true or false ?
1) In a network where virtual circuit is used in Network layer , the virtual circuit number is fixed through out the route .
2) If an IP packet is fragmented at a router , the reassembly will be perform in next router.
3) When a client machine first sends out the DHCP discover message , the message destination address should be set to DHCP server IP address.
4) In IPv6 , IP address is 6 bytes long.
(1) In a network where virtual circuit is used in Network layer , the virtual circuit number is fixed through out the route .
Answer: true
Description:
In a network where a virtual circuit is used in network layer, the virtual circuit number is fixed throughout the route because it follows connection oriented communication or packet switching method. So, the virtual circuit or virtual path is always fixed to deliver data.
(2) If an IP packet is fragmented at a router , the reassembly will be perform in next router.
Answer: False
Description:
Reassembly of fragmented IP packets is taking place at the destination router or host. Generally in both IPv4 and IPv6 reassembly is done at receiving destination only.
(3) When a client machine first sends out the DHCP discover message , the message destination address should be set to DHCP server IP address.
Answer: False
Description:
When a DHCP client machine first sends DHCPDISCOVER message then for broadcasting the message, destination address will be 255.255.255.255 or particular subnet broadcast address to find any server in the network.
(4) In IPv6 , IP address is 6 bytes long.
Answer: False
Description:
In IPv6 protocol, IP addresses are 16 bytes (128bits) long.
true or false ? 1) In a network where virtual circuit is used in Network layer...
The figure below shows a wired network with IP and MAC addresses assigned for each host. The client sends a packet to the server (labels 1 and 2) 65.55.251.214 00:0d:93:30:c1:da S: D: 152.160.3.254 00:23:12:f4:e7 S: D: 2 152.160.3.2 01:d3:12:45:f3 4.125.228.39 Router 00:34:12:a8:c1:de Server Client The source MAC address for the packet between the client and the router (label 1) is address is and the destination MAC
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...
HINTS FOR THE MACHINE PROELEM 1 Problem 1.1 a) i. DHCP. CHCP D4CFOffer Desanbe in detatl the 1-step process that the DHCP Client requests for the P Address frcm the DHCF Serrer. Capture te pockage DHC PDiscovez DHCP0fter, DHCPRequest, DHC PAck to shotw their struuctuTes. i ARP. Describe in dtail the 5-step process of a machine or router perocning ARP protocol to ind the phrsical address of the network node with the known IF address Captue the packages: ARP Request,...
Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) The grouping of two or more class networks together is called a CIDR block. True or False? 1) _______ 2) The User Data Protocol (UDP) is used to speed up data transfers. True or False? 2) _______ 3) Two host bits are borrowed if four subnets are to be created. True or False? 3) _______ 4) A host computer is assigned the IP address...