Include the output of the traceroute command from Step 4. Provide an explanation why PC2 does not appear in the output of the traceroute command in Step 5. Include the answers to the questions in Step 5.
? Observe that PC2 actually forwards the packets between PC1 and PC3.
? Does PC2 modify the source and destination MAC and IP addresses? What would be different if PC2 was configured as an IP router?
The traceroute program attempts to trace the route an IP packet would follow to some internet host by launching UDP probe packets with a small ttl (time to live) then listening for an ICMP “time exceeded” reply from a gateway. The probe packet received from PC1 is simply forwarded by PC2 on its other port and is received by PC3. PC3 then replies to this message. Thus we get the output as shown below.
```
Output of traceroute command
[root@PC1 labdata]# traceroute 10.0.1.31
traceroute to 10.0.1.31 (10.0.1.31), 30 hops max, 38 byte packets
1 10.0.1.31 (10.0.1.31) 3.493 ms 0.486 ms 0.404 ms
```
You might also like to view...
To add borders around the outside and inside edges of selected cells, click both Outline and Inside buttons in the _____ section in the Format Cells dialog box.
A. Border B. Presets C. Style D. Line
The ________ includes generic security capabilities that are independent of applications.
A) Network layer B) Device layer C) Management capabilities D) Security capabilities layer
When Access creates new tables in the Table Analyzer Wizard, it is looking for a way to maximize storage space in the analyzed table by storing data more efficiently
Indicate whether the statement is true or false
A(n) ________ stores the locations of all records for a given field to improve database performance when searching for records on that field
Fill in the blank(s) with correct word