Question: A(5 points). Suppose machine C receives an ARP request sent from A looking for target B, and C has the binding from Bs IP address

A(5 points). Suppose machine C receives an ARP request sent from A looking for target B, and C has the binding from Bs IP address to Bs physical address in its cache. What should C do?

B(5 points). How can a workstation use ARP when it boots up to find out if any other machine is impersonating it? What is a disadvantage of this scheme?

C(5 points). In what special case would a host connected to an Ethernet not need to use ARP before transmitting an IP datagram?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!