Source and destination ip addresses for the ipv4 header

Assignment Help Other Engineering
Reference no: EM13798394

1. An address that identifies an application at the transport layer is:
ARP
IP
MAC
Port Address

Question 2. The Pv4 address range 169.254.0.0/16 is reserved for:
Link-Local addresses
Loopback addresses
Broadcast addresses
Addresses for self-identification

Question 3.The first four bits of the IPv4 addresses reserved for research are:
0000
1000
1110
1111

Question 4.  To determine how many digits are used for the network identifier in an IPv4 address, you must look at the:
subnet mask
binary mask
MAC mask
TCP/IP mask


Question 5. Which one of the following IPv4 addresses cannot be used as the destination address in an IPv4 packet?
12.0.0.0/8
12.0.0.1/8
12.5.5.5/8
12.255.255.254/8


Question 6. Number of addresses in the IPv4 address block 193.17.8.128/25 is:
25
256
128
none of the above


Question 7. The subnet mask for the address block 163.248.248.0/21 is:
255.0.0.0
255.255.0.0
255.255.248.0
255.255.255.21

Question 8. Which one of the following subnets does the IPv4 address 154.180.0.58 255.255.255.248 belong to?
154.180.0.0/29
154.180.0.32/29
154.180.0.48/29
154.180.0.56/29

Question 9.One of the nodes in a broadcast domain is assigned the IPv4 address 152.165.113.126/21. Which one of the following IPv4 addresses cannot be assigned to any of the other nodes in the same broadcast domain?
152.165.115.254/21
192.168.118.160/21
192.168.111.253/21
192.168.117.158/21

Question 10.  What is the maximum number of subnets with 255.255.255.248 mask in a class C network?
5
8
32
64

Question 11.  The protocol used to map IP addresses to their physical addresses is:
IP Addressing
ARP
RARP
CIDR

Question 12. The IP header has a minimum length of:
5 bytes
15 bytes
20 bytes
none of the above

Question 13. The TTL keeps track of ____________ to decide whether a datagram is discarded.
Time
Message size
Fragments
Number of routers passed through


Question 14.All of the following apply to ICMP EXCEPT:
It is a Layer 3 protocol
It is a routable protocol
It compensates for IP's connectionless messaging drawback
It is independent of the IP header

Question 15. All of the following are ICMP error-reporting messages EXCEPT:
Protocol mismatch error
Destination unreachable
Source quench
Redirect

Question 16. The IANA defined three port categories. Which of the following is NOT a port category?
Static
Well-known
Registered
Dynamic

Question 17.  The following are advantages that TCP has over UDP EXCEPT:
It is more reliable than UDP
It provides acknowledgement information, UDP does not
It is faster than UDP
It guarantees delivery of datagrams, UDP does not

Question 18.TCP uses all of the following error detection methods EXCEPT:
FEC
Checksum
Acknowledgement
Time-out

Question 19.  Which of the following protocols uses TCP port 443?
HTML
HTTPS
TFTP
Telnet


Question 20. Which of the following protocols use both TCP and UDP?
FTP
SMTP
Telnet
DNS

Question 21.UDP is called a ________________transport protocol.
Connectionless, reliable
Connection-oriented, unreliable
Connectionless, unreliable
none of the above

Question 22.  Which of the following is considered a disadvantage of a client/server network? (Points : 5)
It is the least secure network architecture
It requires dedicated management staff
User accounts are managed locally on each network computer

Question 23.  Clients in Philadelphia area need to access content in a server located in the Boston area. The packets need to cross several hops to make it to the server. Which OSI layer governs the standards related to this requirement?
Application
Session
Transport
Network

Question 24.Which of the following could not be an Ethernet source address?
8A-7B-6C-DE-10-00
8B-32-21-21-4D-34
EE-AA-C1-23-45-32
46-56-21-1A-DE-F4

Question 25.  _______ encoding has a transition at the middle of each bit.
RZ
Manchester
Differential Manchester
all of the above

1. Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and the last valid host address for the subnet address of the host with IP v4 address: 172.16.10.5 255.255.248.0

Question 2.  An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56. Answer the following questions about the header: What is the size of data in the IPv4 datagram? What type of higher-level protocol is this datagram carrying? How many more hops can the datagram travel without being dropped? What are source and destination IP addresses for the IPv4 header?

Question 3 A router with IPv4 address 125.45.23.12 and the MAC address 23:45:AB:4F:67:CD has received a packet for a host destination with IP address 125.11.78.10. Show the entries in the ARP request packet sent by the router.

Question 4. A client sends 1024 bytes of data to a server using TCP protocol. Calculate the efficiency of this transmission at the TCP level (ratio of data excluding header to the total bytes transmitted). Calculate the efficiency of transmission at the IP level. Assume no options for the header and no errors. Calculate the efficiency of transmission at the data link layer. Assume no options for IP header and Ethernet-II format are used at the data link layer.

Reference no: EM13798394

Questions Cloud

Why osha''s air contaminant standards are important : Discuss whether you think OSHA's air contaminant standards are important, and why. Do you think they are adequate to protect employees in the workplace from airborne contaminant hazards. Explain.
Eras of new mexico geography : 1) List the 8 eras of New Mexico geography: name three Athabaskan Nations and three Pueblo Nations
Organization development consultant for medium size company : Organization development consultant for a medium size manufacturing company. After analyzing the company, you suggest some change initiatives to be implemented in the organization.
Discuss current budgetary processes : Discuss Current Budgetary Processes
Source and destination ip addresses for the ipv4 header : What is the maximum number of subnets with 255.255.255.248 mask in a class C network?
Use gauss-seidel method to solve the load flow problem : In reference to the power system reactance diagram, all values are given in pu. Determine the followings: Construct the bus admittance matrix for the power system shown in Fig. and Use Gauss-Seidel method to solve the load flow problem
Feeding a population-type of agriculture : Is the world currently at the point where it can no longer feed the population? Explain. What kind of agriculture would be needed to change your answer?
Swot is an acronym for strengths : SWOT is an acronym for Strengths, Weaknesses, Opportunities, and Threats. The idea behind SWOT is that a good strategy exploits an organization's opportunities and strengths while neutralizing threats and avoiding or correcting weaknesses.
Landscapes and resources memo : During an investigation of the rise in temperature in UrCity, you have learned several critical things:

Reviews

Write a Review

Other Engineering Questions & Answers

  The significance of a voltage amplifier and its applications

Describe how negative feedback works, and explain some of its advantages.

  Calculate different measures of performance

Calculate different measures of performance (L, Lc, W, WQ), when you do not buy any additional grinders. That is, when you have a single grinder. Also, calculate the cost per minute of the system with a single grinder.

  Formulate a binary linear programming model

Formulate a binary linear programming model for the above inspection planning problem by defining you decision variables and writing the objective and objective function and the constraints in terms of your decision variables. Combine everything t..

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  The following describes a mineral deposit

The following describes a mineral deposit. For the deposit the candidate is required to select a suitable mining method for the deposit based on the information given and to describe the mining system in detail. The candidate should include in their ..

  Prepare a optical networks1- background about optical

prepare a optical networks1- background about optical network and how it is work.2- advantages and application for

  Design a mine ventilation network

Draw in a decline from the surface (at -100) with nodes placed at every sub level to allow the break-offs to be established. Two ways are recommended to draw horizontal airways between levels.

  Question 1 a for the reciprocal lattice we know

question 1 a for the reciprocal lattice we know thatexpjg.r 1where g.r 2pit t an integerr lambnc real-spacedirect

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  What is meant by point-of-operation guards

What is meant by point-of-operation guards and What are the three types of point of operation guards? What are their advantages and limitations and Briefly describe four requirements that all safeguards should have.

  New keynesian model with technology shocks consider a new

new keynesian model with technology shocks consider a new keynesian economy with equilibrium conditions given bywhere

  Question 1in view of growing number of deaths on the road

question 1in view of growing number of deaths on the road the police department plans to introduce more speeding

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd