct answer.
B) home; care-of
C) home; foreigner
D) None of the choices are correct
When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.
A) common
B) shared
This is the correct answer.
C) co-located
D) None of the choices are correct
To communicate with a remote host, a mobile host goes through ________ phases.
This is the correct answer.
A) three
B) two
C) four
D) None of the choices are correct
The first phase in mobile communication is called _________.
A) registration
This is the correct answer.
B) agent discovery
C) data transfer
D) None of the choices are correct
The second phase in mobile communication is called _________.
This is the correct answer.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correc
The third phase in mobile communication is called _________.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.
A) IGMP
B) IP
This is the correct answer.
C) ICMP
D) None of the choices are correct
A registration request or reply is sent by ________ using the well-known port 434.
A) TCP
B) IP
This is the correct answer.
C) UDP
D) None of the choices are c
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.
A) Triple crossing
B) Double crossing
This is the correct answer.
C) Triangle routing
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its foreign agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.
A) solicitation
This is the correct answer.
B) advertisement
C) discovery
D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.
This is the correct answer.
A) solicitation
B) discovery
C) registration
D) None of the choices are correct
When a mobile host wants to register with its foreign agent, it sends _______ message.
A) an agent solicitation
B) an agent advertisement
C) a registration request
D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.
This is the correct answer.
A) home
B) care-of
C) discovery
D) None of the choices are correct
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
The ________ protocol is the transmission mechanism used by the TCP/IP suite.
A) ARP
This is the correct answer.
B) IP
C) RARP
D) None of the choices are correcIP is _________ datagram protocol.
The term _______s that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
A) reliable delivery
B) connection-oriented delivery
This is the correct answer.
C) best-effort delivery
D) None of the choices are correct
A best-effort delivery service such as IP includes _______.
A) error checking
B) error correction
C) datagram acknowledgment
This is the correct answer.
D) None of the choices are correct
An HLEN value of decimal 10 means _______.
A) there are 10 bytes of options
B) there are 40 bytes of options
This is the correct answer.
C) there are 40 bytes in the header
D) None of the choices are correct
If the fragment offset has a value of 100, it means that _______.
A) the datagram has not been fragmented
B) the datagram is 100 bytes in size
This is the correct answer.
C) the first byte of the datagram is byte 800
D) None of the choices are correct
What is needed to determine the number of the last byte of a fragment?
A) offset number
B) total length
This is the correct answer.
C) both offset number and the total length
D) None of the choices are correct
The IP header size _______.
This is the correct answer.
A) is 20 to 60 bytes long
B) is 20 bytes long
C) is 60 bytes long
D) None of the choices are correct
Packets in the IP layer are called _________.
A) segments
B) datagrams
C) frames
D) None of the choices are correct
The total length field defines the total length of the datagram _________.
This is the correct answer.
A) including the header
B) excluding the header
C) header and option length
D) None of the choices are correct
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) None of the choices are correct
Which IP option is used if exactly four specific routers are to be visited by the datagram?
A) record route
This is the correct answer.
B) strict source route
C) loose source route
D) None of the choices are correct
For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.
This is the correct answer.
A) 0
B) 1
C) 2
D) None of the choices are correct
The IP header field formerly known as the service type field is now called the _______ field.
A) IETF
B) checksum
This is the correct answer.
C) differentiated services
D) None of the choices are correct
The _______ module takes fragments of a message and puts them back in order.
A) processing
B) fragmentation
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module sends out an IP packet, the next-hop address, and interface information.
A) processing
This is the correct answer.
B) forwarding
C) fragmentation
D) None of the choices are correct
The _______ module discards datagrams with a TTL value of zero.
This is the correct answer.
A) processing
B) forwarding
C) fragmentation
D) None of the choices are correct
The output of the _______ module is an IP packet destined for an upper-layer protocol.
A) processing
B) forwarding
This is the correct answer.
C) reassembly
D) None of the choices are correct
The _______ module consults the MTU table to determine the packet size necessary for transmission.
A) processing
B) forwarding
This is the correct answer.
C) fragmentation
D) None of the choices are correct
The value of the ________ subfield in an option controls the presence of the option in fragmentation.
This is the correct answer.
A) copy
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the general purpose of an option.
A) copy
This is the correct answer.
