Judy has just sent a ping message from her computer to John's computer using John's computer's IP address to verify that she has connectivity. List the steps that the message takes to get to the other computer and what layer of the network communication process each step relates to.
What will be an ideal response?
First, Judy opens a command prompt and types the command "ping 192.168.0.10". This is the user application layer. The next step is for Judy's computer to create the ping message to send to John's computer. This is the network software layer. The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. At this step, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. Both of these steps are part of the network protocol layer. Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium. This is the network interface step.
You might also like to view...
Which value for x would make the following condition true: (x >= 5) And (x<= 6)
(A) x is equal to 7 (B) x is equal to 5 (C) x is equal to 5.001 (D) B and C
The main program is often called a client program because:
A. a client (computer user) uses the main program B. a class is often a client of a main program C. a single class can be used by many different main programs, so the class can be thought of as a service, while the main programs that use the service are clients D. special programmers, called clientia, write them
As with other popular mobile operating systems, Android is designed for _______ processors.
Fill in the blank(s) with the appropriate word(s).
The event propertyevt.keyreturns the text of the key used in the event.
Answer the following statement true (T) or false (F)