UDP packets are called as _________
a. Segments
b. Checksum
c. Frames
d. Datagrams

1 Answer

Answer :

d. Datagrams

Related questions

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : Breaking physical memory into fixed-sized bloclcs called as: (1) Packets (2) Page (3) Frames (4) Segments

Last Answer : Frames

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes

Last Answer : C. packets

Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes

Last Answer : c) packets

Description : The size limit for datagrams in UDP is  A) 128 B) 16 C) 64 D) 4

Last Answer : The size limit for datagrams in UDP is 16

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP

Last Answer : b. UDP

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges

Last Answer : a. Host

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams

Last Answer : Theidentification fieldis the same for all three datagrams.

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D

Last Answer : a. A & B

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams

Last Answer : C. The identification field is the same for all three datagrams.

Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above

Last Answer : Selective-Repeat ARQ

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above

Last Answer : differentiatedservices

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001

Last Answer : c. 11010110111110

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : Checksum is used in Internet by several protocols although not at the _________ a) Session layer b) Transport layer c) Network layer d) Data link layer

Last Answer : d) Data link layer

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : An IGMP packet is carried in an __________ packet. A) UDP B) IP C) Ethernet frame D) noneof the above

Last Answer : IP

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS