1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
2 years ago
11

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre

sses are contained in the PDUs that are transmitted from host B to the router
Computers and Technology
1 answer:
Pachacha [2.7K]2 years ago
4 0

The layer are:

  • Layer 2 destination address = 00-00-0c-94-36-ab
  • Layer 2 source address = 00-00-0c-94-36-bb
  • Layer 3 destination address = 172.16.20.200
  • Layer 3 source address = 172.16.10.200

<h3>What is Destination Address? </h3>

This address  is known to be the  the address where the frame or packet of data is known to be sent to over a network. The destination address is said to be used by hosts on the network to know  if the packet or frame is intended for that host or not.

Note that the Layer 2 and Layer 3 addresses that are contained in the PDUs that are transmitted from host B to the router are:

  • Layer 2 destination address = 00-00-0c-94-36-ab
  • Layer 2 source address = 00-00-0c-94-36-bb
  • Layer 3 destination address = 172.16.20.200
  • Layer 3 source address = 172.16.10.20

Learn more about router from

brainly.com/question/24812743

#SPJ1

You might be interested in
Given the following adjacency matrix, what is the approximate rank vector after one iteration of the power iteration method (use
ValentinkaMS [17]

Note: The matrix referred to in the question is: M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]

Answer:

a) [5/18, 5/18, 4/9]'

Explanation:

The adjacency matrix is  M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]

To start the power iteration, let us start with an initial non zero approximation,

X_o = \left[\begin{array}{ccc}1\\1\\1\end{array}\right]

To get the rank vector for the first Iteration:

X_1 = MX_0

X_1 =  \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]\left[\begin{array}{ccc}1\\1\\1\end{array}\right] \\\\X_1 = \left[\begin{array}{ccc}5/6\\5/6\\4/3\end{array}\right]\\

Multiplying the above matrix by 1/3

X_1 = \left[\begin{array}{ccc}5/18\\5/18\\4/9\end{array}\right]

8 0
3 years ago
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
What is the correct order of precedence of the mathematical operators?
LenaWriter [7]
A common technique for remembering the order<span> of </span>operations<span> is the abbreviation "PEMDAS", which is turned into the phrase "Please Excuse My Dear Aunt Sally". It stands for "Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction".</span>
7 0
3 years ago
What is a variable in programming?
HACTEHA [7]
A symbol or set of characters in a programming statement whose value can be changed
3 0
3 years ago
PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you
JulsSmile [24]
1.Slow down 2. Break earlier
7 0
3 years ago
Other questions:
  • How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
    8·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • Paul has been working long hours. He is tired and distracted by family issues,
    10·1 answer
  • What are 3 ways to select an entire document?
    15·1 answer
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • The merge and center
    14·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • Technology has had
    10·1 answer
  • Catherine, a web designer, has created new content for a client's website. In order to update the company website, she needs to
    15·1 answer
  • __________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!