B) class
C) number
D) None of the choices are correct
The value of the ________ subfield defines the types of an option.
A) copy
B) class
This is the correct answer.
C) number
D) None of the choices are correct
Only ______ end of option option can be used in a datagram.
A) two
B) three
This is the correct answer.
C) one
D) None of the choices are correct
When we use IP over ATM, only the ________ cell carry(ies) the 8-byte trailer added to the IP datagram.
This is the correct answer.
A) last
B) first
C) last and first
D) None of the choices are correct
When we use IP over ATM, padding can be added only to the _____ or the _______.
A) first cell; last cell
B) last two cells; last three cells
This is the correct answer.
C) last cell; last two cells
D) None of the choices are correct
To find the physical address of the exiting-point router, ATM uses the services of _________.
A) ARP
B) IP
This is the correct answer.
C) ATMARP
D) None of the choices are correct
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.
A) SVC
This is the correct answer.
B) PVC
C) SVC and PVC
D) None of the choices are correct
The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.
This is the correct answer.
A) SVC
B) PVC
C) SVC and PVC
D) None of the choices are correct
allows an ATM network to be divided into several logical subnets.
A) LAS
B) LAN
This is the correct answer.
C) LIS
D) None of the choices are correct
A _______ address is an internetwork address with universal jurisdiction.
A) physical
This is the correct answer.
B) logical
C) port
D) None of the choices are correct
The logical addresses in the TCP/IP protocol suite are called _______ addresses.
A) port
This is the correct answer.
B) IP
C) Email
D) None of the choices are correct
A ________ is a local address. Its jurisdiction is over a local network.
This is the correct answer.
A) physical
B) logical
C) port
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
A) the destination IP address in the datagram header
This is the correct answer.
B) the IP address of the router found in the routing table
C) the source IP address
D) None of the choices are correct
The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.
This is the correct answer.
A) the destination IP address in the datagram header
B) the IP address of the router found in the routing table
C) source IP address
D) None of the choices are correct
In _______, a table associating a logical address with a physical address is updated manually.
This is the correct answer.
A) static mapping
B) dynamic mapping
C) physical mapping
D) None of the choices are correct
The target hardware address on an Ethernet is _______ in an ARP request.
This is the correct answer.
A) 0x000000000000
B) 0.0.0.0
C) variable
D) class dependent
An ARP reply is normally _______.
A) broadcast
B) multicast
This is the correct answer.
C) unicast
D) None of the choices are correct
An ARP request is normally _______.
This is the correct answer.
A) broadcast
B) multicast
C) unicast
D) None of the choices are correct
A technique called ______ is used to create a subnetting effect.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are corre
A _______ is an ARP that acts on behalf of a set of hosts.
A) ARP
B) RARP
This is the correct answer.
C) proxy ARP
D) None of the choices are correct
ICMP is a _________ layer protocol.
A) data link
B) transport
This is the correct answer.
C) network
D) None of the choices are correct
An ICMP message has _____ header and a variable-size data section.
A) a 16-byte
B) a 32-byte
This is the correct answer.
C) an 8-byte
D) None of the choices are correct
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated for each fragment.
C) An ICMP error message may be generated for a multicast datagram.
This is the correct answer.
D) none is true
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
This is the correct answer.
B) An ICMP error message may be generated only for the first fragment.
C) An ICMP error message may be generated for a multicast datagram.
D) none is true
Which of the following is true about ICMP messages?
A) An ICMP error message may be generated for an ICMP error message.
B) An ICMP error message may be generated only for each fragment.
This is the correct answer.
C) No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
D) none is true
If a host needs to synchronize its clock with another host, it sends a _______ message.
This is the correct answer.
A) timestamp-request
B) source-quench
C) router-advertisement
D) None of the choices are correct
The purpose of echo request and echo reply is to _______.
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check packet lifetime
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the original sender
B) the receiver
C) a router
D) None of the choices are correct
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
This is the correct answer.
A) type
B) code
C) option ID
D) None of the choices are correct
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
A) source-quench
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
Errors in the header or option fields of an IP datagram require a _______ error message.
This is the correct answer.
A) parameter-problem
B) source-quench
C) router-solicitation
D) None of the choices are correct
A _______ can learn about network _______ by sending out a router-solicitation packet.
