Hi all, can anyone tell me how the frame changes when it travels through the network, Ie if a packet needs to get to another subnet, does it arp for the default gateway, and does the destination address etc change in the header as it transverses through the network ?
1) It compares Host B's address with it's subnet mask and determines it is on a different subnet.
2) It then consults it's routing table. Usually hosts only have default gateways. Assuming this is the case Host A then
3) Host A checks arp table. if not there it arps out for default gateway, in this case R1.
4) R1 replies with it's mac address.
5) Host sends out a packet - source IP Host A, destination IP Host B. Source mac address Host A, destination Mac address r1 default gateway.
6) r1 receives packet and goes through pretty much the same process. Realising it has no directly connected interfaces it looks in routing table, finds a route to R2 and the sends packet out to R2. Source and destination IP have not changed. Source Mac address R1 outgoing interface to r2, destination nmac address incoming interface of r2.
7) r2 goes the same process, realises it has a directly coinnected interface and arps out (if not in arp table) for Host B. Sends out packet. Source and dest IP haven't changed again, source mac outgoing interface of r2, destination mac Host B
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...