Consider the following network with assiciated IP Address, MAC Address and ARP/MAC table information PC 1...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider the following network with assiciated IP Address, MAC Address and ARP/MAC table information PC 1 PC 2 Switch 1 10/10 10/20 PC 1 PC 2 PC 3 PC 4 Router 1011 Switch Interface Configuration Details Device Interface VLAN f0/1.10 10 Router 1 f0/1.20 20 99 10/1 10/1.99 f0/1 10/10 10/11 f0/20 f0/22 vlan99 F011 10:22 MAC IP Trunk 10 10 20 20 99 • Advantage: • Disadvantage: PC S PC 4 PC 1 IP PC ARP Tables MAC 192.168.10.1 aa:bb:cc:dd:ee:99 PC 2 IP MAC Empty PC 3 IP Empty PC 4 IP Empty Router 1 IP 192.168.10.6 MAC aa:bb:cc:dd:ee:99 IP 192.168.10.1 aa:bb:cc:dd:ee:99 192.168.20.1 aa:bb:cc:dd:ce:99 192.168.99.1 aa:bb:cc:dd:00:99 192.168.99.5 aa:bb:cc:dd:ff:01 192.168.10.6 aa:bb:cc:dd:ff:02 192.168.20.7 aa:bb:ce:dd:ff:03 192.168.10.8 aa:bb:cc:dd:ff:04 192.168.20.9 MAC MAC MAC aa:bb:cc:dd:ff:01 MAC Switch 1 MAC Table a) When a packet from PC1 to PC4 traverses the trunk link from Switch 1 to Router 1, fill in the following information as seen in the packet headers Source Destination Port aa:bb:cc:dd:ee:99 f0/1 aa:bb:cc:dd:ff:01 10/10 (2 marks) b) Nominate one advantage and one disadvantage of a layered network protocol architecture? Consider the following network with assiciated IP Address, MAC Address and ARP/MAC table information PC 1 PC 2 Switch 1 10/10 10/20 PC 1 PC 2 PC 3 PC 4 Router 1011 Switch Interface Configuration Details Device Interface VLAN f0/1.10 10 Router 1 f0/1.20 20 99 10/1 10/1.99 f0/1 10/10 10/11 f0/20 f0/22 vlan99 F011 10:22 MAC IP Trunk 10 10 20 20 99 • Advantage: • Disadvantage: PC S PC 4 PC 1 IP PC ARP Tables MAC 192.168.10.1 aa:bb:cc:dd:ee:99 PC 2 IP MAC Empty PC 3 IP Empty PC 4 IP Empty Router 1 IP 192.168.10.6 MAC aa:bb:cc:dd:ee:99 IP 192.168.10.1 aa:bb:cc:dd:ee:99 192.168.20.1 aa:bb:cc:dd:ce:99 192.168.99.1 aa:bb:cc:dd:00:99 192.168.99.5 aa:bb:cc:dd:ff:01 192.168.10.6 aa:bb:cc:dd:ff:02 192.168.20.7 aa:bb:ce:dd:ff:03 192.168.10.8 aa:bb:cc:dd:ff:04 192.168.20.9 MAC MAC MAC aa:bb:cc:dd:ff:01 MAC Switch 1 MAC Table a) When a packet from PC1 to PC4 traverses the trunk link from Switch 1 to Router 1, fill in the following information as seen in the packet headers Source Destination Port aa:bb:cc:dd:ee:99 f0/1 aa:bb:cc:dd:ff:01 10/10 (2 marks) b) Nominate one advantage and one disadvantage of a layered network protocol architecture?
Expert Answer:
Answer rating: 100% (QA)
This is the answer MAC IP Source Destination aabbccddff01 aabbccddff99 192... View the full answer
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0133594140
7th edition
Authors: James Kurose, Keith Ross
Posted Date:
Students also viewed these computer network questions
-
Access Control Lists are just what they sound like and yet they're so powerful and specialized that they're often misunderstood. In your initial post, talk about what you think they are now. Put the...
-
IFRS and U.S. GAAP are relatively similar with respect to current liabilities and contingencies. Relatively minor differences relate to when financing must be in place for a liability expected to be...
-
Dickinson Company has $12,080,000 million in assets. Currently half of these assets are financed with long-term debt at 10.4 percent and half with common stock having a par value of $8. Ms. Park,...
-
Three friends are choosing a restaurant for dinner. Here are their preferences: a. If the three friends use a Borda count to make their decision, where do they go to eat? b. On their way to their...
-
If you put up $34,000 today in exchange for a 7.65 percent, 15-year annuity, what will the annual cash flow be?
-
Define the terms risk assessment procedures and analytical procedures.
-
Budgeting is useful to many different types of entities, including the individual. Consider the entity that you know best, the college or university student. Form groups of two to six students, and...
-
The contribution margin income statement of Pepperpike Coffee for February follows: Pepperpike Coffee contribution margin Income Statement For month ended February 29 Sales...
-
Wayne Company is considering a long-term investment project called ZIP. ZIP will require an investment of $112.860. It will have a useful life of 4 years and no salvage value. Annual cash inflows...
-
The Fashion Rack has a monthly accounting period. All transactions are recorded in a general journal. Postings are made from the general journal to the accounts receivable ledger, accounts payable...
-
suppose the average return on asset a is 6.6 percent and the standard deviation is 8.6 percent, and the average return and standard deviation on asset b are 3.8 percent and 3.2 percent, respectively....
-
When an auditor is asked to express an opinion on an entity's rent and royalty revenues, he or she may a. Not accept the engagement because to do so would be tantamount to agreeing to issue a...
-
What time period alternatives does QuickBooks Accountant provide for a balance sheet?
-
A firm of certified public accountants is considering the use of an outside mailing service to handle confirmations of the accounts receivable of clients upon whose financial statements the firm is...
-
An auditor includes a separate paragraph in an otherwise unmodified financial statement audit report to emphasize that the entity being reported upon had significant transactions with related...
-
Factory Discount Prices Inc., is a chain store discount outlet which sells women's clothes. It has an excessively large inventory on hand and is in urgent need of additional cash. It is bordering on...
-
Reallyneed Help! What is the firm's total change in cash from the prior year to the current year? 2 answers
-
Evaluate the integral, if it exists. Jo y(y + 1) dy
-
Compare and contrast the properties of a centralized and a distributed routing algorithm. Give an example of a routing protocol that takes a centralized and a decentralized approach.
-
Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and R2. As part of a reply attack, Trudy sends a...
-
List several popular messaging apps. Do they use the same protocols as SMS?
-
The greater the number of shares in a portfolio, the less the marginal contribution to diversification of an additional security will be. True or false?
-
Under which circumstances can the risk of a portfolio be less than the individual risk of each of the securities it contains?
-
What is the drawback of the coefficient?
Study smarter with the SolutionInn App