1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
4 years ago
9

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with

PC1 sharing the Ethernet with Router1, and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Computers and Technology
1 answer:
photoshop1234 [79]4 years ago
3 0

Answer:

The correct option of the following question is a.).

Explanation:

The PC1 will send the Ethernet frames to the Router1, with the PC1's MAC address as source address and the Router1's MAC address as destination address. The Router1 will removes an encapsulated the IP packets from that Ethernet frames, discarding frames header and the trailer. The Router1 will be forward IP packets by the first an encapsulating it's inside the HDLC frames, but the Router1 will not an encapsulate Ethernet frames in the HDLC frames, but rather than an IP packets. The Router2 will be deencapsulate the IP packets from HDLC frames and forward onto Ethernet Local Area Network and adding the new Ethernet headers and the trailer, but this is the header will be different. It will the list Router2's MAC address as source address and the PC2's MAC address as destination address.

You might be interested in
Electronic business includes which of the following
Alja [10]

Answer:

D. all of these

Explanation:

5 0
3 years ago
Read 2 more answers
please write out an accurate code for the question below also please explain or I'll report you ( Thanks :) )
leva [86]

Answer: hmmmm i feel like u have to move the thingy thats shooting that light down 1 unit so it can move the planet.

Explanation: moving it down 1 unit will put it at the perfect angle to push the planet. :/

6 0
2 years ago
Read 2 more answers
What are the objects in object-oriented programming language?
VMariaS [17]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

5 0
3 years ago
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Maru [420]

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here brainly.com/question/14407522

#SPJ4

5 0
2 years ago
How many times go you need to click the format painter button to apply copied formats to multiple paragraphs one right after the
Umnica [9.8K]
Double click would be enough
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which practice enables recovery of accidental deletions in data records?
    15·2 answers
  • Microsoft access does not create n:m relationships because microsoft access creates databases based on
    7·1 answer
  • . What is the output of this code sequence?
    8·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • Do you think you should learn to program? Why? why not?
    11·1 answer
  • What is output? Select all that apply. c = 3 while (c < 10): c = c + 2 print (c)
    6·1 answer
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • Why does atmospheric pressure does not effect on planes,jet planes and rocket?​
    9·1 answer
  • Weaknesses about ICT Technician
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!