1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with

PC1 sharing the Ethernet with Router1, and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
3 0

Answer:

The correct option of the following question is a.).

Explanation:

The PC1 will send the Ethernet frames to the Router1, with the PC1's MAC address as source address and the Router1's MAC address as destination address. The Router1 will removes an encapsulated the IP packets from that Ethernet frames, discarding frames header and the trailer. The Router1 will be forward IP packets by the first an encapsulating it's inside the HDLC frames, but the Router1 will not an encapsulate Ethernet frames in the HDLC frames, but rather than an IP packets. The Router2 will be deencapsulate the IP packets from HDLC frames and forward onto Ethernet Local Area Network and adding the new Ethernet headers and the trailer, but this is the header will be different. It will the list Router2's MAC address as source address and the PC2's MAC address as destination address.

You might be interested in
The voluntary linkage of computer networks around the world is called the ______.
77julia77 [94]
The voluntary linkage of computer networks around the world is called the internet which began to be used in the 1990s. It initially began being used in the 1960s by scientists with the aim of exchanging information about research. Between the year 1995 and late 2002, the number of those connected to the internet rose from 26 million to more than 600 million. Currently, internet has now become a way of life.








3 0
3 years ago
Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
olga2289 [7]

Binary search is used similarly. K'th element is found in more productive way.

<u>Explanation:</u>

arr1 and arr2 are the middle elements which are compared, let us compute as mid1 and mid2. Let us predict arr1 [mid1] k, the elements are not needed after mid2 elements.  arr2 are set as last element for arr2 [mid2].  New sub problems are defined. When one array is half the size.

C++ code for the algorithm.

#include <iostream>

using namespace std;    

int kth(int *arr1, int *arr2, int *end1, int *end2, int k)

{

if (arr1 == end1)

return arr2[k];

if (arr2 == end2)

return arr1[k];

int mid1 = (end1 - arr1) / 2;

int mid2 = (end2 - arr2) / 2;

if (mid1 + mid2 < k)

{

if (arr1[mid1] > arr2[mid2])

return kth(arr1, arr2 + mid2 + 1, end1, end2,

k - mid2 - 1);

else

return kth(arr1 + mid1 + 1, arr2, end1, end2,

k - mid1 - 1);

}

else

{

if (arr1[mid1] > arr2[mid2])

return kth(arr1, arr2, arr1 + mid1, end2, k);

else

return kth(arr1, arr2, end1, arr2 + mid2, k);

}    

int main()

{

int arr1[5] = {2, 3, 6, 7, 9};

int arr2[4] = {1, 4, 8, 10};    

int k = 5;

cout << kth(arr1, arr2, arr1 + 5, arr2 + 4, k - 1);

return 0;

}

7 0
3 years ago
The _____ dialog box lets you specify which files are to be merged.
andreev551 [17]
C. Combine Documents
---------------------------------
The Combine Documents dialog box lets you specify which files are to be merged.

8 0
3 years ago
To provide for unobtrusive validation, you can install the ____________________ package for unobtrusive validation.
NARA [144]

Answer:

AspNet.ScriptManager.jQuery?

Explanation:

Unobtrusive validation means we can perform a simple client-side validation without writing a lot of validation code by adding suitable attributes and also by including the suitable script files.

One of the benefits of using a unobtrusive validation is that it help to reduce the amount of the Java script that is generated. We can install the AspNet.ScriptManager.jQuery? for the unobtrusive validation.

When the unobtrusive validation is used, validation of the client is being performed by using a JavaScript library.

4 0
3 years ago
A __________ note is a private note that you leave for yourself or for other people who might use the presentation file
BaLLatris [955]

Answer:

The answer is that it is a speaker note.

Explanation:

It leaves a note for people that use presentation files. I use it all the time on my google slides.

7 0
2 years ago
Other questions:
  • Create a class named BaseballGame that contains data fields for two team names and scores for each team in each of nine innings.
    12·1 answer
  • Behaving in an acceptable manner within a workplace environment is referred to as having
    9·1 answer
  • What is a quick way to close the header or footer view in a microsoft word document?
    12·1 answer
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • Write a program that prints the day number of the year, given the date in the form month-day-year. For example, if the input is
    9·1 answer
  • Cloud kicks recently completed the implementation of sales cloud. Cloud kicks has trained the users to use the mobile app to acc
    12·1 answer
  • The greatest common divisor of integers x and y is the largest integer that evenly divides into both x and y. Write a recursive
    7·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • Which network component is used to connect one network to another? Which component delivers the message to the destination compu
    5·1 answer
  • What is the cell reference for row 22 and column B? __________<br><br> In excel
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!