Suppose a router has built up the routing table shown in Table 3.19. The router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers R2, R3, or R4. Assume the router does the longest prefix match. Describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.171.92 (b) 128.96.167.151 (c) 128.96.163.151 (d) 128 96 160 192

Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter6: Security Technology: Access Controls, Firewalls, And Vpns
Section: Chapter Questions
Problem 2RQ
icon
Related questions
Question
Suppose a router has built up the routing table shown in
Table 3.19. The router can deliver packets directly over interfaces 0
and 1, or it can forward packets to routers R2, R3, or R4. Assume
the router does the longest prefix match. Describe what the router
does with a packet addressed to each of the following destinations:
(a) 128.96.171.92
(b) 128.96.167.151
(c) 128.96.163.151
(d) 128.96.169.192
(e) 128.96.165.121
Table 3.19 Routing Table for Exercise 56
SubnetNumber
128.96.170.0
128.96.168.0
128.96.166.0
128.96.164.0
(default)
SubnetMask
255.255.254.0
255.255.254.0
255.255.254.0
255.255.252.0
NextHop
Interface 0
Interface 1
R2
R3
R4
Transcribed Image Text:Suppose a router has built up the routing table shown in Table 3.19. The router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers R2, R3, or R4. Assume the router does the longest prefix match. Describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.171.92 (b) 128.96.167.151 (c) 128.96.163.151 (d) 128.96.169.192 (e) 128.96.165.121 Table 3.19 Routing Table for Exercise 56 SubnetNumber 128.96.170.0 128.96.168.0 128.96.166.0 128.96.164.0 (default) SubnetMask 255.255.254.0 255.255.254.0 255.255.254.0 255.255.252.0 NextHop Interface 0 Interface 1 R2 R3 R4
Expert Solution
steps

Step by step

Solved in 3 steps with 3 images

Blurred answer
Knowledge Booster
Hyperlinks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning