6.4-9 Network- and Link-layer addressing: an end-to-end-scenario (2c). Consider the network shown below. The IP and MAC addresses are shown for hosts A, B, C and D, as well as for the router's interfaces. Consider an IP datagram being sent from node A to node C. Match the source/destination network- or link-layer address at the location (6) by choosing a value from the pulldown list. (Note: You can find more examples of problems similar to this here B 77-34-F1-EF-14-72 128.119.97.18 (1) What is the source MAC address on the frame at point (4)? What is the source IP address of the datagram at point (4)? 68-01-BC-58-AF-24 128,119,50,107 B (2) What is the destination IP address of the datagram at point (4)? (3) CC-A5-81-08-AE-33 128.119.97.194 What is the destination MAC address on the 128.119.97.18 frame at point (4)? 49-FA-B0-3C-E2-7C 128.119.50.60 72-9E-4A-31-9C-42 128.119.240.15 (4) 72-9E-4A-31-9C-42 [Choose ] CC-A5-81-0B-AE-33 4C-90-AA-74-06-1F 128.119.240.52 77-34-F1-EF-14-72 72-9E-4A-31-9C-42 128.119.97.18 (6) (5) C D5-40-EE-9A-73-05 128.119.240.116 The MAC address of the switch immediately left of location (6). 4C-9D-AA-74-D6-1F 128.119.97.194 128.119.240.52 128.119.240.15

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

please answer the two q

6.4-9 Network- and Link-layer addressing: an end-to-end-scenario (2c). Consider the network
shown below. The IP and MAC addresses are shown for hosts A, B, C and D, as well as for the
router's interfaces. Consider an IP datagram being sent from node A to node C. Match the
source/destination network- or link-layer address at the location (6) by choosing a value from the
pulldown list. (Note: You can find more examples of problems similar to this here B.]
77-34-F1-EF-14-72
128.119.97.18
(1)
What is the source MAC address on the
frame at point (4)?
What is the source IP address of the
datagram at point (4)?
68-01-BC-58-AF-24
128,119,50, 107
(2)
What is the destination MAC address on the
frame at point (4)?
What is the destination IP address of the
datagram at point (4)?
CC-A5-81-0B-AE-33
128.119.97.194
(3)
49-FA-B0-3C-E2-7C
128.119.50.60
72-9E-4A-31-9C-42
128.119.240.15
72-9E-4A-31-9C-42
[Choose ]
CC-A5-81-0B-AE-33
4C-90-AA-74-D6-1F
128.119.240.52
77-34-F1-EF-14-72
72-9E-4A-31-9C-42
128.119.97.18
(6)
(5)
C
D
D5-A0-EE-9A-73-D5
128.119.240.116
128.119.97.18
The MAC address of the switch immediately left of location (6).
4C-9D-AA-74-D6-1F
128.119.97.194
128.119.240.52
128.119.240.15
Transcribed Image Text:6.4-9 Network- and Link-layer addressing: an end-to-end-scenario (2c). Consider the network shown below. The IP and MAC addresses are shown for hosts A, B, C and D, as well as for the router's interfaces. Consider an IP datagram being sent from node A to node C. Match the source/destination network- or link-layer address at the location (6) by choosing a value from the pulldown list. (Note: You can find more examples of problems similar to this here B.] 77-34-F1-EF-14-72 128.119.97.18 (1) What is the source MAC address on the frame at point (4)? What is the source IP address of the datagram at point (4)? 68-01-BC-58-AF-24 128,119,50, 107 (2) What is the destination MAC address on the frame at point (4)? What is the destination IP address of the datagram at point (4)? CC-A5-81-0B-AE-33 128.119.97.194 (3) 49-FA-B0-3C-E2-7C 128.119.50.60 72-9E-4A-31-9C-42 128.119.240.15 72-9E-4A-31-9C-42 [Choose ] CC-A5-81-0B-AE-33 4C-90-AA-74-D6-1F 128.119.240.52 77-34-F1-EF-14-72 72-9E-4A-31-9C-42 128.119.97.18 (6) (5) C D D5-A0-EE-9A-73-D5 128.119.240.116 128.119.97.18 The MAC address of the switch immediately left of location (6). 4C-9D-AA-74-D6-1F 128.119.97.194 128.119.240.52 128.119.240.15
6.3-4. Multiple Access protocols (d). Consider the figure below, which shows the arrival of 6
messages for transmission at different multiple access wireless nodes at times t = 0.3, 1.7, 1.8, 2.5,
4.2, 4.6. Each transmission requires exactly one time unit.
t=0.0
0 1
r
U
U
5
n
6
st
For the CSMA/CD protocol (with collision detection), indicate which packets are successfully
transmitted. You should assume that it takes .2 time units for a signal to propagate from one node to
each of the other nodes. You can assume that if a packet experiences a collision or senses the
channel busy and that that node will not attempt a retransmission of that packet until sometime
after t=5. If a node senses a collision, it stops transmitting immediately (although it will still take .2
time units for the last transmitted bit to propagate to all other nodes). Hint: consider propagation
times carefully here. (Note: You can find more examples of problems similar to this here B.)
4
3
1
2
t=1.0
23
t=2.0
t=3.0
5
t=4.0
6
t=5.0
Transcribed Image Text:6.3-4. Multiple Access protocols (d). Consider the figure below, which shows the arrival of 6 messages for transmission at different multiple access wireless nodes at times t = 0.3, 1.7, 1.8, 2.5, 4.2, 4.6. Each transmission requires exactly one time unit. t=0.0 0 1 r U U 5 n 6 st For the CSMA/CD protocol (with collision detection), indicate which packets are successfully transmitted. You should assume that it takes .2 time units for a signal to propagate from one node to each of the other nodes. You can assume that if a packet experiences a collision or senses the channel busy and that that node will not attempt a retransmission of that packet until sometime after t=5. If a node senses a collision, it stops transmitting immediately (although it will still take .2 time units for the last transmitted bit to propagate to all other nodes). Hint: consider propagation times carefully here. (Note: You can find more examples of problems similar to this here B.) 4 3 1 2 t=1.0 23 t=2.0 t=3.0 5 t=4.0 6 t=5.0
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY