Explain the changes to the ip stack, Computer Networking

Assignment Help:

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:

C:\>ipconfig

Windows IP Configuration

Ethernet adapter El90x1:

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 169.254.55.187

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob's PC had already begun working properly. Bob then obtained the following information from his workstation.

C:\>ipconfig

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 139.100.110.50

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. : 139.100.110.1

a. Explain in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you explain the changes to the IP stack?


Related Discussions:- Explain the changes to the ip stack

What is mesh topology, What is mesh topology Mesh topology is a setup w...

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

Benefits of building up a well-designed intranet, Benefits of Building up a...

Benefits of Building up a well-designed Intranet Building up a well-designed Intranet can help the companies in the following activities that would improve their overall perfor

Dns - server attacks, DNS - Server Attacks It’s not so easy to list al...

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

User server interaction - application layer , User Server Interaction ...

User Server Interaction Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Calculate the total latency, a) Consider that a host is sending a frame of ...

a) Consider that a host is sending a frame of 1200 bytes to another host found 20 Kilometers away. (Assume that switching delay is negligible) i) Calculate the total latency (

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Ip, what is dce

what is dce

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd