- World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.

Get it now !!
Send your Resume to 6000 Companies
Mobile IP Interview Questions & Answers - Learning Mode

Mobile IP Interview Questions & Answers - Learning Mode

Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP specifies how a mobile node registers with its home agent and how the home agent routes datagrams to the mobile node through the tunnel.

Try Mobile IP Interview Questions & Answers - Exam Mode


Sort By : Latest First | Oldest First | By Rating

Mobile IP Interview Questions & Answers - Learning Mode
Try Mobile IP Interview Questions & Answers - Exam Mode
Question: What is Mobile IP?

Answer: When a user leaves the network with which his device is associated (home network) and enters the domain of a foreign network, the foreign network uses the Mobile IP protocol to inform the home network of a care-of address to which all packets for the user's device should be sent.

Mobile IP is most often found in wireless WAN environments where users need to carry their mobile devices across multiple LANs with different IP addresses. Source:
Question: How a datagram becomes an undeliverable datagram?

Answer: A datagram may become undeliverable, if

1. The destination host is down.
2. The route for the destination host is not found.
3. A network in the route to the destination host is down.
4. The Time To Live (TTL) value of the datagram becomes zero.
Question: What do you know about other protocols?

Answer: In order for computers to communicate with one another, standard methods of information transfer and processing have been devised. These are referred to as "protocols" and some of the more common ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP
Question: Is it possible for an IP datagram to be duplicated?

Answer: Yes. A host may receive the same copy of an IP datagram twice. It is upto the higher layer protocols to discard the duplicate copy of the datagram. Source:
Question: How is the value for datagram identifier calculated?

Answer: The IP datagram identifier is just a sequence number assigned by the transmitting host. The algorithm for assigning value to this field is not specified by the IP protocol.
Question: What is ISTP protocol?

Answer: The InterStream Transit Protocol (ISTP) is a secure protocol that allows Internet Service Providers (ISPs) to offer high bandwidth multimedia services over their networks. The ISTP application is installed as a new protocol handler into browsers. It includes components which enableInternet Service Providers to obtain incremental revenue from subscribers, advertisers, other ISPs, and streaming video providers in exchange for using premium bandwidth services on their networks. Source:
Question: What do you know about other protocols?

Answer: In order for computers to communicate with one another, standard methods of information transfer and processing have been devised. These are referred to as "protocols" and some of the more common ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP
Question: What is the role of IP in the TCP/IP protocol suite?

Answer: IP is used for

1. Transmitting data from higher-level protocols like TCP, UDP in IP datagrams, from one host to another host in the network.
2. Identifying individual hosts in a network using an IP address.
3. Routing datagrams through gateways and
4. Fragmenting and reassembling datagrams based on the MTU of the underlying network. Source:
Question: Electronic messaging was created decades before the internet revolution. In the 1960s people were exploring how to communicate using mainframe computers. The U.S. Government was the first to create a server to transmit email. In the 1970s, the mailbox protocol was developed, which was an early version of SMTP. The modern version of this technology was developed in 1982.

Answer: SMPT is responsible for transmitting email across Internet networks (IPs). This technology is used specifically for sending outgoing email. Clients typically use applications such as Internet Message Access Protocol (IMAP) or Post Office Protocol (POP) to access to their email box. For example, if you send an email it goes to a mail server using SMTP. The mail client will then deliver it to the user?s mailbox.
Question: Which part of the IP datagram is used for calculating the checksum?

Answer: 30. The checksum field in the IP header covers only the IP header. The payload data is not used for calculating this checksum.
Question: An undeliverable datagram is discarded and an ICMP error message is sent to the source host.

Answer: Is it possible for an IP datagram to be duplicated? Source:


India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.046875 Seconds