1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with

PC1 sharing the Ethernet with Router1, and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
3 0

Answer:

The correct option of the following question is a.).

Explanation:

The PC1 will send the Ethernet frames to the Router1, with the PC1's MAC address as source address and the Router1's MAC address as destination address. The Router1 will removes an encapsulated the IP packets from that Ethernet frames, discarding frames header and the trailer. The Router1 will be forward IP packets by the first an encapsulating it's inside the HDLC frames, but the Router1 will not an encapsulate Ethernet frames in the HDLC frames, but rather than an IP packets. The Router2 will be deencapsulate the IP packets from HDLC frames and forward onto Ethernet Local Area Network and adding the new Ethernet headers and the trailer, but this is the header will be different. It will the list Router2's MAC address as source address and the PC2's MAC address as destination address.

You might be interested in
You can add envelopes to existing documents. <br> a. True <br> b. False
Lemur [1.5K]
<span>The answer is true. Once documents are created, they may be accessed again and have envelopes pointing to them even when the documents are empty.</span>
3 0
3 years ago
few toffees were distributed among oriya , piyush and payal . priya got 3/8 , piyush and payal 1/8 and 1/2 of total toffees resp
ohaa [14]

Answer:

it is payal because 1/2 is a half

Explanation:

there you go

6 0
3 years ago
A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
ch4aika [34]

Answer:

B.O(n).

Explanation:

Since the time complexity of visiting a node is O(1) in iterative implementation.So the time complexity of visiting every single node in binary tree is O(n).We can use level order traversal of a binary tree using a queue.Which can visit every node in O(n) time.Level order traversal do it in a single loop without doing any extra traversal.

8 0
3 years ago
Write a function in MATLAB that takes as an input a matrix of coefficients for a system of linear equations (A), the solution ve
Illusion [34]
Answer is A all the way to the right
7 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Other questions:
  • Which of the following is the rarest and most valuable mineral ore among the native elements?
    13·1 answer
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • Write a function addOne that adds 1 to its integer referenceparameter. The function returns nothing.
    11·1 answer
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Digital libraries are often available to students and/or employees at colleges, schools, and BLANK institutions.
    15·1 answer
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
    5·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!