
The routing table search results in one of three path determinations:
• Directly connected network: If the destination IP address of the packet belongs to a device on a network that is directly connected to one of the interfaces of the router, that packet is forwarded directly to the destination device. This means that the destination IP address of the packet is a host address on the same network as the interface of the router.
• Remote network: If the destination IP address of the packet belongs to a remote network, then the packet is forwarded to another router. Remote networks can only be reached by forwarding packets to another router.
• No route determined: If the destination IP address of the packet does not belong to either a connected or remote network, the router determines if there is a Gateway of Last Resort available. A Gateway of Last Resort is set when a default route is configured on a router. If there is a default route, the packet is forwarded to the Gateway of Last Resort. If the router does not have a default route, then the packet is discarded. If the packet is discarded, the router sends an ICMP Unreachable message to the source IP address of the packet.
Titany answered the question on November 30, 2021 at 12:07
-
Differentiate between information security and network infrastructure security
(Solved)
Differentiate between information security and network infrastructure security
Date posted:
November 30, 2021
.
Answers (1)
-
A network design should meet several user needs. Outline four examples of such needs
(Solved)
A network design should meet several user needs. Outline four examples of such needs
Date posted:
November 30, 2021
.
Answers (1)
-
Explain three advantages of extranet networks in organizations
(Solved)
Explain three advantages of extranet networks in organizations
Date posted:
November 30, 2021
.
Answers (1)
-
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted:
November 30, 2021
.
Answers (1)
-
Explain two types of UTP cables used during network installation
(Solved)
Explain two types of UTP cables used during network installation
Date posted:
November 30, 2021
.
Answers (1)
-
Describe the email protocols
(Solved)
Describe the email protocols
Date posted:
November 30, 2021
.
Answers (1)
-
Outline four requirements for internet installation in organizations
(Solved)
Outline four requirements for internet installation in organizations
Date posted:
November 30, 2021
.
Answers (1)
-
Describe two categories of communication software
(Solved)
Describe two categories of communication software
Date posted:
November 30, 2021
.
Answers (1)
-
Outline uses of computer networks in an organization
(Solved)
Outline uses of computer networks in an organization
Date posted:
November 30, 2021
.
Answers (1)
-
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
(Solved)
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted:
November 30, 2021
.
Answers (1)
-
Outline two weaknesses of CSMA/CD
(Solved)
Outline two weaknesses of CSMA/CD
Date posted:
November 30, 2021
.
Answers (1)
-
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
(Solved)
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted:
November 30, 2021
.
Answers (1)
-
Difference between broadcast and collision domains as used in data transmission
(Solved)
Difference between broadcast and collision domains as used in data transmission
Date posted:
November 30, 2021
.
Answers (1)
-
Differentiate between pre-shared key and digital signature
(Solved)
Differentiate between pre-shared key and digital signature
Date posted:
November 30, 2021
.
Answers (1)
-
Explain uses of internet in business firms
(Solved)
Explain uses of internet in business firms
Date posted:
November 30, 2021
.
Answers (1)
-
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
(Solved)
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
Date posted:
November 30, 2021
.
Answers (1)
-
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
(Solved)
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
Date posted:
November 30, 2021
.
Answers (1)
-
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
(Solved)
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between multicast and broadcast IP addresses
(Solved)
Distinguish between multicast and broadcast IP addresses
Date posted:
November 30, 2021
.
Answers (1)