Question

Question 1 The size of the datagram is determined by the application that sends the data....

Question 1

The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications.

True
False

Question 2

What is the conceptual network boundary, and where is it located within the protocol stack?

Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack.
Identifies application direct messaging and is formed between layers 3 and 4.
Identifies the point between IP addressing and MAC addressing, between the Link (network interface) and Internet layers.
Identifies the transition area between UDP and TCP protocols, and can be found between the Application and Transport Layers.

Question 4

In the IP address hierarchy, each 32-bit IP address is divided into two parts:

Prefix; Suffix
a time to live (TTL); a time to die (TTD)
Part A; Part B
a unique network number; a locally assigned suffix
both a and d

both b and c.

Question 5

Each hardware technology specifies the maximum amount of data that a frame can carry. This limit is known as ___________________________________________________.

The header checksum
a flag
padding
the maximum transmission unit

Question 7
Time-To-Live is a key component of the IP datagram header format. Time to Live is an eight bit integer initialized by the original sender and decremented by each router that processes the datagram. What happens when the value of the datagram integer reaches a value of zero?

The datagram forms a loop and is resent by the original sender
The datagram is discarded
The datagram is sent to the next router, then returned to sender
An error message is sent back to the source
a and c above
b and d above

Question 8

“Best effort delivery” is __________________________.

A misnomer, as TCP guarantees delivery to all packets transported using the TCP/IP protocol suite.
A concept to deliver messages across the network but does not provide special handling for corrupted or lost packets.
Identifies a quick delivery system using complex routing tables, which must be preprogrammed before message/packet transmission.
A misnomer, as UDP guarantees delivery to all packets transported using the TCP/IP protocol suite.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question 1

The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications.

a.True

b.False

Question 2

What is the conceptual network boundary, and where is it located within the protocol stack?

a.Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack.

b.Identifies application direct messaging and is formed between layers 3 and 4.

c.Identifies the point between IP addressing and MAC addressing, between the Link (network interface) and Internet layers.

d.Identifies the transition area between UDP and TCP protocols, and can be found between the Application and Transport Layers.

Question 4

In the IP address hierarchy, each 32-bit IP address is divided into two parts:

a.Prefix; Suffix

b.a time to live (TTL); a time to die (TTD)

c.Part A; Part B

d.a unique network number; a locally assigned suffix

e.both a and d

f.both b and c.

Question 5

Each hardware technology specifies the maximum amount of data that a frame can carry. This limit is known as ___________________________________________________.

a.The header checksum

b.a flag

c.padding

d.the maximum transmission unit

Question 7

Time-To-Live is a key component of the IP datagram header format. Time to Live is an eight bit integer initialized by the original sender and decremented by each router that processes the datagram. What happens when the value of the datagram integer reaches a value of zero?

a.The datagram forms a loop and is resent by the original sender

b.The datagram is discarded

c.The datagram is sent to the next router, then returned to sender

d.An error message is sent back to the source

e.a and c above

f.b and d above

Question 8

“Best effort delivery” is __________________________.

a.A misnomer, as TCP guarantees delivery to all packets transported using the TCP/IP protocol suite.

b.A concept to deliver messages across the network but does not provide special handling for corrupted or lost packets.

c.Identifies a quick delivery system using complex routing tables, which must be preprogrammed before message/packet transmission.

d.A misnomer, as UDP guarantees delivery to all packets transported using the TCP/IP protocol suite.

Add a comment
Know the answer?
Add Answer to:
Question 1 The size of the datagram is determined by the application that sends the data....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Assume an Internet phone application generates packets only during talk spurts. During a talk spurt the...

    Assume an Internet phone application generates packets only during talk spurts. During a talk spurt the sender generates bytes at a rate of 1000 bytes per second, and every 50 msecs the sender gathers bytes into chunks. Assume that RTP is used that will add a header to each chunk. In addition UDP and IP will be used. Suppose all headers (including RTP, UDP and IP) have a total length of h and an IP datagram is emitted every 40...

  • Question 1 1 The time to live field of IP header can prevent -------- in packet...

    Question 1 1 The time to live field of IP header can prevent -------- in packet forwarding Question 2 In TCP connections, RST packets are used to ---------   Question 3 (Multiple answers if applied) The protocol field of the IP header can be   A) IP B) TCP C) ICMP D) UDP E) ARP Question 4 Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model. Question 5 A web browser is -------- --------------- Question...

  • 1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop...

    1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.Immersive Reader (10 Points) network data link transport physical 2.As frequency increases, the period ________.Immersive Reader (10 Points) increases none of the choices are correct decreases remains the same 3.Data can flow only in both direction all of the times in a _________ mode.Immersive Reader (10 Points) none of the choices are correct half-duplex simplex full-duplex 4.For a ______ channel, the...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 21. App (application software) requires a member of transport services to function. Which choice best describes...

    21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...

  • (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe...

    (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the protocol suite. TCP/IP protocol suite. How can the multiplexed TCP and UDP packets be (4 marks) (c) Describe briefly the impact of congestion on packet delay and throughput. Describe (6 marks) (d) Fig. Q1 shows a network adopting the virtual-circuit approach to transmit demultiplexed at the destination? the strategy used in the Internet to...

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • 1) Transport services and protocols provide ____________ between ____________ running on different hosts 2) Multiplexing (at...

    1) Transport services and protocols provide ____________ between ____________ running on different hosts 2) Multiplexing (at the sender)? 3) What does a host use to direct segment to appropriate socket? 4) Too many sources send too much data too fast for network to handle; this situation can lead to ____? 5) Given 20 bytes if IP header, 20 bytes of TCP header, 20 bytes of link-layer header. Suppose an application generates chunks of 20 bytes of data every 20 millisecond....

  • LTE Data Link Homework. Unanswered Match the LTE Data Link layer protocol with its description Drag...

    LTE Data Link Homework. Unanswered Match the LTE Data Link layer protocol with its description Drag and drop options on the right-hand side and submit. For keyboard navigation... Show More Packet Data Convergence fragmentation and reassembly, reliable data transfer Radio Link Control III use of radio transmission slots Medium Access III mobility management III header compression and encryption III authentication services Unanswered Submit Multiple Correspondents Homework. Unanswered Which issues effect multiple concurrent correspondents Select an answer and submit. For keyboard...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT