Bob has a host computer with an ip address of 100110024

Assignment Help Computer Networking
Reference no: EM13380050

Bob has a host computer with an IP address of 10.0.1.100/24 with a default gateway of 10. host network is connected to Steve's network which has an IP addressing scheme 192.168. 0.X/24

which has a default gateway of 192.168.0.1

a) On June 1, 2013, Bob pings the local IP address 10.0.1.200 from his host computer, Bob gets the following:

C:\ping 10.0.1.200

Request timed out.

Request timed out.

Request timed out.

Bob checks his network but makes no changes. Steve does some checking on his network, the only change Steve makes is to turn on a host device which has an IP address of 192.168.0.121/24 default gateway 192.168.0.1. No other change was made to either network. Bob attempts to ping 10.0.1.200 again - Bob now gets the following:

C:\ping 10.0 1.200

Reply from 10.0.1.200: bytes-32 time=l2ms TTL 64

Reply from 10.0.1.200: bytes=32 time=18ms TTL=64

Reply from 10.0.1.200: bytes=32 time=7ms TTL=64

Explain in detail what is occurring and why Bob now gets a reply. (10 points)

b) On June 10, 2013, Bob has no problem connecting to devices on Steve's network (everything appears to be working perfectly). When Bob tries to ping any device on Steve's network he gets "Request timed out". Explain what is going on.

Reference no: EM13380050

Questions Cloud

Many midsized firms are investing in erp system packages : many midsized firms are investing in erp system packages such as sap and peoplesoft.comment on what you think might be
You are a manager in a company that has a lot of in-house : you are a manager in a company that has a lot of in-house is expertise.what might be your key decision rules for when
Is there a place for ethics in iton march 15 2005 michael : is there a place for ethics in it?on march 15 2005 michael schrage published an article in cio magazine entitled ethics
What would you do in each case what would you want your : what would you do in each case? what would you want your employees to do?a fellow employee is being harassed at work
Bob has a host computer with an ip address of 100110024 : bob has a host computer with an ip address of 10.0.1.10024 with a default gateway of 10. host network is connected to
The instructor reserves the right to use the resources of : the instructor reserves the right to use the resources of turnitin.com to check for plagiarism in your writing
Virtual private databasesearching web specially oracle and : virtual private databasesearching web specially oracle and microsoft websites and via talking with any database
Evaluate the concept that it is becoming the new core of : evaluate the concept that it is becoming the new core of modern business. how might you justify or negate this
Choose one of the major areas of middleware graphics ai : choose one of the major areas of middleware graphics ai networking sound movie animation physics. research the major

Reviews

Write a Review

Computer Networking Questions & Answers

  Write a java application that allows the user to read

Write a java  application that  allows  the user  to  read,  validate, store,  display,  sort and search  the account number and balance for N bank customers.

  Networking beneficial to a professional in career field

How is networking beneficial to a professional in any career field?

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Explain sliding window error control system

In a sliding window error control system in which each byte is numbered, Station A sends a packet with bytes numbered 801 to 900. If the packet arrives with no errors, how does Station B respond?

  Question 1a sort out each of the following as a violation

question 1a sort out each of the following as a violation of privacy integrity and ease of use authenticity or some

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Find out which scripting language is supported by web server

As web developers, we must find out which scripting language is supported by the web server to understand what kind of rights and privileges we must take into account.

  Implementing filter in the firewall

Consider yourself as the network security technician. Your internetwork connects six buildings through fiber links. You have experienced the numerous attacks on your corporate Web server.

  Solution for real-time analytical processing diminishes

When merging transaction and analytical processing problem occurs. Real-time analytical processing diminishes performance of transaction processing. Find the solution to this problem which many companies use?

  Action-connected to switch refuse to communicate network

PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?

  Global finance inc gfi is a financial company that manages

global finance inc. gfi is a financial company that manages thousands of accounts across canada the united states and

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd