Use Figure 6.10 to trace the path of the packets that are sent as a result of the ping command (e.g., ARP Request and Reply, ICMP Echo Request and Reply). Justify your answer with the saved data from Step 10.

What will be an ideal response?


By enabling STP on the bridges, loops have been eliminated. Once the spanning tree is constructed
PC1 pings PC4. The steps involved are:
1. PC1 sends an ARP request. This request is received by both PC2 and router 1. However router 1 does not forward the packets as its portB is in blocked state.
2. PC2 forwards the packet along portB. The ARP request is forwarded by both Router 2 and Router 3.
However when the request reaches Router 4 from router 2, it is no longer forwarded as portA on
router 4 is in blocked state.
a. Indicated by absence of response packets captured at PC3
i. 33 35.815833 00:50:bf:75:16:95 ff:ff:ff:ff:ff:ff ARP Who has 10.0.1.41?
Tell 10.0.1.11

3. Router 3 forwards the request along its portA and the message is received by PC4.
4. PC4 sends the response which is forwarded along the same path to reach PC1.
5. The same is the case for the exchange of ping echo messages.
The path taken by the ARP request packet:- PC1 ? PC2 ? Router3 ? PC4
The same path is followed by ARP reply and ICMP Echo Request and Reply.

Computer Science & Information Technology

You might also like to view...

A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with battery backup power during a power outage.

A. UBS B. UPS C. USP D. USB

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following describes juice jacking?

A. When an overvoltage causes a temporary interruption to a device's power supply. B. A process to remove moisture and liquid from a device after it has inadvertently been submerged in water. C. When a hacker steals data from or transfers malware to a device via a USB cable at a charging station. D. When the activities of one user on a Wi-Fi network causes other users' Internet speed to be affected.

Computer Science & Information Technology

Which type of attack is a form of social engineering?

A. Denial of Service B. Smurf attack C. Phishing D. Zombie

Computer Science & Information Technology

You can use the ____________________ commands (Rotate, Scale, Skew, Distort, Perspective, and Warp) with any of the resizing pointers to distort a bounding box using an angle other than 90°.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology