Sunday, 8 November 2020

CS8591 Computer Networks - UNIT III Network Layer - Multiple Choice Questions (MCQ)

 

CS8591 Computer Networks 

UNIT III Network Layer

(Multiple Choice Questions (MCQ))

Network Layer Services – Packet switching – Performance – IPV4 Addresses – Forwarding of IP Packets - Network Layer Protocols: IP, ICMP v4 – Unicast Routing Algorithms – Protocols – Multicasting Basics – IPV6 Addressing – IPV6 Protocol.

 

1. The _____________ layer is responsible for the delivery of individual packets from source host to the destination host. 

A. Network B. Transport C. Physical D. Network

Ans.  A

2. Network layer services are

A. packetizing

B. routing

C. forwarding

D. All of the above

Ans. D

3. The process of encapsulating the data received from upper layers of the network (also called as payload) in a network layer packet at the source and decapsulating the payload from the network layer packet at the destination is known as ________________.

A. packetizing

B. routing

C. forwarding

D. All of the above

Ans. A

4. Main responsibilities of network layer are

A. logical addressing

B. routing

C. both (a) and (b)

D. None of the above

Ans. C

5. Network layer functions are logical addressing and routing. In addition, other functions are

A. Datagram encapsulation

B. Fragmentation and reassembly

C. Error handling and diagnostics

D. All of the above

Ans. D

6. When a packet passes the network boundary, the network layer adds the ________ addresses of the sender and receiver.

A. logical

B. physical

C. port

D. None of the above

Ans. A

7. The IPv4 Addressing system is divided into ________ classes of IP Addresses.

A. 2 B. 3 C. 4 D. 5

Ans. D

8. An IPv4 address is a ______ address.

A. 16-bit B. 32-bit C. 64-bit D. 128-bit

Ans. B

9. Each Internet address consists of four bytes (32 bits), defining three fields:

A. class type

B. netid

C. hostid

D. All of the above

Ans. D

10. An ______________ is made of four bytes (32 bits) that define a host's connection to a network.

A. internet protocol address

B. physical address

C. port address

D. None of the above

Ans. A

11. In binary notation, IPv4 address has ____ octets.

A. 2 B. 3 C. 4 D. 5

Ans. C

12. IPv4 uses 32-bit addresses, which means that the address space is

A. 2

B. 2

C. 2

D. None of the above

Ans. A 

13. In classful addressing, a large part of the available addresses were

A. Consumed

B. Reserved

C. Wasted

D. None of the above

Ans. C

14. In classful addressing, the whole address is divided into two parts that are

A. Netid and Hostid

B. Netid and packetid

C. Netid and frameid

D. None of the above

Ans. A

15. __________ addresses were designed for large organizations with a large number of attached hosts or routers.

A. Class A

B. Class B

C. Class C

D. None of the above

Ans. A

16. __________ addresses were designed for midsize organizations with tens of thousands of attached hosts or routers.

A. Class A

B. Class B

C. Class C

D. None of the above

Ans. B

17. _______ addresses are designed for small organizations to manage a small number of attached hosts or routers.

A. Class A

B. Class B

C. Class C

D. None of the above

Ans. C

18. ________ addresses are used for multicast services that allow a host to send information to a group of hosts simultaneously.

A. Class A

B. Class B

C. Class C

D. Class D

Ans. D

19. ________ addresses are reserved for future use.

A. Class A

B. Class B

C. Class D

D. class E

Ans. D

20. In __________ network, the first byte is assigned to the network address and the remaining three bytes used for the node address.

A. Class A

B. Class B

C. Class C

D. Class D

Ans. A

21. In __________ network, the first two bytes are assigned to the network address and the remaining two bytes used for the node address.

A. Class A

B. Class B

C. Class C

D. Class D

Ans. B

22. In __________ network, the first three bytes are assigned to the network address and the remaining one byte used for the node address.

