1: in the figure below: B7-B3-A4-F7-DF-63 128.119.40.122 (1) 08-27-7C-7F-09-48 128.119.152.23 (2) B 21-44-8B-9C-C9-7F 128.119.152.173 D3-F3-DO-2C-53-17 128.119.25,207...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
1: in the figure below: B7-B3-A4-F7-DF-63 128.119.40.122 (1) 08-27-7C-7F-09-48 128.119.152.23 (2) B 21-44-8B-9C-C9-7F 128.119.152.173 D3-F3-DO-2C-53-17 128.119.25,207 D2-A2-AD-82-B8-9E 128.119.40.216 B8-96-00-BE-1C-C5 128.119.25.117 www. C 7C-D5-00-C8-26-86 128.119.25.205 - if host B is sending a packet to host D, show the MAC address for the source and destination at point 3, 4 & 5 Point 3 4 5 Source MAC address Destination MAC address - if host C is sending a packet to host A, show the MAC address for the source and destination at point 6, 4, 2 & 1 Source MAC address Point 6 2 1 Destination MAC address Q2: media access control method used by wireless communications is CSMA/CA, while media access control method used by wired communications is CSMA/CD. Why? Q1: covert the following decimal Ipv4 addresses to binary 192.168.122.37 10.200.202.132 172.23.127.87 Q2: covert the following binary Ipv4 addresses to decimal 11000000.10101000.00111100.01001101 00001010.11000110.10000100.110111001 10101100.00010100.11110001.00001110 Q3: covert the following Hexadecimal Ipv6 addresses to binary 2001:0DB8:AC12:AAF2:55AA:6B6E:2318:FF74 2001:0DB8 ACAD:00A:0000:0000:0000:EC69 1: in the figure below: B7-B3-A4-F7-DF-63 128.119.40.122 (1) 08-27-7C-7F-09-48 128.119.152.23 (2) B 21-44-8B-9C-C9-7F 128.119.152.173 D3-F3-DO-2C-53-17 128.119.25,207 D2-A2-AD-82-B8-9E 128.119.40.216 B8-96-00-BE-1C-C5 128.119.25.117 www. C 7C-D5-00-C8-26-86 128.119.25.205 - if host B is sending a packet to host D, show the MAC address for the source and destination at point 3, 4 & 5 Point 3 4 5 Source MAC address Destination MAC address - if host C is sending a packet to host A, show the MAC address for the source and destination at point 6, 4, 2 & 1 Source MAC address Point 6 2 1 Destination MAC address Q2: media access control method used by wireless communications is CSMA/CA, while media access control method used by wired communications is CSMA/CD. Why? Q1: covert the following decimal Ipv4 addresses to binary 192.168.122.37 10.200.202.132 172.23.127.87 Q2: covert the following binary Ipv4 addresses to decimal 11000000.10101000.00111100.01001101 00001010.11000110.10000100.110111001 10101100.00010100.11110001.00001110 Q3: covert the following Hexadecimal Ipv6 addresses to binary 2001:0DB8:AC12:AAF2:55AA:6B6E:2318:FF74 2001:0DB8 ACAD:00A:0000:0000:0000:EC69
Expert Answer:
Answer rating: 100% (QA)
The images you have provided pertain to computer networking and it appears there are multiple questions regarding MAC Media Access Control addresses and the conversion of IP addresses between decimal ... View the full answer
Related Book For
Operations Management Processes And Supply Chains
ISBN: 9781292409863
13th Global Edition
Authors: Lee Krajewski, Naresh Malhotra, Larry Ritzman
Posted Date:
Students also viewed these computer network questions
-
In Section 8.6. 1, it is shown that without sequence numbers, Trudy (a woman- in-the middle) can wreak havoc in an SSL session by interchanging TCP segments. Can Trudy do something similar by...
-
This problem concerns the Galois field GF (2) with the irreducible polynomial P(x) = x+x+x+x+1. Let A(x) = x+x and B(x) = x+x+1. (a) How many elements are in the field GF (2)? (b) What is the maximum...
-
Adventure Rafting runs rafts on the Colorado River. It has eight rafts in its inventory. The demand for rafts during the busy months of June and July has been either 4, 5, 6, 7 or 8, with...
-
What are the different relays that employed for protection of apparatus and transmission lines?
-
1. How has Hubway incorporated core e-business concepts in its operations? 2. How has Hubway used social media platforms like Facebooke and Twiiter to its advantage?
-
Bank of New York would like to determine if the average checking account balance for younger customers (under 40 years) is different from the average checking account balance for older customers (40...
-
Use of mean and standard deviation The Oyster Pearl Restaurant is popular with sea- food fanciers who like its large variety of oyster dishes. The oysters are a high-profit item but sales fluctuate...
-
Use the data in Exercise to prepare an income statement and the current assets section of the balance sheet for each company. Ignore income taxes. In Exercise Using the following data, compute (1)...
-
ent eBook Show Me How Entry for Uncollectible Accounts Performance Bike Co . has determined that the proper balance for the Allowance for Doubtful Accounts at December 3 1 is $ 3 7 2 , 5 0 0 . Assume...
-
P12-11A The comparative balance sheets for Spicer Company as of December 31 are presented below. SPICER COMPANY Comparative Balance Sheets December 31 Assets 2017 2016 $ 68,000 50,000 151,450 15,280...
-
Was it ethical for sidells employers to consult sidells emails to his attorneys in his personal yahoo! Mail account? Support your answer. Scott Sidell, the former chief executive officer of...
-
What is a verified pleading?
-
What three elements must be included in the caption of a complaint?
-
How is the California court system structured?
-
What is civil litigation and how does it differ from other types of litigation?
-
What ethical standards paralegals must follow?
-
Write the coordinates of the vertices after a translation. 5) eflect over x = -4 6) (x, y) (y, x) reflect over y = x 104 104 8 6 8 6 4 T (-7,-3)T(. ) 4 V 2 U (-6, 0) U() 2 V(-7, 3) V ( ) -10 8 -6 -4...
-
Archangel Corporation prepared the following variance report. Instructions Fill in the appropriate amounts or letters for the question marks in the report. ARCHANGEL CORPORATION Variance...
-
Risk is a measure of the probability and consequence of not reaching a defined project goal. Assume you are the project manager for a construction project. Identify the major risks to the projects...
-
Sam's Pet Hotel operates 52 weeks per year, 6 days per week, and uses a continuous review inventory system. It purchases kitty litter for $11.70 per bag. The following information is available about...
-
Tax Prep Advisers, Inc., has forecasted the following staffing requirements for tax preparation associates over the next 12 months. Management would like three alternative staffing plans to be...
-
What are the main tasks of the board of directors? R1
-
Identify four ways in which the independence of an auditor of a large listed company may be strengthened. E1
-
Why have institutional shareholders become more active in corporate governance issues in recent years? R4
Study smarter with the SolutionInn App