1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
9

Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in

the PDUs that are transmitted from host B to the router?

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
4 0

Answer:

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200

Explanation:

To properly understand the given answer, let us define some terms used in the narrative of the question:

Subnet: The sub network or as popularly called subnet  is a logical division of the internet protocol of a network into many different and smaller network. It is typically used to create partitions or subdivisions of large networks into bits.

PDU: The PDU can be said to be an abbreviation for the word power distribution unit or protocol data unit.  It can also be refereed to as an IT device that possess many output ports or terminals. They are mostly used to distribute or transmit power or data to other operating devices with the telecommunication system.

Now referring back to the question asked and the image attached below, we can see that host a and b send their signal through subnet teachers while host c and d send their signal through subnet students thus,

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200 are the correct destination.

You might be interested in
Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the program
jeka57 [31]

Answer:

Follows are the solution to this question:

Explanation:

If Windy needs to study and be a specialist in graphic designing for machines, I'm going to provide a windy link of the machine with such a 64 bit, 3-GHz Intel or AMD processor with an 8 GB  RAM, an OpenGL 4.1 chip, an inter-button cursor, a right thumbstick, or a storage drive with GB at least.  

  • All above description for the computer is suitable for windy because you would well be aware throughout the graphic designing, that may be learned through iRhino 3D (iOS), Autocad, Magical Plan, Morphoio trace, etc if you'd like to graduation in architecture.
  • They require fast internet for each application, that can also be installed and installed, that  often requires a profile of all technical support programs as well as a web-only storage license.  
  • As many of the above applies also runs through an AMD or six-bit intel, but not on the ARM processor or instance  iRhino 3D (iOS) isn't consistent with an Embedded system, I will select the processor like an Intel or 3GHz AMD processor.
4 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
HELP asap please... ​
Usimov [2.4K]

Answer:

I have absolutely no idea bruddah.

Explanation:

Soz!

8 0
3 years ago
Who was one of the founders of the location sharing site Foursquare​
Shalnov [3]

One of the founders of Foursquare is Dennis Crowley. The other is Naveen Selvadurai. I know you didn't ask for both but I wanted to give them to you just in case. I hope this helps! (:

7 0
2 years ago
Sonic the Hedgehog (1991)
e-lub [12.9K]

Answer:

What if we made a fast game?

Explanation:

The mascot is the person, animal or thing which brings good luck, just like Mario. However, this is not a problem with Sonic the Hedgehog. And the Hedgehog is powerful enough to cross any barrier. Hence tieing the collectibles is not required. And the Hedgehog is quite cute and domestic. But it moves only 10 meters per second if we are considering the maximum speed. Hence, the correct option is certainly what if we made a fast game? And this is option C.

7 0
3 years ago
Other questions:
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the
    9·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
  • PLEASE HELP ASAP!! Timed test!!
    12·1 answer
  • How to transfer word 2019 from one computer to another
    12·1 answer
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
  • Which unit of binary storage has a size that is processor dependent?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!