While sending an IP datagram from host A to host B and a return a datagram from host B to host A, where A and B are on different networks . While sending an IP datagram from host A to host B and a return a datagram from host B to host A, where A and B are on different networks .
a) What will be the source and destination IP addresses on the datagram sent from host A? b) What will be the destination MAC address on the frame containing the datagram sent by host A? c) Which address will change by the time the information reaches host B and which will ones will remain th same? d) What will be the source and destination IP addresses on the datagram sent from host B ? e) What will be the destination MAC address on the frame containing the datagram sent by the host B? f) Which address will change by the time the information reaches host A and which will remain the same?
a)Host A will send a Datagram packet with Source IP Address of A itself & destination IP address of host B.
b)The destination MAC address on the frame containing the datagram sent by host A is MAC address of Default Gateway which is in most cases is a Router.
c) The MAC address of source & destination will change by the time the information is reached to host B (Layer 2) , whereas the Source & destination IP address(Layer 3) will remain the same.
d)Since,Layer 3 provides Connectionless Service unlike Layer 2 so Host B will send a Datagram packet with Source IP Address of B & destination IP address of host A.
e)The destination MAC address on the frame containing the datagram sent by host B is MAC address of Default Gateway directly attached to host B which is in most cases is a Router.
f) The MAC address of source & destination will change by the time the information is reached to host A (Layer 3) , whereas the source & destination IP address(Layer 3) will remain the same.
Explanation on How Communication takes place between two hosts on different network:
When Communication takes place between two hosts on different
network, layer 2 device (Switch) cannot be used for
inter-communication because Switch works on MAC address and MAC
addresses are obtained via broadcast of ARP request and we cannot
send a broadcast in whole world to find a single machine. To solve
this problem,Layer 3 addressing was developed and Layer 3 device
such as Router is used for inter-communication.
The Router makes use of IP Addresses.
While sending an IP datagram from host A to host B and a return a datagram...
please make it clear thanks 4. Consider three LANs interconnected by two routers, as shown in the following figure. a. Assign IP addresses to all of the host and router interfaces. For Subnet 1 use addresses of the form 192.168.200.xxx: for Subnet 2 uses addresses of the form 192.168.30.xxx; and for Subnet 3 use addresses of the form 192.168.100.xxx. b. Assign MAC addresses to all of the host and router interfaces. Assume that all the MAC addresses start with "00-00";...
1. Assume that host A sends an IP datagram to host F in Figure. From the operation of the ARP protocol, determine the source and destination MAC addresses and the source and destination IP addresses of the transmitted frame (i) from A to R0, (ii) from R0 to R1, (iii) from R1 to F.
Consider the scenario below in which three hosts, with private IP addresses 10.0.1.13, 10.0.1.15, 10.0.1.20 are in a local network behind a NATted router that sits between these three hosts and the larger Internet. NAT Translation Table WAN side addr LAN side addr 35.122.196.219:517 10.0.1.27:3435 10.0.1.13 2 S: D, 10.0.1.27 135.122.196.219 10.0.1.15 4 3 10.0.1.20 IP datagrams being sent from, or destined to, these three hosts must pass through this NAT router. The router's interface on the LAN side has...
13 Ll し2 L3 C2 Cl Assume the path from host A to host B consists of 2 routers and 3 links as displayed in the diagram. Assume host A sends packets to host B. At host A, packets from A to B will be transmitted with source IP address of destination IP address of and with source MAC address of destination MAC address of 13 Ll し2 L3 C2 Cl Assume the path from host A to host B...
2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...
14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Host Z, respectively. Assume the port number o the port number of Process B is 464 26145, and the port number of Process D is 80. a. What are the identifiers of the socket associated with Process B when it is...
EXPLAIN in details why is it true or false. need to be 100% POSTIVE OF ANSWER. SOLVE D E F G H I J 2) (10 points) IP and MAC addressing. True or False. Circle True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer the folowing network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ΛΕΡ tables are up-to-date unless otherwise stated Switch Ronter...
comm & networks fund 12. (8pts) Change the following IP addresses from dotted- decimal notation to binary notation. a. 197.163.222.19 b. Show in details how to convert 197 into binary 13. (&pts) Change the following IP addresses from binary notation to dotted-decimal notation. a. 11011111 10110000 00011111 01011101 b. Show in details how to convert 01011101 into decimal 14. (6pts) Find the class of the following IP addresses (i.e., classful addressing) a. 11110111 11110011 10000111 11011101 b. 10101111 11000000 11110000...
5. In principle, the fact that IP datagram headers aren't encrypted makes it possible for someone to conduct traffic analysis where they glean information about the frequency of source-destination pairs. While maintaining the packet-switching and flexible routing in the TCP/IP Internet, describe how to change the protocols and architecture to allow IP headers to be encrypted. 5. In principle, the fact that IP datagram headers aren't encrypted makes it possible for someone to conduct traffic analysis where they glean information...
Answer the following questions, numbering your answers Q1, Q2, and Q3 respectively. Q1) What is the difference between routing and forwarding? Q2) Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? Q3) Suppose you purchase a wireless router...