1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
9

Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in

the PDUs that are transmitted from host B to the router?

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
4 0

Answer:

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200

Explanation:

To properly understand the given answer, let us define some terms used in the narrative of the question:

Subnet: The sub network or as popularly called subnet  is a logical division of the internet protocol of a network into many different and smaller network. It is typically used to create partitions or subdivisions of large networks into bits.

PDU: The PDU can be said to be an abbreviation for the word power distribution unit or protocol data unit.  It can also be refereed to as an IT device that possess many output ports or terminals. They are mostly used to distribute or transmit power or data to other operating devices with the telecommunication system.

Now referring back to the question asked and the image attached below, we can see that host a and b send their signal through subnet teachers while host c and d send their signal through subnet students thus,

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200 are the correct destination.

You might be interested in
John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
Romashka-Z-Leto [24]

Answer:

Hardware.

Explanation:

John is operating with Internal Computer Professionals, an organization committed to assisting sector owners to overcome MIS technology problems. John's duties include maintaining and repairing motherboards, wires, and parts of inner devices including DVDs and hard disks. Although John's appointed for hardware fixation.

3 0
3 years ago
Which one is it A,B,C,D
Yakvenalex [24]

I am pretty sure A is the answer because it makes most sense plugged into the sentence.

5 0
4 years ago
Read 2 more answers
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
3 years ago
What are output statement in QBASIC?
Roman55 [17]

Answer:

<h2> hi. here's your answer ....</h2>

<h3>print statement provides output on the screen . it prints the value of the expression on the screen . if the expression list is blank , no character is print . the expression in the list may be numeric or string .</h3><h2>Hope you like it..</h2><h2>(◕ᴗ◕✿)</h2>

5 0
3 years ago
Other questions:
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • 1. The component that displays output
    5·1 answer
  • Identify a true statement of a JavaScript program in a web form.
    10·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • What is the missing line?
    9·1 answer
  • What is the most likely to be a possible physical attack?
    7·2 answers
  • Which programming paradigm focuses on abstraction to the level of math and the elimination of side-effects and state based progr
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!