A. Class A

B. Class B

C. Class C

D. Class D

Ans. C

23. Class A address range is

A. 0.0.0.0 to 127.255.255.255

B. 128.0.0.0 to 191.255.255.255

C. 192.0.0.0 to 223.255.255.255

D. 224.0.0.0 to 239.255.255.255

Ans. A

24. Class B address range is

A. 0.0.0.0 to 127.255.255.255

B. 128.0.0.0 to 191.255.255.255

C. 192.0.0.0 to 223.255.255.255

D. 224.0.0.0 to 239.255.255.255

Ans. B

25. Class C address range is

A. 0.0.0.0 to 127.255.255.255

B. 128.0.0.0 to 191.255.255.255

C. 192.0.0.0 to 223.255.255.255

D. 224.0.0.0 to 239.255.255.255

Ans. C

26. Class D address range is

A. 0.0.0.0 to 127.255.255.255

B. 128.0.0.0 to 191.255.255.255

C. 192.0.0.0 to 223.255.255.255

D. 224.0.0.0 to 239.255.255.255

Ans. D

27. Class E address range is

A. 128.0.0.0 to 191.255.255.255

B. 192.0.0.0 to 223.255.255.255

C. 224.0.0.0 to 239.255.255.255

D. 240.0.0.0 to 255.255.255.255

Ans. D

28. Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for

loopback and diagnostic functions. These addresses are called ________ addresses.

A. loopback

B. link-local

C. both (a) and (b)

D. None of the above

Ans. A

29. The loopback address is mainly used 

A. to test the TCP/IP configuration of a host

B. by developers to test network applications.

C. both (a) and (b)

D. None of the above

Ans. C

30. The class of address 00000001 00001011 00001011 11101111 is

A. Class A

B. Class C

C. Class B

D. Class E

Ans. A

31. The class of address 11000001 10000011 00011011 11111111 is

A. Class A

B. Class C

C. Class B

D. Class E

Ans. B

32. The class of address 10100111 11011011 10001011 01101111 is

A. Class A

B. Class C

C. Class B

D. Class E

Ans. C

33. The class of address 11110011 10011011 11111011 00001111 is

A. Class A

B. Class C

C. Class B

D. Class E

Ans. D

34. The class of address 227.12.14.87 is

A. Class A

B. Class B

C. Class C

D. Class D

Ans. D

35. The class of address 193.14.56.22 is

A. Class A

B. Class B

C. Class C

D. Class D

Ans. C

36. The class of address 14.23.120.8 is

A. Class A

B. Class B

C. Class C

D. Class D

Ans. A

37. The class of address 252.5.15.111 is

A. Class A

B. Class B

C. Class C

D. Class E

Ans. D

38. Identify the class of 110.34.56.45

A. Class A

B. Class B

C. Class C

D. Class E

Ans. A

39. Identify the class of 127.1.1.1

A. Class A

B. Class B

C. Class C

D. Loop back address

Ans. D

40. Identify the class of 212.208.63.23

A. Class A

B. Class B

C. Class C

D. Class E

Ans. C

41. Identify the class of 255.255.255.255

A. Class A

B. Class B

C. Class C

D. Broadcast address

Ans. D

42. In ____________ addressing, variable length blocks are assigned that belong to no class. The entire address space is divided into blocks of different sizes. An organization is granted a block suitable for its purposes.

A. Classful

B. Classless

C. both (a) and (b)

D. None of the above

Ans. B

43. Advantages of classless addressing over classful addressing are

A. Classful addressing does not send subnet information.

B. Efficient address-space allocation is available in classless addressing.

C. Memory is allocated in terms of bits and bytes rather than huge chunks of contiguous memory.

D. All of the above

Ans. D

44. Packets in the IPv4 layer are called _____________.

A. datagrams

B. segments

C. both (a) and (b)

D. None of the above

Ans. A

45. ____________ is a networking term that defines the largest packet size that can be sent over a network connection.

A. Maximum Transmission Unit (MTU)

B. Segment

C. Packet

D. Frame.

Ans. A

46. _________ identifies a network with a range of Internet Protocol addresses in the Internet. It also allows large networks to be divided into smaller networks, each with its own set of IP addresses.

A. subnetting a network

B. intranet

C. extranet

D. None of the above

Ans. A

47. The advantages of using subnetting are

A. reduced network traffic

B. Optimized network performance

C. Simplified network management

D. All of the above

Ans. D

48. Classless Inter Domain Routing (CIDR) is needed to resolve the following problems the Internet faced

A. Running out of IP addresses

B. Running out of capacity in the global routing tables

C. both (a) and (b)

D. None of the above

Ans. C

49. CIDR provides the following solutions developed and adopted by the global Internet community

A. Restructuring IP address assignments to increase efficiency

B. Hierarchical routing aggregation to minimize route table entries

C. both (a) and (b)

D. None of the above

Ans. C

50. ________ is a new addressing scheme for the Internet which allows for more efficient allocation of IP addresses than the old Class A, B, and C address scheme.

A. CIDR

B. IPv6

C. both (a) and (b)

D. None of the above

Ans. A

51. For IPv4, __________________ is an alternative to the older system of representing networks by their starting address and the subnet mask, both written in dot-decimal notation. 192.168.100.0/24 is equivalent to 192.168.100.0/255.255.255.0.

A. CIDR notation

B. IPv6

C. either (a) or (b)

D. None of the above

Ans. A

52. _______ refers to the way a packet is delivered to the next node and it requires a host or router to have a routing table.

A. Forwarding

B. routing

C. transferring

D. None of the above

Ans. A

53. Which of the following are forwarding techniques?

A. Next hop versus route method

B. Network specific versus host specific method

C. Default method

D. All of the above

Ans. D

54. In the _______________________, routing table stores only the address of the next hop and this method reduces the content of routing table.

A. Next hop versus route method

B. Network specific versus host specific method

C. Default method

D. All of the above

Ans. A

55. In the _______________________, routing table contains only the address of the destination network and this method reduces the routing table size.

A. Next hop versus route method

B. Network specific versus host specific method

C. Default method

D. All of the above

Ans. B

56. In the ______________, host is connected with more than one routers and a router is assigned to receive all packets with no match in the routing table. Default router is used for communication with outside world.

A. Next hop versus route method

B. Network specific versus host specific method

C. Default method

D. All of the above

Ans. C

57. The _______ protocol is the transmission mechanism used by the TCP/IP suite.

A. IP B. ARP C. RARP D. ICMP

Ans. A

58. __________ is an Internet Protocol (IP) process that breaks packets into smaller pieces (fragments), so that the resulting pieces can pass through a link with a smaller maximum transmission unit (MTU) than the original packet size. The fragments are reassembled by the receiving host.

A. IP fragmentation

B. segmentation

C. framing

D. None of the above

Ans. A

59. The IP layer provides an __________, ______________ delivery system.

A. unreliable

B. connectionless

C. both (a) and (b)

D. None of the above

Ans. C

60. The reason why IP is unreliable is that

A. IP provides no error checking or tracking

B. not best delivery

C. both (a) and (b)

D. None of the above

Ans. A

61. Functions of the IP protocol are

A. Route IP data frames around an Internet.

B. Fragment the data into smaller units if it is greater than a given amount (64 Kb)

C. Report errors

D. All of the above

Ans. D

62. At the network layer (the internetwork layer), TCP/IP supports the Internetworking Protocol (IP) which, in turn, uses the following Supporting protocols

A. ARP and RARP

B.ICMP

C. IGMP

D. All of the above

Ans. D

63. A protocol in the TCP/IP protocol suite that handles error and control messages is

A. IP B. ARP C. RARP D. Internet Control Message Protocol (ICMP)

Ans. D

64. Which of the following are ICMP messages?

A. Error reporting

B. Query

C. both (a) and (b)

D. None of the above

Ans. C

65. ICMP has the header size of

A. 8 Bytes B. 10 Bytes C. 12 Bytes D. 16 Bytes

Ans. A

66. ICMP is the companion of

A. IP packet

B. IP protocol

C. IP frame

D. None of the above

Ans. B

67. A host may know its IP address, but it may not know the

A. Corresponding Mask

B. Corresponding Clock

C. Corresponding Data

D. Corresponding Protocol

Ans. A

68 ______ is used to find the physical address of the node when its Internet address is known.

A. IP B. Address Resolution Protocol (ARP) C. RARP D. ICMP

Ans. B

69. __________________ allows a host to discover its Internet address when it knows only its physical address.

A. IP B. Address Resolution Protocol (ARP) C. Reverse Address Resolution Protocol (RARP) D. ICMP

Ans. B

70. _________________ is used to facilitate the simultaneous transmission of a message to a group of recipients.

A. Internet Group Message Protocol (IGMP) B. ICMP C. ARP D. RARP

Ans. A

71. ____________ is a client/server protocol that configures a diskless computer or a computer that is booted for the first time.

A. Bootstrap Protocol (BOOTP) B. DHCP C. ICMP D. IGMP

Ans. A

72. BOOTP provides the

A. IP address

B. net mask

C. address of a default router and address of a name server

D. All of the above

Ans. D

73. _______ does not provide temporary IP addressing.

A. Bootstrap Protocol (BOOTP) B. DHCP C. ICMP D. IGMP

Ans. A

74. _______________is a network management protocol used on Internet Protocol (IP) networks, whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks.

A. Dynamic Host Configuration Protocol (DHCP)

B. BOOTP

C. ICMP

D. IGMP

Ans. A

75. _______ provides a temporary IP address fro a limited period of time.

A. Dynamic Host Configuration Protocol (DHCP) B. BOOTP C. ICMP D. IGMP

Ans. A

76. Bootp is ________, but DHCP is __________ but it can also be static.

A. static, dynamic

B. dynamic, static

C. dynamic, dynamic

D. None of the above

Ans. A

77. _________ is the act of moving information across an inter-network from a source to a destination

A. Routing

B. transferring

C. delivering

D. None of the above

Ans. A

78. Router maintains _____ table which contains address of each destination where packets are to be sent.

A. routing

B. forwarding

C. transferring

D. None of the above

Ans. A

79. _________ routing manually sets up the optimal paths between the source and the destination computers.

A. Static

B. Dynamic

C. both (a) and (b)

D. None of the above

Ans. A

80. _________ routing uses dynamic protocols to update the routing table and to find the optimal path between the source and the destination computers.

A. Static

B. Dynamic

C. both (a) and (b)

D. None of the above

Ans. B

81. _______ means finding a suitable path for a packet from sender to destination and _______ is the process of sending the packet toward the destination based on routing information.

A. Routing, Forwarding

B. Routing, Transferring

C. Delivering, Transferring

D. None of the above

Ans. A

82. _______________ is group of networks and routers under the authority of a single administration.

A. Autonomous system (AS)

B. Individual system

C. both (a) and (b)

D. None of the above

Ans. A

83. Routers inside an autonomous system is referred to as ________________.

A. interior routing (Intradomain)

B. exterior routing (interdomain)

C. AS

D. None of the above

Ans. A

 

84. Routers between autonomous systems is referred to as ________________.

A. interior routing (Intradomain)

B. exterior routing (interdomain)

C. AS

D. None of the above

Ans. B

85. Intradomain routing protocols to handle routing inside the AS are

A. Routing Information Protocol (RIP)

B. Open Shortest Path First (OSPF)

C. both (a) and (b)

D. Border Gateway Protocol

Ans. C

86. Interdomain routing protocols to handle routing between ASs are

A. Routing Information Protocol (RIP)

B. Open Shortest Path First (OSPF)

C. both (a) and (b)

D. Border Gateway Protocol

Ans. D

87. Routing Information Protocol (RIP) is an implementation of the _____________ .

A. distance vector protocol

B. link state protocol

C. path vector protocol

d. None of the above

Ans. A

88. Open Shortest Path First (OSPF) is an implementation of the _____________.

A. distance vector protocol

B. link state protocol

C. path vector protocol

d. None of the above

Ans. B

89. Border Gateway Protocol is an implementation of the _____________.

A. distance vector protocol

B. link state protocol

C. path vector protocol

d. None of the above

Ans. C

90. The ____________ routing algorithm is sometimes called as Bellman-Ford algorithm

A. distance vector protocol

B. link state protocol

C. path vector protocol

d. None of the above

Ans. A

91. ____________ protocols rely on two mechanisms: reliable dissemination of link-state information, and the calculation of routes from the sum of all the accumulated link-state knowledge.

A. distance vector protocol

B. link state protocol

C. path vector protocol

d. None of the above

Ans. A

92. ____________ is the process of making sure that all the nodes participating in the routing protocol get a copy of the link-state information from all the other nodes.

A. Reliable flooding

B. OSPF

C. BGP

D. None of the above

Ans. A

93. Dijkstra's ______________ algorithm, SPF algorithm is an algorithm for finding the shortest paths between nodes in a graph,

A. Routing Information Protocol (RIP)

B. Open Shortest Path First (OSPF)

C. both (a) and (b)

D. Border Gateway Protocol

Ans. B

94. Benefits of the OSPF are

A. Low traffic overhead

B. Support for complex address structures

C. Fast convergence and Good Security

D. All of the above

Ans. D

95. Both provider networks and end user sites are administratively

A. independent entities (Autonomous Systems - AS)

B. intradomains

C. interdomains

D. None of the above

Ans. A

96. An ______ is a set of routers that are administratively configured to exchange link-state information with each other.

A. Area B. AS C. Intradomain D. Interdomain

A6s. A

97. Special area-the backbone area is known as

A. area 0

B. area 1

C. area 2

D. None of the above

Ans. A

98. A _______ that is a member of both the backbone area and a nonbackbone area is an Area Border Router (ABR).

A. router

B. switch

C. bridge

D. None of the above

Ans. A

99. When dividing a domain into areas, the network administrator makes a tradeoff between scalability and optimality of routing.

A. scalability, optimality

B. scalability, inefficiency

C. unscalability

D. None of the above

Ans. A

100. ________ are used to exchange routing information between ISPs, or in some cases between a customer's AS and the provider's network.

A. Exterior Gateway Protocols (EGPs)

B. BGP

C. both (a) and (b)

D. None of the above

Ans. A

101. ____________, version 4 is the most common EPG and is considered the Internet standard.

A. Border Gateway Protocol (BGP)

B. AS

C. ABR

D. None of the above

Ans. A

102. Categories of Autonomous systems (AS) are

A. Stub AS

B. Multihomed AS

C. Transit AS

D. All of the above

Ans. D

103. Goal of intra-domain routing are

A. Find optimal path between nodes

B. find any path to the intended destination that is loop free

C. Concerned with reachability that optimality

D. None of the above

Ans. A

104. Goal of inter-domain routing are

A. Find optimal path between nodes

B. find any path to the intended destination that is loop free

C. Concerned with reachability that optimality

D. both (b) and (c)

Ans. D

105. IPv6 is needed primarily due to the following

A. Deal with IP address space exhaustion

B. Even CIDR will be inadequate in future

C. Nowadays IP addresses are assigned not just to full blown computers but also mobile phones, televisions and other household appliances.

 D. All of the above

Ans. D

106. _______ provides 128-bit address space, as opposed to the 32 bits of version 4.

A. IPv4

B. IPv6

C. physical address

D. None of the above

Ans. B

107. IPv6 addresses are ________.

A. Classful

B. Classless

C. both (a) and (b)

D. None of the above

Ans. B

 

108. IPv6 has three types of addresses:

A. unicast, multicast and anycast

B. unicast, multicast and broadcast

C. multicast, anycast and broadcast

D. None of the above

Ans. A

109. Which of the following about Unicast address are correct?

A. Address of a single interface

B. Delivery to single interface

C. for one-to-one communication

D. All of the above

Ans. D

110. Which of the following about Multicast address are correct?

A. Address of a set of interfaces

B. Delivery to all interfaces in the set

C. for one-to-many communication

D. All of the above

Ans. D

111. Which of the following about Anycast address are correct?

A. Address of a set of interfaces

B. Delivery to a single interface  in the set

C. for one-to-nearest communication

D. All of the above

Ans. D

112. IPv6 has no support for the ________ address.

A. unicast B. multicast C. anycast D. broadcast

Ans. D

113. Which of the following are applications of multicasting?

A. Broadcasts of radio or video

B. Videoconferencing

C. Shared applications

D. All of the above

Ans. D

114. A node may be assigned an IPv4-compatible IPv6 address by zero-extending a 32-bit IPv4 address to 128 bits.

A. zero

B. one

C. both (a) and (b)

D. None of the above

Ans. A

115. IPv6 address 47CD:0000:0000:0000:0000:0000:A456:0124 is written as:

A. 47CD::A456:0124

B. 47CD:A456:0124

C. both (a) and (b)

D. None of the above

Ans. A

116. When continuous 0s (zeros) are available in IPv6 address notaion then all zeros are replaced by ______.

A. ::

B. :

C.;

D. None of the above

Ans. A

117. When in hexadecimal notation of IPv6 all fields are 0, It is denoted by ::.  (:: = 0:0:0:0:0:0:0:0). This address is called ________

A. Unspecified address

B. Loopback address

C. both (a) and (b)

D. None of the above

Ans. A

118. When in hexadecimal notation of IPv6 all fields are 0 except the last field and last field value is 1, it is denoted by ::1.  (::1 = 0:0:0:0:0:0:0:1). This address is called ________

A. Unspecified address

B. Loopback address

C. both (a) and (b)

D. None of the above

Ans. B

119. One goal of _______  is to provide support for autoconfiguration, sometimes, referred to as plug-and-play operation.

A. IPv6 

B. IPv4

C. both (a) and (b)

D. None of the above

Ans. A

120. The longer address format in IPv6 helps to provide a useful, new form of autoconfiguration called ____________, which does not require a server.

A. stateless autoconfiguration

B. stateful autoconfiguration

C. both (a) and (b)

D. None of the above

Ans. A

121. Compared with IPv4, IPv6 has the following advantages.

A. IPv6 supports autoconfiguration, and real time application.

B. It provides security at network layer.

C. Throughput and delay are less.

D. All of the above

Ans. D

122. Which of the following are correct about One-to-many multicast?

A. Source specific multicast (SSM)

B. Single sender, multiple receivers;  a receiver host specify multicast group and a sender.

C. Examples: Radio stations, TV stations

D. All of the above

Ans. D

123. Which of the following are correct about Many-to-many model?

A. Any source multicast (ASM)

B. Some or all nodes can become sender

C. Examples: teleconferencing, online video games

D. All of the above

Ans. D

124. In IPv6, the protocol is ____________________.

A. Multicast Listener Discovery (MLD)

B. Internet Group Management Protocol (IGMP)

C. ICMP

D. None of the above

Ans. A

125. ____________ is used by IPv6 routers for discovering multicast listeners on a directly attached link, much like Internet Group Management Protocol (IGMP) is used in IPv4. The protocol is embedded in ICMPv6 instead of using a separate protocol.

A. Multicast Listener Discovery (MLD)

B. Internet Group Management Protocol (IGMP)

C. ICMP

D. None of the above

Ans. A

126. Distance vector algorithm for unicast can be extended to support multicast. This protocol is called __________ which is a flood-and-prune protocol.

A. Distance-Vector Multicast Routing Protocol (DVMRP)

B. RIP

C. BGP

D. None of the above

Ans. A

127. ____________ is used in dense multicast environment, such as a LAN.

A. Protocol Independent Multicast - Dense Mode (PIM-DM)

B.  Protocol Independent Multicast - Sparse Mode (PIM-SM)

C. both (a) and (b)

D. None of the above

Ans. A

128. __________ is a group-based tree routing protocol that has a rendezvous point (RP) as the source of tree.

A. Protocol Independent Multicast - Dense Mode (PIM-DM)

B.  Protocol Independent Multicast - Sparse Mode (PIM-SM)

C. both (a) and (b)

D. None of the above

Ans. A

129. __________ is used in a sparse multicast environment, such as a WAN.

A. Protocol Independent Multicast - Dense Mode (PIM-DM)

B.  Protocol Independent Multicast - Sparse Mode (PIM-SM)

C. both (a) and (b)

D. None of the above

Ans. B

130. Which of the following are the characteristics of datagram networks?

A. Host can send a packet anywhere at any time.

B. Each packet is forwarded independently

C. Link failure would not have any serious effect on communication if it is possible to find an alternate route around the failure and update the forwarding table accordingly.

D. All of the above

Ans. D

131.______________________________ enables a user to have a large set of addresses internally and one address, or a small set of addresses, externally (public network). The traffic inside can use the larget set, the traffic outside can use the small set.

A. Network Address Translation (NAT)

B. ARP

C. RARP

D. None of the above

Ans. A

Routing can be classified into the following types.

A. Adaptive Routing

B. Non Adaptive Routing

C. both (a) and (b)

D. None of the above

Ans. C

___________ determines the life time of a packet.

A. Round Trip Time (RTT)

B. Time to Live (TTL)

C. Time out time

D. None of the above

Ans. B

_________ is the process that extracts the address of the physical network from an IP address.

A. Masking

B. Network Address Translation (NAT)

C. Routing

D. None of the above

Ans. A

___________ is a small packet containing routing information sent by a router to all other router in a link state routing.

A. Link State Packet (LSP)

B. Segment

C. Datagram

D. None of the above

Ans. A


Dr. Selvaganesan
Dept of IT, JJCET

                                                                                                                                                                                                                                            

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


No comments:

Post a Comment