Explain the changes to the ip stack, Computer Networking

Assignment Help:

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:

C:\>ipconfig

Windows IP Configuration

Ethernet adapter El90x1:

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 169.254.55.187

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob's PC had already begun working properly. Bob then obtained the following information from his workstation.

C:\>ipconfig

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 139.100.110.50

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. : 139.100.110.1

a. Explain in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you explain the changes to the IP stack?


Related Discussions:- Explain the changes to the ip stack

What is bens network, Q. What is Bens Network? It's a non-blocking netw...

Q. What is Bens Network? It's a non-blocking network. It's a special type of Clos network where first and last stage consists of  2×2 switches (for n input  and m output networ

Topology-tcp and udp sources, To relieve some programming burden, project 5...

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is you

Define pptp (point-to-point tunneling protocol), Can you define PPTP (Point...

Can you define PPTP (Point-to-Point Tunneling Protocol)?

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

What are the compression protocols for ppp, The compression protocols for P...

The compression protocols for PPP are:- A. Stac   B. Predictor

eigrp finds its successor and feasible successor, Describe how EIGRP finds...

Describe how EIGRP finds its successor and feasible successor?

Failure reporting and analysis, 1. A systematic study of failures will help...

1. A systematic study of failures will help in identifying areas that may cause :   i.  Loss of adjacent parts/ equipment/ whole equipment. ii.  Loss of production and rev

Research, I have a research in this topic " Mitigating DoS Attacks against ...

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd