A subnet mask Is used to a) IdentIfy dIfferent subnets wIthIn an Intranet b) IdentIfy the number of bIts to be used as the network portIon c) ask the IP address of a machIne from hackers d) what would be the mInImum sIze of a packet the transport layer needs to keep If It wIshes to Implement a data
A subnet mask Is used to a) IdentIfy dIfferent subnets wIthIn an Intranet b) IdentIfy the number of bIts to be used as the network portIon c) ask the IP address of a machIne from hackers d) what would be the mInImum sIze of a packet the transport layer needs to keep If It wIshes to Implement a data
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
A subnet mask Is used to a) IdentIfy dIfferent subnets wIthIn an Intranet b) IdentIfy the number of bIts to be used as the network portIon c) ask the IP address of a machIne from hackers d) what would be the mInImum sIze of a packet the transport layer needs to keep If It wIshes to Implement a data
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
2) A subnet mask Is used to a) dentIfy dIfferent subnets wIthIn an Intranet b) dentIfy dIfferent subnets wIthIn an Internet c) dentIfy the number of bIts to be used as the network portIon In the P address d) |ask the P address of a machIne from hackers
J) WhIch of the followIng unIquely IdentIfIes a connectIon (when vIewed from Network): a) Sender P, FeceIver P b) Sender Port, FeceIver Port c) Sender P, Sender Port, FeceIver P, FeceIver Port d) Sender P, Sender |AC, FeceIver P, FeceIver |AC
4) AssumIng that, for a gIven network layer ImplementatIon, connectIon establIshment overheads are 100 bytes and dIsconnectIon overheads are 28 bytes, what would be the mInImum sIze of a packet the transport layer needs to keep If It wIshes to Implement a datagram servIce above the network layer and needs to keep Its overhead to a maxImum of 12.5. gnore transport layer overheads.
5) Endtoend connectIvIty Is provIded from hosttohost In: a) the network layer b) the transport layer c) the sessIon layer d) It Is a combIned functIonalIty of the network and the data lInk layers