What field tells the Internet layer how to handle an IP packet?
* Type of Service
* IdentificationFlags
* Frag Offset

1 Answer

Answer :

Correct answer: A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the
internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4
bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the
internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upper layer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Related questions

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification

Last Answer : (A) Type of service 

Description : What's a good packet sniffer for OS X?

Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet

Last Answer : Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc

Description : Which of the following is an application layer service?

Last Answer : C) Mail service

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : "Local area connection doesn't have a valid IP configuration" on Windows 7; Why?

Last Answer : Have you tried disabling and enabling the LAN connection in control panel > network connections? This is the first thing I would try. Then if that doesn’t work it might be a faulty Ethernet cable. Lastly, the drivers you are using for you NIC card might be incorrect since you let windows pick them.

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D

Last Answer : Correct answer: A Possible Subnets IP Address Class Possible Hosts

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122

Last Answer : Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary- ... mask 255.255.255.248 to binary-11111111 11111111 11111111 11111000. AND them together to get: 11001001 1101111

Description : When configuring the subnet mask for an IP address, which formats can be used? * dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary

Last Answer : Correct answer: A, B &C

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : The............. layer change bits onto electromagnetic signals.

Last Answer : A) Physical

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams

Last Answer : C. The identification field is the same for all three datagrams.

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : Which field is used to define the user’s default shell?

Last Answer : command-The last field, called either command or login command, is used to specify what shell the user will use when he logs in.

Description : How do I set up my Xbox 360 to the internet?

Last Answer : answer:Hi freerange! We did something (sort of) simillar in the old condo I was living at. You shouldn't need another router. Here's what you need to do: I'm assuming that your wireless router ... your router into the mystery port in the bottom level and see when the light turns on. Happy gaming!

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Last Answer : OSI Layers Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation ... mails. -SNMP (Simple Network Management Protocol) allows the management of the network. 

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : FDDI used which type of physical topology?

Last Answer : B) Ring

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)

Last Answer : (b) and (c)

Description : Do spam-bot accounts on Twitter automatically unfollow you if you are not tweeting cetain keywords?

Last Answer : answer:I wish I could say I knew enough about Twitter to say with any certainty. Always lovely to see you though, Keith!

Description : Would it be more advantageous to meet as many people as I can? Or be extremely selective as it pertains to multiple industries?

Last Answer : As a musician one would think that you are already known the the Community? Are you not playing at local concerts,coffee houses,events ( even volunteering your musical talents)? Also start a blog or Utube ... or American Idol too? If music and creating IS your passion then play it up! Good luck.

Description : Does anybody frequent any other question/answer site other than Fluther?

Last Answer : Was at Answer Bag before migrating here with a large school of AB’rs when they messed up that site. Also a member over at Experience Project. EP is so messed up now that it looks like some members have new start up that they hope will bring back the fun they once had there.

Description : Any advice on networking for the first time at an event?

Last Answer : I think dressing fairly professionally would be a good way to go. As this is meeting people in a possible business capacity, it is important to look the part. I think if you just go up and introduce ... being asked for their advice. These after all, are the best people to give their advice to you.

Description : Artists, businesses, public figures: How do you personally separate your social media?

Last Answer : I use Twitter, Instagram and Facebook. I follow a whole range of celebrities all over the place, really. Someone who puts up really good pictures, I will follow on Instagram. However if someone has a ... celebrities on there, as well as many pages on all sorts of things (musicians, brands, etc).

Description : I haven't networked anything but am going to do that to my computers and printers, plus a tv later. Can I get a good reference book or where should I go to get this done?

Last Answer : answer:Hi @igottaknow, welcome to Fluther! Your network will be built around a router. Everything will connect to that device. And instruction manuals for routers usually give a pretty good introduction, as ... - Home Networking 101 PCWorld - Step-By-Step: How to Build a Safe, Secure Network

Description : What can you tell me about Freemasonry? (This is not a conspiracy theory thread)

Last Answer : answer:I used to date a Mason. He was fairly serious about it, and his father before him had been very serious, raised to the 33rd degree. My boyfriend told me lots of things, and I ... this: they do support worthy causes. The Shriners' hospital in Boston for pediatric burns cases is one example.

Description : How to get an Open NAT using Wireless Adapter for Xbox 360?

Last Answer : answer:Go to www.portforward.com It will tell explain exactly what you need to do. Walshy

Description : Why is PPTP blocking RV016 login?

Last Answer : Have you previously been able to access the router's config pages over the VPN? If I were administering the network I would disable remote admin access to the device. Is it possible that your client has done ... go on here. I'm afraid the best answer I have right now is to contact Linksys support.

Description : How to extend the range of wireless router?

Last Answer : First, I recommend trying the signal at different points in the garage. If the wireless adapter is USB-based this is trivially easy, but if it's a PCI adapter (inside the computer) then you might need an ... , and it might be worthwhile for other reasons too- I don't see any reason not to try it.

Description : What do you know about Freemasons?

Last Answer : answer:@youcancallmemoonman Some of the finest men I've ever known, have been masons. Having said that, I'll try to return tomorrow to answer to your question. This one can't be done lightly. I am ... to know. My best to you. Two family birthday parties in three days have left me a bit toasted!

Description : Ok, i was host in Modern Warfare 2 today, and people say they lagg but i dont. please help?

Last Answer : it means that they had a sub-par connection to your computer. Because the game is hosted on your computer, you have little to no lagg. I’d suggest stopping any downloads you have going on if you’re going to host, as that tends to hog your bandwidth. Or, you could just let someone else host.

Description : What is your expertise that you would share or mentor another Jelly on?

Last Answer : Pfft, if any jellies had a DIRE NEED to learn how to transcribe and play video game music on the piano, train their pokemon to perfection, photoshop a picture, do a derivative, or diagnose a kidney stone, I’m their go-to girl.

Description : Web-based business networking -- Valuable or worthless?

Last Answer : I haven’t used LinkedIn except to connect to former connections, but I have a friend who has used the network to find someone (who knows someone she knows) to contact.

Description : Why doesn't the facebook chat work?

Last Answer : facebook crashed temporarily it did it yesterday, now it should be working

Description : Why can't we the people have more input in our government, other than every 4 years?

Last Answer : answer:You do. Vote locally. Your local government has more control over your everyday life than the President does. Most Americans can’t be bothered to vote more than once every 4 years. They just don’t show up at the polls for the local stuff.