Question

Question 1 1 The time to live field of IP header can prevent -------- in packet...

Question 1

1

The time to live field of IP header can prevent -------- in packet forwarding

Question 2

In TCP connections, RST packets are used to ---------  

Question 3

(Multiple answers if applied) The protocol field of the IP header can be

  A) IP

B) TCP

C) ICMP

D) UDP

E) ARP

Question 4

Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model.

Question 5

A web browser is -------- ---------------

Question 6

Cyber is a Collection of -------------- , ---------- and ----------where--------- use ---------- to exchange -----------

Question 7

(Multiple answers if applied) Source port and destination port are parts of

A) IP header

B) ICMP header

C) Ethernet header

D TCP header

Question 8

Ping utility sends--------- packets to end hosts to test reachability

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. The Time to live prevent a packet for going in infinite loop(by lifespan of packet on a network) in packet forwarding.

2.In TCP connections, RST packets are used to to reset the connection.

3.Protocol contains a number that indicate type of data in payload. The commonly used value are 17 (for UDP) and 6 (for TCP).SO option (B) and (D)

4.Framing us done in Data link layer so Frame exists in Data link layer.

Packet exists at Network layer.

Segmentation done at transport layer so data segments exist at Transport layer of TCP/IP model.

5.A web browser is software application used for accessing information from the world wide web.

7.Source port and destination port are parts of TCP/UDP. SO option (D) is correct.

8.Ping utility sends Data packets to end hosts to test reachability

Add a comment
Know the answer?
Add Answer to:
Question 1 1 The time to live field of IP header can prevent -------- in packet...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. a. In Wireshark, for packet 92, what information in the IP header indicates that the...

    1. a. In Wireshark, for packet 92, what information in the IP header indicates that the datagram has been fragmented? b. What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram? 2. a. For packet 93, what information in the IP header indicates that this is not the first data fragment? Are there more fragments? If so, how can you tell? - 0 X IP_traceFile File Edit...

  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe...

    (a) Describe briefly the packetizing services provided by network-layer of the TCP/IP (3 marks) (b) Describe briefly the multiplexing services provided by the network-layer of the protocol suite. TCP/IP protocol suite. How can the multiplexed TCP and UDP packets be (4 marks) (c) Describe briefly the impact of congestion on packet delay and throughput. Describe (6 marks) (d) Fig. Q1 shows a network adopting the virtual-circuit approach to transmit demultiplexed at the destination? the strategy used in the Internet to...

  • Notes: Each packet begins with a 14 byte Ethernet header A missing byte “__” denotes an...

    Notes: Each packet begins with a 14 byte Ethernet header A missing byte “__” denotes an unknown or corrupted byte Embedded protocol numbers in decimal are: TCP = 6; UDP = 17; and ICMP = 1 ==================================================================================== Question 1 01 00 5e 00 00 02 00 0f f8 a0 c0 80 08 00 45 00 00 30 00 00 00 00 01 11 c5 3d 0a 7b 0a 03 e0 00 00 02 07 c1 07 c1 00 1c 85...

  • . each of the following, write ONE of the letters AB to indicate your answer If...

    . each of the following, write ONE of the letters AB to indicate your answer If the receiver R of an ARP packet p sent by S does not have S's binding in its cache, which is a true? A. Only I B. Only II C. Only III D.Only I and II E. Only I and III F. Only II and GIII and I IR caches S's binding if p is a broadcast and R is the target II. R...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1)...

    TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) The grouping of two or more class networks together is called a CIDR block. True or False?             1) _______ 2) The User Data Protocol (UDP) is used to speed up data transfers. True or False?   2) _______ 3) Two host bits are borrowed if four subnets are to be created. True or False?             3) _______ 4) A host computer is assigned the IP address...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT