Address masks, Computer Network Security

ADDRESS MASKS

To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the ith entry in the table.

 

i.e. if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]

 

FORWARDING, DESTINATION ADDRESS AND NEXT-HOP:

 

 Receiver address in IP datagram is usually ultimate destination. Router looks up next-hop address and transfer datagram. Network interface layer operates on two parameters:

 

  • IP datagram
  • Next-hop address

 

Next-hop address never sees in IP datagram.

BEST-EFFORT DELIVERY:

 IP gives service equivalent to LAN. It does not guarantee to save duplicate packets, out-of-order delivery or delayed, corruption of datagram loss and data. Transport layer gives reliable delivery. Network layer - IP - can checked and report errors without actually solving them. It focuses on packet delivery. Application layer is not interested in differentiating among delivery causes at intermediate routers.

 

Posted Date: 8/1/2012 8:00:52 AM | Location : United States







Related Discussions:- Address masks, Assignment Help, Ask Question on Address masks, Get Answer, Expert's Help, Address masks Discussions

Write discussion on Address masks
Your posts are moderated
Related Questions
Discuss how developers should apply the following countermeasures to improve the security of their code:

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes