CS8591 Computer
Networks
UNIT III Network Layer
(Multiple Choice Questions (MCQ))
Network Layer
Services – Packet switching – Performance – IPV4 Addresses – Forwarding of IP
Packets - Network Layer Protocols: IP, ICMP v4 – Unicast Routing Algorithms –
Protocols – Multicasting Basics – IPV6 Addressing – IPV6 Protocol.
1. The _____________ layer is
responsible for the delivery of individual packets from source host to the
destination host.
A. Network B. Transport C.
Physical D. Network
Ans. A
2. Network layer services are
A. packetizing
B. routing
C. forwarding
D. All of the above
Ans. D
3. The process of encapsulating the data
received from upper layers of
the network (also called as
payload) in a network layer packet
at the source and decapsulating the payload from the network layer packet at the
destination is known as ________________.
A. packetizing
B. routing
C. forwarding
D. All of the above
Ans. A
4. Main responsibilities of
network layer are
A. logical addressing
B. routing
C. both (a) and (b)
D. None of the above
Ans. C
5. Network layer functions are
logical addressing and routing. In addition, other functions are
A. Datagram encapsulation
B. Fragmentation and reassembly
C. Error handling and diagnostics
D. All of the above
Ans. D
6. When a packet passes the
network boundary, the network layer adds the ________ addresses of the sender
and receiver.
A. logical
B. physical
C. port
D. None of the above
Ans. A
7. The IPv4 Addressing system is
divided into ________ classes of IP Addresses.
A. 2 B. 3 C. 4 D. 5
Ans. D
8. An IPv4 address is a ______
address.
A. 16-bit B. 32-bit C. 64-bit D.
128-bit
Ans. B
9. Each Internet address consists
of four bytes (32 bits), defining three fields:
A. class type
B. netid
C. hostid
D. All of the above
Ans. D
10. An ______________ is made of
four bytes (32 bits) that define a host's connection to a network.
A. internet protocol address
B. physical address
C. port address
D. None of the above
Ans. A
11. In binary notation, IPv4
address has ____ octets.
A. 2 B. 3 C. 4 D. 5
Ans. C
12. IPv4 uses 32-bit addresses,
which means that the address space is
A. 2
B. 2
C. 2
D. None of the above
Ans. A
13. In classful addressing, a
large part of the available addresses were
A. Consumed
B. Reserved
C. Wasted
D. None of the above
Ans. C
14. In classful addressing, the
whole address is divided into two parts that are
A. Netid and Hostid
B. Netid and packetid
C. Netid and frameid
D. None of the above
Ans. A
15. __________ addresses were
designed for large organizations with a large number of attached hosts or
routers.
A. Class A
B. Class B
C. Class C
D. None of the above
Ans. A
16. __________ addresses were
designed for midsize organizations with tens of thousands of attached hosts or
routers.
A. Class A
B. Class B
C. Class C
D. None of the above
Ans. B
17. _______ addresses are
designed for small organizations to manage a small number of attached hosts or
routers.
A. Class A
B. Class B
C. Class C
D. None of the above
Ans. C
18. ________ addresses are used
for multicast services that allow a host to send information to a group of
hosts simultaneously.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. D
19. ________ addresses are
reserved for future use.
A. Class A
B. Class B
C. Class D
D. class E
Ans. D
20. In __________ network, the
first byte is assigned to the network address and the remaining three bytes
used for the node address.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. A
21. In __________ network, the
first two bytes are assigned to the network address and the remaining two bytes
used for the node address.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. B
22. In __________ network, the
first three bytes are assigned to the network address and the remaining one
byte used for the node address.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. C
23. Class A address range is
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. A
24. Class B address range is
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. B
25. Class C address range is
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. C
26. Class D address range is
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. D
27. Class E address range is
A. 128.0.0.0 to 191.255.255.255
B. 192.0.0.0 to 223.255.255.255
C. 224.0.0.0 to 239.255.255.255
D. 240.0.0.0 to 255.255.255.255
Ans. D
28. Class A addresses 127.0.0.0
to 127.255.255.255 cannot be used and is reserved for
loopback and diagnostic
functions. These addresses are called ________ addresses.
A. loopback
B. link-local
C. both (a) and (b)
D. None of the above
Ans. A
29. The loopback address is
mainly used
A. to test the TCP/IP
configuration of a host
B. by developers to test network
applications.
C. both (a) and (b)
D. None of the above
Ans. C
30. The class of address 00000001
00001011 00001011 11101111 is
A. Class A
B. Class C
C. Class B
D. Class E
Ans. A
31. The class of address 11000001
10000011 00011011 11111111 is
A. Class A
B. Class C
C. Class B
D. Class E
Ans. B
32. The class of address 10100111
11011011 10001011 01101111 is
A. Class A
B. Class C
C. Class B
D. Class E
Ans. C
33. The class of address 11110011
10011011 11111011 00001111 is
A. Class A
B. Class C
C. Class B
D. Class E
Ans. D
34. The class of address
227.12.14.87 is
A. Class A
B. Class B
C. Class C
D. Class D
Ans. D
35. The class of address
193.14.56.22 is
A. Class A
B. Class B
C. Class C
D. Class D
Ans. C
36. The class of address
14.23.120.8 is
A. Class A
B. Class B
C. Class C
D. Class D
Ans. A
37. The class of address
252.5.15.111 is
A. Class A
B. Class B
C. Class C
D. Class E
Ans. D
38. Identify the class of
110.34.56.45
A. Class A
B. Class B
C. Class C
D. Class E
Ans. A
39. Identify the class of 127.1.1.1
A. Class A
B. Class B
C. Class C
D. Loop back address
Ans. D
40. Identify the class of 212.208.63.23
A. Class A
B. Class B
C. Class C
D. Class E
Ans. C
41. Identify the class of 255.255.255.255
A. Class A
B. Class B
C. Class C
D. Broadcast address
Ans. D
42. In ____________ addressing,
variable length blocks are assigned that belong to no class. The entire address
space is divided into blocks of different sizes. An organization is granted a
block suitable for its purposes.
A. Classful
B. Classless
C. both (a) and (b)
D. None of the above
Ans. B
43. Advantages of classless
addressing over classful addressing are
A. Classful addressing does not
send subnet information.
B. Efficient address-space
allocation is available in classless addressing.
C. Memory is allocated in terms
of bits and bytes rather than huge chunks of contiguous memory.
D. All of the above
Ans. D
44. Packets in the IPv4 layer are
called _____________.
A. datagrams
B. segments
C. both (a) and (b)
D. None of the above
Ans. A
45. ____________ is a networking
term that defines the largest packet size that can be sent over a network connection.
A. Maximum Transmission Unit
(MTU)
B. Segment
C. Packet
D. Frame.
Ans. A
46. _________ identifies a
network with a range of Internet Protocol addresses in the Internet. It also
allows large networks to be divided into smaller networks, each with its own
set of IP addresses.
A. subnetting a network
B. intranet
C. extranet
D. None of the above
Ans. A
47. The advantages of using
subnetting are
A. reduced network traffic
B. Optimized network performance
C. Simplified network management
D. All of the above
Ans. D
48. Classless Inter Domain
Routing (CIDR) is needed to resolve the following problems the Internet faced
A. Running out of IP addresses
B. Running out of capacity in the
global routing tables
C. both (a) and (b)
D. None of the above
Ans. C
49. CIDR provides the following
solutions developed and adopted by the global Internet community
A. Restructuring IP address
assignments to increase efficiency
B. Hierarchical routing
aggregation to minimize route table entries
C. both (a) and (b)
D. None of the above
Ans. C
50. ________ is a new addressing
scheme for the Internet which allows for more efficient allocation of IP
addresses than the old Class A, B, and C address scheme.
A. CIDR
B. IPv6
C. both (a) and (b)
D. None of the above
Ans. A
51. For IPv4, __________________ is an alternative to the older system of
representing networks by their starting address and the subnet mask, both
written in dot-decimal notation. 192.168.100.0/24 is equivalent to 192.168.100.0/255.255.255.0.
A.
CIDR notation
B.
IPv6
C.
either (a) or (b)
D.
None of the above
Ans. A
52. _______ refers to the way a
packet is delivered to the next node and it requires a host or router to have a
routing table.
A. Forwarding
B. routing
C. transferring
D. None of the above
Ans. A
53. Which of the following are
forwarding techniques?
A. Next hop versus route method
B. Network specific versus host
specific method
C. Default method
D. All of the above
Ans. D
54. In the _______________________,
routing table stores only the address of the next hop and this method reduces
the content of routing table.
A. Next hop versus route method
B. Network specific versus host
specific method
C. Default method
D. All of the above
Ans. A
55. In the
_______________________, routing table contains only the address of the
destination network and this method reduces the routing table size.
A. Next hop versus route method
B. Network specific versus host
specific method
C. Default method
D. All of the above
Ans. B
56. In the ______________, host
is connected with more than one routers and a router is assigned to receive all
packets with no match in the routing table. Default router is used for
communication with outside world.
A. Next hop versus route method
B. Network specific versus host
specific method
C. Default method
D. All of the above
Ans. C
57. The _______ protocol is the
transmission mechanism used by the TCP/IP suite.
A. IP B. ARP C. RARP D. ICMP
Ans. A
58. __________ is an Internet
Protocol (IP) process that breaks packets into smaller pieces (fragments), so
that the resulting pieces can pass through a link with a smaller maximum
transmission unit (MTU) than the original packet size. The fragments are reassembled
by the receiving host.
A. IP fragmentation
B. segmentation
C. framing
D. None of the above
Ans. A
59. The IP layer provides an
__________, ______________ delivery system.
A. unreliable
B. connectionless
C. both (a) and (b)
D. None of the above
Ans. C
60. The reason why IP
is unreliable is that
A. IP provides no error checking
or tracking
B. not best delivery
C. both (a) and (b)
D. None of the above
Ans. A
61.
Functions of the IP protocol are
A. Route IP data frames around an
Internet.
B. Fragment the data into smaller
units if it is greater than a given amount (64 Kb)
C. Report errors
D. All of the above
Ans. D
62. At the network layer (the
internetwork layer), TCP/IP supports the Internetworking Protocol (IP) which,
in turn, uses the following Supporting protocols
A. ARP and RARP
B.ICMP
C. IGMP
D. All of the above
Ans. D
63. A protocol in the TCP/IP
protocol suite that handles error and control messages is
A. IP B. ARP C. RARP D. Internet
Control Message Protocol (ICMP)
Ans. D
64. Which of the following are
ICMP messages?
A. Error reporting
B. Query
C. both (a) and (b)
D. None of the above
Ans. C
65.
ICMP has the header size of
A. 8 Bytes B. 10 Bytes C. 12
Bytes D. 16 Bytes
Ans. A
66.
ICMP is the companion of
A. IP packet
B. IP protocol
C. IP frame
D. None of the above
Ans. B
67.
A host may know its IP address, but it may not know the
A. Corresponding Mask
B. Corresponding Clock
C. Corresponding Data
D. Corresponding Protocol
Ans. A
68 ______ is used to find the
physical address of the node when its Internet address is known.
A. IP B. Address Resolution
Protocol (ARP) C. RARP D. ICMP
Ans. B
69. __________________ allows a
host to discover its Internet address when it knows only its physical
address.
A. IP B. Address Resolution
Protocol (ARP) C. Reverse Address Resolution Protocol (RARP) D. ICMP
Ans. B
70. _________________ is used to facilitate the simultaneous
transmission of a message to a group of recipients.
A. Internet Group Message Protocol (IGMP)
B. ICMP C. ARP D. RARP
Ans. A
71. ____________ is a
client/server protocol that configures a diskless computer or a computer that
is booted for the first time.
A. Bootstrap Protocol (BOOTP) B.
DHCP C. ICMP D. IGMP
Ans. A
72. BOOTP provides the
A. IP address
B. net mask
C. address of a default router
and address of a name server
D. All of the above
Ans. D
73. _______ does not provide
temporary IP addressing.
A. Bootstrap Protocol (BOOTP) B.
DHCP C. ICMP D. IGMP
Ans. A
74. _______________is a network
management protocol used on Internet Protocol (IP) networks, whereby a DHCP
server dynamically assigns an IP address and other network configuration
parameters to each device on the network, so they can communicate with other IP
networks.
A. Dynamic Host Configuration
Protocol (DHCP)
B. BOOTP
C. ICMP
D. IGMP
Ans. A
75. _______ provides a temporary
IP address fro a limited period of time.
A. Dynamic Host Configuration
Protocol (DHCP) B. BOOTP C. ICMP D. IGMP
Ans. A
76. Bootp is ________, but DHCP
is __________ but it can also be static.
A. static, dynamic
B. dynamic, static
C. dynamic, dynamic
D. None of the above
Ans. A
77. _________ is the act of moving
information across an inter-network from a source to a destination.
A. Routing
B. transferring
C. delivering
D. None of the above
Ans. A
78. Router maintains _____ table
which contains address of each destination where packets are to be sent.
A. routing
B. forwarding
C. transferring
D. None of the above
Ans. A
79. _________ routing manually
sets up the optimal paths between the source and the destination computers.
A. Static
B. Dynamic
C. both (a) and (b)
D. None of the above
Ans. A
80. _________ routing uses
dynamic protocols to update the routing table and to find the optimal path
between the source and the destination computers.
A. Static
B. Dynamic
C. both (a) and (b)
D. None of the above
Ans. B
81. _______ means finding a
suitable path for a packet from sender to destination and _______ is the
process of sending the packet toward the destination based on routing
information.
A. Routing, Forwarding
B. Routing, Transferring
C. Delivering, Transferring
D. None of the above
Ans. A
82. _______________ is group of
networks and routers under the authority of a single administration.
A. Autonomous system (AS)
B. Individual system
C. both (a) and (b)
D. None of the above
Ans. A
83. Routers inside an autonomous
system is referred to as ________________.
A. interior routing (Intradomain)
B. exterior routing (interdomain)
C. AS
D. None of the above
Ans. A
84. Routers between autonomous
systems is referred to as ________________.
A. interior routing (Intradomain)
B. exterior routing (interdomain)
C. AS
D. None of the above
Ans. B
85. Intradomain routing protocols
to handle routing inside the AS are
A. Routing Information Protocol
(RIP)
B. Open Shortest Path First
(OSPF)
C. both (a) and (b)
D. Border Gateway Protocol
Ans. C
86. Interdomain routing protocols
to handle routing between ASs are
A. Routing Information Protocol
(RIP)
B. Open Shortest Path First
(OSPF)
C. both (a) and (b)
D. Border Gateway Protocol
Ans. D
87. Routing Information Protocol
(RIP) is an implementation of the _____________ .
A. distance vector protocol
B. link state protocol
C. path vector protocol
d. None of the above
Ans. A
88. Open Shortest Path First
(OSPF) is an implementation of the _____________.
A. distance vector protocol
B. link state protocol
C. path vector protocol
d. None of the above
Ans. B
89. Border Gateway Protocol is an
implementation of the _____________.
A. distance vector protocol
B. link state protocol
C. path vector protocol
d. None of the above
Ans. C
90. The ____________ routing
algorithm is sometimes called as Bellman-Ford algorithm
A. distance vector protocol
B. link state protocol
C. path vector protocol
d. None of the above
Ans. A
91. ____________ protocols rely
on two mechanisms: reliable dissemination of link-state information, and the
calculation of routes from the sum of all the accumulated link-state knowledge.
A. distance vector protocol
B. link state protocol
C. path vector protocol
d. None of the above
Ans. A
92. ____________ is the process
of making sure that all the nodes participating in the routing protocol get a
copy of the link-state information from all the other nodes.
A. Reliable flooding
B. OSPF
C. BGP
D. None of the above
Ans. A
93. Dijkstra's ______________
algorithm, SPF algorithm is an algorithm for finding the shortest paths between
nodes in a graph,
A. Routing Information Protocol
(RIP)
B. Open Shortest Path First
(OSPF)
C. both (a) and (b)
D. Border Gateway Protocol
Ans. B
94. Benefits of the OSPF are
A. Low traffic overhead
B. Support for complex address
structures
C. Fast convergence and Good
Security
D. All of the above
Ans. D
95. Both provider networks and
end user sites are administratively
A. independent entities
(Autonomous Systems - AS)
B. intradomains
C. interdomains
D. None of the above
Ans. A
96. An ______ is a set of routers
that are administratively configured to exchange link-state information with
each other.
A. Area B. AS C. Intradomain D.
Interdomain
A6s. A
97. Special area-the backbone
area is known as
A. area 0
B. area 1
C. area 2
D. None of the above
Ans. A
98. A _______ that is a member of
both the backbone area and a nonbackbone area is an Area Border Router (ABR).
A. router
B. switch
C. bridge
D. None of the above
Ans. A
99. When dividing a domain into
areas, the network administrator makes a tradeoff between scalability and
optimality of routing.
A. scalability, optimality
B. scalability, inefficiency
C. unscalability
D. None of the above
Ans. A
100. ________ are used to
exchange routing information between ISPs, or in some cases between a
customer's AS and the provider's network.
A. Exterior Gateway Protocols
(EGPs)
B. BGP
C. both (a) and (b)
D. None of the above
Ans. A
101. ____________, version 4 is
the most common EPG and is considered the Internet standard.
A. Border Gateway Protocol (BGP)
B. AS
C. ABR
D. None of the above
Ans. A
102. Categories of Autonomous
systems (AS) are
A. Stub AS
B. Multihomed AS
C. Transit AS
D. All of the above
Ans. D
103. Goal of intra-domain routing
are
A. Find optimal path between
nodes
B. find any path to the intended
destination that is loop free
C. Concerned with reachability
that optimality
D. None of the above
Ans. A
104. Goal of inter-domain routing
are
A. Find optimal path between
nodes
B. find any path to the intended
destination that is loop free
C. Concerned with reachability
that optimality
D. both (b) and (c)
Ans. D
105. IPv6 is needed primarily due to
the following
A. Deal with IP address space
exhaustion
B. Even CIDR will be inadequate in
future
C. Nowadays IP addresses are
assigned not just to full blown computers but also mobile phones, televisions
and other household appliances.
D. All of the above
Ans. D
106. _______ provides 128-bit
address space, as opposed to the 32 bits of version 4.
A. IPv4
B. IPv6
C. physical address
D. None of the above
Ans. B
107. IPv6 addresses are ________.
A. Classful
B. Classless
C. both (a) and (b)
D. None of the above
Ans. B
108. IPv6 has three types of
addresses:
A. unicast, multicast and anycast
B. unicast, multicast and
broadcast
C. multicast, anycast and
broadcast
D. None of the above
Ans. A
109. Which of the following about
Unicast address are correct?
A. Address of a single interface
B. Delivery to single interface
C. for one-to-one communication
D. All of the above
Ans. D
110. Which of the following about
Multicast address are correct?
A. Address of a set of interfaces
B. Delivery to all interfaces in
the set
C. for one-to-many communication
D. All of the above
Ans. D
111. Which of the following about
Anycast address are correct?
A. Address of a set of interfaces
B. Delivery to a single
interface in the set
C. for one-to-nearest
communication
D. All of the above
Ans. D
112. IPv6 has no support for the
________ address.
A. unicast B. multicast C.
anycast D. broadcast
Ans. D
113. Which of the following are
applications of multicasting?
A. Broadcasts of radio or video
B. Videoconferencing
C. Shared applications
D. All of the above
Ans. D
114. A node may be assigned an
IPv4-compatible IPv6 address by zero-extending a 32-bit IPv4 address to 128
bits.
A. zero
B. one
C. both (a) and (b)
D. None of the above
Ans. A
115. IPv6 address
47CD:0000:0000:0000:0000:0000:A456:0124 is written as:
A. 47CD::A456:0124
B. 47CD:A456:0124
C. both (a) and (b)
D. None of the above
Ans. A
116. When continuous 0s (zeros)
are available in IPv6 address notaion then all zeros are replaced by ______.
A. ::
B. :
C.;
D. None of the above
Ans. A
117. When in hexadecimal notation
of IPv6 all fields are 0, It is denoted by ::.
(:: = 0:0:0:0:0:0:0:0). This address is called ________
A. Unspecified address
B. Loopback address
C. both (a) and (b)
D. None of the above
Ans. A
118. When in hexadecimal notation
of IPv6 all fields are 0 except the last field and last field value is 1, it is
denoted by ::1. (::1 = 0:0:0:0:0:0:0:1).
This address is called ________
A. Unspecified address
B. Loopback address
C. both (a) and (b)
D. None of the above
Ans. B
119. One goal of _______ is to provide support for autoconfiguration,
sometimes, referred to as plug-and-play operation.
A. IPv6
B. IPv4
C. both (a) and (b)
D. None of the above
Ans. A
120. The longer address format in
IPv6 helps to provide a useful, new form of autoconfiguration called
____________, which does not require a server.
A. stateless autoconfiguration
B. stateful autoconfiguration
C. both (a) and (b)
D. None of the above
Ans. A
121. Compared with IPv4, IPv6 has
the following advantages.
A. IPv6 supports
autoconfiguration, and real time application.
B. It provides security at
network layer.
C. Throughput and delay are less.
D. All of the above
Ans. D
122. Which of the following are
correct about One-to-many multicast?
A. Source specific multicast
(SSM)
B. Single sender, multiple
receivers; a receiver host specify
multicast group and a sender.
C. Examples: Radio stations, TV
stations
D. All of the above
Ans. D
123. Which of the following are
correct about Many-to-many model?
A. Any source multicast (ASM)
B. Some or all nodes can become
sender
C. Examples: teleconferencing,
online video games
D. All of the above
Ans. D
124. In IPv6, the protocol is
____________________.
A. Multicast Listener Discovery
(MLD)
B. Internet Group Management
Protocol (IGMP)
C. ICMP
D. None of the above
Ans. A
125. ____________ is used by IPv6
routers for discovering multicast listeners on a directly attached link, much
like Internet Group Management Protocol (IGMP) is used in IPv4. The protocol is
embedded in ICMPv6 instead of using a separate protocol.
A. Multicast Listener Discovery
(MLD)
B. Internet Group Management
Protocol (IGMP)
C. ICMP
D. None of the above
Ans. A
126. Distance vector algorithm
for unicast can be extended to support multicast. This protocol is called
__________ which is a flood-and-prune protocol.
A. Distance-Vector Multicast
Routing Protocol (DVMRP)
B. RIP
C. BGP
D. None of the above
Ans. A
127. ____________ is used in
dense multicast environment, such as a LAN.
A. Protocol Independent Multicast
- Dense Mode (PIM-DM)
B. Protocol Independent Multicast - Sparse Mode
(PIM-SM)
C. both (a) and (b)
D. None of the above
Ans. A
128. __________ is a group-based
tree routing protocol that has a rendezvous point (RP) as the source of tree.
A. Protocol Independent Multicast
- Dense Mode (PIM-DM)
B. Protocol Independent Multicast - Sparse Mode
(PIM-SM)
C. both (a) and (b)
D. None of the above
Ans. A
129. __________ is used in a
sparse multicast environment, such as a WAN.
A. Protocol Independent Multicast
- Dense Mode (PIM-DM)
B. Protocol Independent Multicast - Sparse Mode
(PIM-SM)
C. both (a) and (b)
D. None of the above
Ans. B
130. Which of the following are the
characteristics of datagram networks?
A. Host can send a packet
anywhere at any time.
B. Each packet is forwarded
independently
C. Link failure would not have
any serious effect on communication if it is possible to find an alternate
route around the failure and update the forwarding table accordingly.
D. All of the above
Ans. D
131.______________________________
enables a user to have a large set of addresses internally and one address, or
a small set of addresses, externally (public network). The traffic inside can
use the larget set, the traffic outside can use the small set.
A. Network Address Translation
(NAT)
B. ARP
C. RARP
D. None of the above
Ans. A
Routing
can be classified into the following types.
A. Adaptive Routing
B. Non Adaptive Routing
C. both (a) and (b)
D. None of the above
Ans. C
___________
determines the life time of a packet.
A. Round Trip Time (RTT)
B. Time to Live (TTL)
C. Time out time
D. None of the above
Ans. B
_________
is the process that extracts the address of the physical network from an IP
address.
A. Masking
B. Network Address Translation
(NAT)
C. Routing
D. None of the above
Ans. A
___________
is a small packet containing routing information sent by a router to all other
router in a link state routing.
A. Link State Packet (LSP)
B. Segment
C. Datagram
D. None of the above
Ans. A
Dr. Selvaganesan
Dept of IT, JJCET
No comments:
Post a Comment