Address masks, Computer Network Security

ADDRESS MASKS

To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the ith entry in the table.

 

i.e. if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]

 

FORWARDING, DESTINATION ADDRESS AND NEXT-HOP:

 

 Receiver address in IP datagram is usually ultimate destination. Router looks up next-hop address and transfer datagram. Network interface layer operates on two parameters:

 

  • IP datagram
  • Next-hop address

 

Next-hop address never sees in IP datagram.

BEST-EFFORT DELIVERY:

 IP gives service equivalent to LAN. It does not guarantee to save duplicate packets, out-of-order delivery or delayed, corruption of datagram loss and data. Transport layer gives reliable delivery. Network layer - IP - can checked and report errors without actually solving them. It focuses on packet delivery. Application layer is not interested in differentiating among delivery causes at intermediate routers.

 

Posted Date: 8/1/2012 8:00:52 AM | Location : United States







Related Discussions:- Address masks, Assignment Help, Ask Question on Address masks, Get Answer, Expert's Help, Address masks Discussions

Write discussion on Address masks
Your posts are moderated
Related Questions
Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Normal 0 false false false EN-US X-NONE X-NONE



QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of


W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def