Question
Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one application message, in the best case ? Consider only data packets.
a.
200
b.
220
c.
240
d.
260
Posted under GATE cse question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Consider three IP networks A, B and C. Host HA in network A sends messages each containing 180 bytes of application data to a host HC in network C. The TCP layer prefixes a 20 byte...
Similar Questions
Discover Related MCQs
Q. Which of the following protocol is called as byte-oriented protocol?
View solution
Q. If syn = 0 and ack = 1, it indicates
View solution
Q. A DNS.....................server gets its data from another DNS server.
View solution
Q. The .............................field in the MIME header describes the method used to encode the data.
View solution
Q. A client message usually needs ........................ to send mail.
View solution
Q. Which one is not a method of HTTP?
View solution
Q. Which one of the following is a communication protocol used for email?
View solution
Q. Which one of the following statement about email is false?
View solution
Q. Which one of the following can be used on the IP network to monitor a router?
View solution
Q. Which of the following is true?
View solution
Q. Which of the following is not a Block cipher?
View solution
Q. In a ................................attack, an intruder comes between two communicating parties, Intercepting and replying to their messages.
View solution
Q. A computer crime is
View solution
Q. A program that migrates through networks and operating systems by attaching itself to different Programs and databases is a
View solution
Q. In RSA.............................in the common factor in both keys?
View solution
Q. Programs that come into a computer system disguised as something else are called
View solution
Q. Having a(n) .....................................is important to help large Organization continue operating until Normal computer operations.
View solution
Q. In what way does a firewall increase the securities of a VPN?
View solution
Q. Choose the false one.
View solution
Q. There are 15 users communicating to each other. How many pairs of keys are required to authenticate the communications if the symmetric key is used?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!