Question: A(5 points). Suppose machine C receives an ARP request sent from A looking for target B, and C has the binding from Bs IP address
A(5 points). Suppose machine C receives an ARP request sent from A looking for target B, and C has the binding from Bs IP address to Bs physical address in its cache. What should C do?
B(5 points). How can a workstation use ARP when it boots up to find out if any other machine is impersonating it? What is a disadvantage of this scheme?
C(5 points). In what special case would a host connected to an Ethernet not need to use ARP before transmitting an IP datagram?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
