1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with

PC1 sharing the Ethernet with Router1, and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
3 0

Answer:

The correct option of the following question is a.).

Explanation:

The PC1 will send the Ethernet frames to the Router1, with the PC1's MAC address as source address and the Router1's MAC address as destination address. The Router1 will removes an encapsulated the IP packets from that Ethernet frames, discarding frames header and the trailer. The Router1 will be forward IP packets by the first an encapsulating it's inside the HDLC frames, but the Router1 will not an encapsulate Ethernet frames in the HDLC frames, but rather than an IP packets. The Router2 will be deencapsulate the IP packets from HDLC frames and forward onto Ethernet Local Area Network and adding the new Ethernet headers and the trailer, but this is the header will be different. It will the list Router2's MAC address as source address and the PC2's MAC address as destination address.

You might be interested in
What is an online alternative to customers sending checks via mail?
irinina [24]
Two service will notification in your email is Western Union and Money Gram
5 0
2 years ago
A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to
DIA [1.3K]
The networking model that they should use would be a peer-to-peer network model or P2P. It is a centralized network model wherein every network connected have the same administration rights. They share all resources without having a separate server.
8 0
2 years ago
Why do many administrators choose to use a command line interface on a Linux server?
kozerog [31]
All of the different versions of Linux are the same when using the command line interface.
6 0
3 years ago
Help PLEASE (in attachment)
bekas [8.4K]
Oxygen, Glucose, Chemical Energy

ACB I think ( not giving my word on this part)

They are essential to all ecosystems
7 0
3 years ago
Calculate the total number of bits transferred if 200 pages of ASCII data are sent using asynchronous serial data transfer. Assu
Mumz [18]

Answer:

4000000 bits

Explanation:

The serial port configuration in asynchronous mode actually assumes a data size of 8bits, 1 start bit, no parity and 1 stop bit.

Therefore 8+1+1 = 10 bits.

This means that for every eight bits of data, ten bits are sent over the serial link — one start bit, the eight data bits, and the one stop bit)

We also know that there are 200 pages of ASCII data using asynchronous serial data transfer and each page has 80*25 of text characters.

Therefore the total number of bits transferred:

200*80*25*10 = 4000000 bits

5 0
2 years ago
Other questions:
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • If there are no differences between the amino acid sequences in the cytochrome c protein of humans and chimpanzees why aren't we
    15·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class
    13·1 answer
  • Copy and paste is the only way to move text from one place to another.<br><br>True or <br>False​
    15·2 answers
  • The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.
    10·1 answer
  • What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class
    13·1 answer
  • Ok so I’m using a word document and towards the bottom of the page it stops me from moving my text box any further down even tho
    13·2 answers
  • There are a wide variety of nonsampling errors that can occur during data collection including the first type, ________.
    7·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!