____ is a process-to-process protocol that adds only port addresses, checksum  error control, and length information to the  data from the upper layer.

1 Answer

Answer :

UDP

Related questions

Description : A _______ is a three-layer device that handles packets based on their logical addresses

Last Answer : router

Description : Classification of protocol that interprets a frame of data as a group of successive bit combined into predetermined pattern of fixed length, usually 8 bits each.

Last Answer : Character and Byte-oriented protocols

Description : ____ is a dynamic mapping protocol in which a physical address is found for a given logical address

Last Answer : ARP

Description : One of the responsibilities of the transport layer protocol is to create a ______ communication.

Last Answer : process to process

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : The upper pulse rate and information carrying capacity of a cable is limited by:

Last Answer : modal dispersion

Description : Dividing the data block by a constant produces a remainder that is used for error detection.

Last Answer : Cyclic redundancy check

Description : The OSI layer that provides the control functions necessary to establish, manage and terminated the connections as required to satisfy the user reques

Last Answer : Session layer

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : _________ is the protocol suite for the Internet.

Last Answer : TCP/IP

Description : _______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T.

Last Answer : ATM

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?

Last Answer : 428

Description : It is the symmetrical expectation of the bit error rate in the system.

Last Answer : probability of errors

Description : The property of interchangeability for the transmitting and receiving operations is known as ____

Last Answer : reciprocity

Description : Optical power is sometimes called ____

Last Answer : Radiant flux

Description : Image frequencies occur when two signals ____.

Last Answer : enter the mixer, one below and one above the local oscillator by a difference equal to the IF

Description : Quantizing is ____

Last Answer : . A/D converter

Description : The main circuit in a PSN generator is ____.

Last Answer : Shift register

Description : ____ is a virtual-circuit wide-area network that was designed in response to demands for a new type of WAN in the late 1980s and early 1990s.

Last Answer : . Frame Relay

Description : The ISDN channel D designates _____ which contains control information

Last Answer : Data

Description : Set rules implementing and governing an orderly exchange of data between layers of two devices, such as line control units and front – end processors.

Last Answer : Data Link Protocol

Description : It is proposed network designed by major telephone companies in conjunction with the ITU-T with the intent of providing worldwide telecommunications support for voice, data, video and facsimile information within the same networ

Last Answer : ISDN

Description : A repeater is a connecting device that operates in the _______ layer of the Internet model.

Last Answer : physical

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Checksum is used in Internet by several protocols although not at the _________ a) Session layer b) Transport layer c) Network layer d) Data link layer

Last Answer : d) Data link layer

Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : The size, shape, and dielectric material of a waveguide must be constant throughout its length for energy to move from one end to the other without reflections. What could be the effect in any abrupt change in its size or shape?

Last Answer : Reflections.

Description : A mode where the entire magnetic field is in the transverse plane and has no portion parallel to the length axis.

Last Answer : TM mode

Description : The reason a CSMA/CD network has a minimum length for packets is:

Last Answer : to make sure all other nodes hear a collision in progress

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Product planners need to think about product products and s s and services on three levels. Each level adds more customer value. adds more customer value. The most basic level is The most basic ... buying? a. actual product b. augmented product augmented product c. core benefit d. co-branding

Last Answer : c. core benefit

Description : __________ defines how a user gets control of the channel so as to allow transmission.

Last Answer : channel access

Description : It is the transmission of information in any form from one source to one or more destination.

Last Answer : Multiplexing

Description : It is used to encode the minimum amount of speech information necessary to reproduce a perceptible message with a fewer bits that those needed by a conventional encoder/decoder

Last Answer : vocoders

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : _______ refers to the structure or format of the data, meaning the order in which they are presented.

Last Answer : Semantics

Description : A ________ is a set of rules that governs data communication

Last Answer : protocol

Description : Sixteen different levels (symbols) are used to encode binary data. The channel bandwidth is 36 MHz. The maximum channel capacity is

Last Answer : 288 Mbps

Description : The characters making up the message in a synchronous transmission are collectively referred to as the data

Last Answer : block

Description : A transmission of binary data which involves the transmission of two non – zero voltage level

Last Answer : Bipolar