Which of the following technique is used for Time-To-Line (TTL)?
Options
A. a technique used in best-effort delivery system to avoid endlessly looping packets.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
D. All of the above
E. None of the above
Correct Answer
a technique used in best-effort delivery system to avoid endlessly looping packets.
Networking problems
Search Results
1. HDLC (High-level Data Link Control) is
Options
A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique for multiple-access transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-switched network
Correct Answer: Placing a telephone call prior to a conversation
3. The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
4. Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
This standard is part of a family of standards for local area networks (LANs) and metropolitan area networks (MANs) that deals with the physical and data link layers as defined by the ISO open systems interconnection reference model. It defines a high-speed shared medium access protocol for use over a dual, counterflowing, unidirectional bus subnetwork. The physical layer and distributed queue dual bus (DQDB) layer are required to support a logical link control (LLC) sublayer by means of a connectionless medium access control (MAC) sublayer service in a manner consistent with other IEEE 802 networks. Additional DQDB layer functions are specified as a framework for other services. These additional functions will support isochronous service users and connection-oriented data service users, but their implementation is not required for conformance.
7. The dialogue techniques for terminal use do not include
A. if a host moves from one network to another, its IP address must change
B. routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used.
C. IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network.
10. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?