1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with

PC1 sharing the Ethernet with Router1, and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
3 0

Answer:

The correct option of the following question is a.).

Explanation:

The PC1 will send the Ethernet frames to the Router1, with the PC1's MAC address as source address and the Router1's MAC address as destination address. The Router1 will removes an encapsulated the IP packets from that Ethernet frames, discarding frames header and the trailer. The Router1 will be forward IP packets by the first an encapsulating it's inside the HDLC frames, but the Router1 will not an encapsulate Ethernet frames in the HDLC frames, but rather than an IP packets. The Router2 will be deencapsulate the IP packets from HDLC frames and forward onto Ethernet Local Area Network and adding the new Ethernet headers and the trailer, but this is the header will be different. It will the list Router2's MAC address as source address and the PC2's MAC address as destination address.

You might be interested in
Describe how you believe technology will impact our society in 50 years.
N76 [4]

Answer:

Wall-e

Explanation:

We will all be fat, lazy, on floating chairs with everything in our lives being automated thanks to AI and everyone's obsession to do less.

5 0
3 years ago
Energía de movimiento de los átomos o moléculas
olasank [31]

Answer:

g

Explanation:

4 0
2 years ago
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
DanielleElmas [232]

Answer:

The correct answer to the following question will be Option D (Cloud service developer).

Explanation:

  • Developers are usually individuals who layout and build applications or websites such as web or software systems. They would be known as app or web developers in this regard. In the sense that they still build and maintain things, a software developer is quite similar, however-and here's the deciding factor-this is achieved on virtual clouds.
  • It is the responsibility of the cloud service developer to design and build cloud elements and products, as well as to check and validate services.

Therefore, Option D is the right answer.

7 0
3 years ago
ABC Enterprises has three employees who work in the same building. The type of network they need is a _____. LAN MAN STAN WAN
algol [13]
The type of network they need is LAN
8 0
3 years ago
Read 2 more answers
Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with t
loris [4]

Answer:

The answer is B.

Explanation:

Radio Frequency Identification (RFID) is a technology that uses radio waves to  secure objects, pair devices, tag them etc. and it is made up of a transmitter which emits radio waves and a receiver.

The example given in the question where Jamie listens to the communication between the RFID tag and the devide of the user and copies the information to later use it to gain access to the vehicle is an example of a replay attack.

Also called "eavesdropping & replay", the first part is the listening to the conversation to steal the data and the replay part is where he uses the information to gain access.

I hope this answer helps.

7 0
3 years ago
Other questions:
  • Java - Given a String variable response that has already been declared, write some code that repeatedly reads a value from stand
    12·1 answer
  • What command will unregister a component when run?
    12·2 answers
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • A Python function cannot under normal circumstances reference a module variable for its value.
    12·2 answers
  • Implement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the intege
    11·1 answer
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • This tag is used to change the appearance of your text on your web page
    8·1 answer
  • The underlying color of a slide.
    9·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!