LINK LAYER (AND NETWORK LAYER) ADDRESSING AND FORWARDING Consider the figure below. The IP and MAC addresses are shown for nodes A, B, C and D, as well as for the router's interfaces. 1F-20-5D-67-62-8E 128.119.134.90 (1) QUESTION 1 OF 5 Answer What is the source mac address at point 5? 6A-A4-2E-AB-94-D3 128,119,81.211 Consider an IP datagram being sent from node D to node C. (2) FA-7C-90-45-8C-1D 128.119.134.239 (3) 72-F0-35-56-CA-42 128,119.81.191 47-FF-04-D4-B3-27 128,119,20,251 CC-CF-5A-C7-02-03 128.119.20.75 5E-C8-B0-3D-5D-DE 128.119.20.91

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter13: Internet And Distributed Application Services
Section: Chapter Questions
Problem 15VE
icon
Related questions
Question
LINK LAYER (AND NETWORK LAYER) ADDRESSING AND FORWARDING
Consider the figure below. The IP and MAC addresses are shown for nodes A, B, C and D, as well as for the router's interfaces.
1F-2C-5D-67-62-8E
128.119.134.90
QUESTION 1 OF 5
What is the source mac address at point 5?
Answer
6A-A4-2E-AB-94-D3
128.119.81.211
Consider an IP datagram being sent from node D to node C.
(2)
B
FA-7C-90-45-8C-1D
128.119,134,239
(3)
72-F0-35-56-CA-42
128.119.81.191
(4)
47-FF-04-D4-B3-27
128.119.20.251
CC-CF-5A-C7-02-03
128.119.20.75
(6)
(5)
D
5E-C8-B0-3D-5D-DE
128.119.20.91
Transcribed Image Text:LINK LAYER (AND NETWORK LAYER) ADDRESSING AND FORWARDING Consider the figure below. The IP and MAC addresses are shown for nodes A, B, C and D, as well as for the router's interfaces. 1F-2C-5D-67-62-8E 128.119.134.90 QUESTION 1 OF 5 What is the source mac address at point 5? Answer 6A-A4-2E-AB-94-D3 128.119.81.211 Consider an IP datagram being sent from node D to node C. (2) B FA-7C-90-45-8C-1D 128.119,134,239 (3) 72-F0-35-56-CA-42 128.119.81.191 (4) 47-FF-04-D4-B3-27 128.119.20.251 CC-CF-5A-C7-02-03 128.119.20.75 (6) (5) D 5E-C8-B0-3D-5D-DE 128.119.20.91
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Risk Management
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning