Solved

CCNA Test: Function of ARP

Posted on 2009-04-13
2
396 Views
Last Modified: 2012-05-06
Hi,

1)This is related to the Sample at one of the CCNA's Prep Test
2)The information is as the followings:(Please see the attachment)
- A is a host Pc called " Pc A"
- B is a host Pc called "Pc B"
- SW#1 is a Switch called "SW#1"
- R#2 is a DSL Modem or Router called "R#2"
3) The Goal: a user at Pc A pings the R#2
4) At Pc A does the followings:
- Go to Command Prompt
- C:\arp -a
- The ouput exhibit:
* Interface: 192.168.1.95 .......0x2
* Internet Address: 192.168.1.254
* Physical address: 00-60-0f-2e-14-C6
* Type: dynamic
5) My questions: please explain it with your own wordings: i) The "192.168.1.95" is the IP address of Pc A?, ii) The "192.168.1.254" is the IP address of R#2?, iii) The "00-60-0f-2e-14-C6" is the MAC address of what interface, R#2?, iv) Could you explain briefly (from the first up to the end) the process when pc A start to ping the R#2?
6) Thank you

Tjie
0
Comment
Question by:tjie
2 Comments
 

Author Comment

by:tjie
ID: 24134042
Please see the attachment
ARP001.jpg
0
 
LVL 43

Accepted Solution

by:
JFrederick29 earned 500 total points
ID: 24134240
192.168.1.95 is PCA's IP Address and 192.168.1.254 is the router's ethernet interface  IP.

PCA sends an ARP broadcast request for 192.168.1.254 which is flooded out every switch port.  The router receives the ARP request and replies with its MAC address.  PCA then adds the ARP entry (IP to MAC mapping) to its ARP table.  PCA can then communicate with 192.168.1.254 without having to send further ARP requests until the entry ages out.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question