Judy has just sent a ping message from her computer to John's computer using John's computer's IP address to verify that she has connectivity. List the steps that the message takes to get to the other computer and what layer of the network communication process each step relates to.
What will be an ideal response?
First, Judy opens a command prompt and types the command "ping 192.168.0.10". This is the user application layer. The next step is for Judy's computer to create the ping message to send to John's computer. This is the network software layer. The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. At this step, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. Both of these steps are part of the network protocol layer. Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium. This is the network interface step.
You might also like to view...
The original IBM Token Ring Network operated at
a. 4 Mbps b. 10 Mbps c. 16 Mbps d. 100 Mbps
Critical Thinking Questions Case 11-1 ? You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that a(n) ______ check verifies that a required field contains data.
A. integration B. completeness C. processing D. entirety