Mobile IP Interview Preparation Guide
Download PDF
Add New Question

Mobile IP Frequently Asked Questions in various Mobile IP Interviews asked by the interviewer. So learn Mobile IP with the help of this Mobile IP Interview questions and answers guide and feel free to comment as your suggestions, questions and answers on any Mobile IP Interview Question or answer by the comment feature available on the page.

9 Mobile IP Questions and Answers:

1 :: What is Mobile IP?

When a user leaves the network with which his device is associated (home network) and enters the domain of a foreign network, the foreign network uses the Mobile IP protocol to inform the home network of a care-of address to which all packets for the user's device should be sent.

Mobile IP is most often found in wireless WAN environments where users need to carry their mobile devices across multiple LANs with different IP addresses.
Post Your Answer

2 :: Explain How is the value for datagram identifier calculated?

The IP datagram identifier is just a sequence number assigned by the transmitting host. The algorithm for assigning value to this field is not specified by the IP protocol.
Post Your Answer

3 :: Explain Which part of the IP datagram is used for calculating the checksum?

30. The checksum field in the IP header covers only the IP header. The payload data is not used for calculating this checksum.
Post Your Answer

4 :: Explain ISTP protocol?

The InterStream Transit Protocol (ISTP) is a secure protocol that allows Internet Service Providers (ISPs) to offer high bandwidth multimedia services over their networks. The ISTP application is installed as a new protocol handler into browsers. It includes components which enableInternet Service Providers to obtain incremental revenue from subscribers, advertisers, other ISPs, and streaming video providers in exchange for using premium bandwidth services on their networks.

The InterStream Transit Protocol (ISTP) is a secure protocol that allows Internet Service Providers (ISPs) to offer high bandwidth multimedia services over their networks. The ISTP application is installed as a new protocol handler into browsers. It includes components which enableInternet Service Providers to obtain incremental revenue from subscribers, advertisers, other ISPs, and streaming video providers in exchange for using premium bandwidth services on their networks.
Post Your Answer

5 :: What is the role of IP in the TCP/IP protocol suite?

IP is used for

1. Transmitting data from higher-level protocols like TCP, UDP in IP datagrams, from one host to another host in the network.
2. Identifying individual hosts in a network using an IP address.
3. Routing datagrams through gateways and
4. Fragmenting and reassembling datagrams based on the MTU of the underlying network.
Post Your Answer

6 :: Explain Is it possible for an IP datagram to be duplicated?

Yes. A host may receive the same copy of an IP datagram twice. It is upto the higher layer protocols to discard the duplicate copy of the datagram.
Post Your Answer

7 :: Do you know Electronic messaging was created decades before the internet revolution. In the 1960s people were exploring how to communicate using mainframe computers. The U.S. Government was the first to create a server to transmit email. In the 1970s, the mailbox protocol was developed, which was an early version of SMTP. The modern version of this technology was developed in 1982?

SMPT is responsible for transmitting email across Internet networks (IPs). This technology is used specifically for sending outgoing email. Clients typically use applications such as Internet Message Access Protocol (IMAP) or Post Office Protocol (POP) to access to their email box. For example, if you send an email it goes to a mail server using SMTP. The mail client will then deliver it to the user?s mailbox.
Post Your Answer

8 :: Explain How a datagram becomes an undeliverable datagram?

A datagram may become undeliverable, if

1. The destination host is down.
2. The route for the destination host is not found.
3. A network in the route to the destination host is down.
4. The Time To Live (TTL) value of the datagram becomes zero.
Post Your Answer

9 :: Explain What do you know about other protocols?

In order for computers to communicate with one another, standard methods of information transfer and processing have been devised. These are referred to as "protocols" and some of the more common ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP
Post Your Answer
Add New Question