A) router, routers
B) router, hosts
This is the correct answer.
C) host, routers
D) None of the choices are correct
Who can send ICMP error-reporting messages?
A) routers
B) destination hosts
This is the correct answer.
C) routers or destination hosts
D) None of the choices are correct
One method to alert a source host of congestion is the _______ message.
A) redirection
B) echo-request
This is the correct answer.
C) source-quench
D) None of the choices are correct
A time-exceeded message is generated if _______.
A) the round-trip time between hosts is close to zero
B) fragments of a message do not arrive within a set time
This is the correct answer.
C) the round-trip time between hosts is close to zero and fragments of a message do not arrive within a set time
D) None of the choices are correct
To determine whether or not a node is reachable, _______ message can be sent.
A) an echo-reply
This is the correct answer.
B) an echo-request
C) a redirection
D) None of the choices are correct
In calculating the time difference between two clocks, a negative value indicates _______.
A) an invalid calculation
B) the source clock lags behind the destination clock
This is the correct answer.
C) the destination clock lags behind the source clock
D) None of the choices are correct
An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.
A) only the ICMP header
This is the correct answer.
B) the ICMP header plus 8 bytes of datagram A
C) only datagram A
D) None of the choices are correc
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.
A) connecting
B) forwarding
This is the correct answer.
C) addressing
D) None of the choices are correct
The original IP addressing was based on the assumption that a host is ________.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.
This is the correct answer.
A) stationary
B) mobile
C) moving
D) None of the choices are correct
A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.
A) care-of; home
This is the correct answer.
B) home; care-of
C) home; foreigner
D) None of the choices are correct
When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.
A) common
B) shared
This is the correct answer.
C) co-located
D) None of the choices are correct
To communicate with a remote host, a mobile host goes through ________ phases.
This is the correct answer.
A) three
B) two
C) four
D) None of the choices are correct
The first phase in mobile communication is called _________.
A) registration
This is the correct answer.
B) agent discovery
C) data transfer
D) None of the choices are correct
The second phase in mobile communication is called _________.
This is the correct answer.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correc
The third phase in mobile communication is called _________.
A) registration
B) agent discovery
C) data transfer
D) None of the choices are correct
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.
A) IGMP
B) IP
This is the correct answer.
C) ICMP
D) None of the choices are correct
A registration request or reply is sent by ________ using the well-known port 434.
A) TCP
B) IP
This is the correct answer.
C) UDP
D) None of the choices are correct
_________ occurs when a remote host communicates with a mobile host that has moved to the same network (or site) as the remote host.
A) Triple crossing
This is the correct answer.
B) Double crossing
C) Triangle routing
D) None of the choices are correct
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.
A) Triple crossing
B) Double crossing
This is the correct answer.
C) Triangle routing
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its home agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
In the _______ phase, a mobile host must learn the address of its foreign agent.
This is the correct answer.
A) agent discovery
B) registration
C) data transfer
D) None of the choices are correct
If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.
A) solicitation
This is the correct answer.
B) advertisement
C) discovery
D) None of the choices are corr
A mobile host can send an agent _______ message if it has not received any agent advertisements.
This is the correct answer.
A) solicitation
B) discovery
C) registration
D) None of the choices are correct
When a mobile host wants to register with its foreign agent, it sends _______ message.
A) an agent solicitation
B) an agent advertisement
C) a registration request
D) None of the choices are correct
The registration reply is sent by the _______ agent to the foreign agent.
This is the correct answer.
A) home
B) care-of
C) discovery
D) None of the choices are correct
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
The _______ uses a registry table to find the care-of address of the mobile host.
A) home agent
This is the correct answer.
B) foreign agent
C) remote host
Read more:-02
If you really want to succeed, you have to rely on your customers to do all the work for you. To learn more about computer repair Perth, visit on hyperlinked site.
ReplyDeleteIf the configuration is inconsistent or if the user cannot easily change the configuration to meet their needs, they could lose their customers to a more reputable provider.If you are curious to know more about virtual server, check here.
ReplyDeleteFor example, you may need a managed server which is capable of handling thousands of users and can be accessed from any computer on the planet. If you want to get more interesting details about brisbane servers, visit this site right here.
ReplyDelete