In datagram subnet new route is chosen …………………
(A) for every packet sent
(B) for first and last packet sent
(C) only for the first packet
(D) for the packet which is not transmitted

1 Answer

Answer :

(A) for every packet sent

Related questions

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward

Last Answer : A. Point-to-Point channels and Broadcast channels

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : Which of the following is anecessary part of the IPv6 datagram? A) Base header B) Extension header C) Data packet from the upper layer D) (a) and (c)

Last Answer : Base header

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13

Last Answer : d. 13

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched

Last Answer : a. virtual-circuit

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : Consider the given network implementation scenario. For the given classful NID 199.10.20.0/24, the requirement is to create 13 subnets. With given details, find the range of first and last valid IP in 15th subnet. a. ... .20.225 to 199.10.20.238 c. 199.10.20.193 to 199.10.20.206 d. Not of these

Last Answer : a. A Only

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689

Last Answer : c. Last fragment, 2400 and 2759

Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique

Last Answer : a) Packet switching techniques

Description : Which of the following is true about ICMP messages? A) An ICMP error message may be generated for an ICMP error message. B) An ICMP error message may be generated only for the first fragment. C) An ICMP error message may be generated for a multicast datagram. D) noneis true

Last Answer : An ICMP error message may be generated only for the first fragmen

Description : You havea class A network address 10.0.0.0 with 40subnets,but arerequiredto add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should youassign? A. ... B. 255.248.0.0 C. 255.252.0.0 D. 255.254.0.0 E. 255.255.255.255

Last Answer : 255.254.0.0

Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200

Last Answer : 255.255.255.0

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : On a class B network, how manyhostsare availableat eachsite witha subnet mask of 248? A. 16,382 B. 8,190 C. 4,094 D. 2,046 E. 1,022

Last Answer : 2,046

Description : Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A. 0.0.0.0,0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0,255.0.0.0 C. 255.0.0.0, 255.255.0.0, 255.255.255.0 D. 255.255.0.0, 255.255.255.0,255.255.255.255 E. None of the above

Last Answer : 255.0.0.0, 255.255.0.0, 255.255.255.0

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : With anIP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 252

Description : What partof 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above

Last Answer : 192.168.10

Description : What is the default subnet mask for a class C network? A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0 D. 255.255.255.0 E. None of the above

Last Answer : 255.255.255.0

Description : If a Company require 60 hosts then What is the best possible subnet mask? a. 255.255.255.0 b. 255.255.255.192 c. 255.255.225.224 d. 225.225.255.240

Last Answer : b. 255.255.255.192

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : The _______ layer is the topmost layer in the subnet. A. Network B. application C. transport D. physical

Last Answer : A. Network

Description : The Switching Elements are also called as ………. A. host B. subnet C. Interface Message Processors (IMPs) D. both a and b

Last Answer : C. Interface Message Processors (IMPs)

Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800

Last Answer : the first byteof the datagram is byte800

Description : A switchin a datagram network uses arouting tablethat is based on the ______address. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : The network layer in the Internet isdesigned as a __________network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : datagram

Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : A switched WAN is normally implemented as a _______ network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : In _______ there are no setup or teardown phases. A) datagram switching B) circuit switching C) frame switching D) none of the above

Last Answer : datagram switching