Address masks, Computer Network Security

ADDRESS MASKS

To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the ith entry in the table.

 

i.e. if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]

 

FORWARDING, DESTINATION ADDRESS AND NEXT-HOP:

 

 Receiver address in IP datagram is usually ultimate destination. Router looks up next-hop address and transfer datagram. Network interface layer operates on two parameters:

 

  • IP datagram
  • Next-hop address

 

Next-hop address never sees in IP datagram.

BEST-EFFORT DELIVERY:

 IP gives service equivalent to LAN. It does not guarantee to save duplicate packets, out-of-order delivery or delayed, corruption of datagram loss and data. Transport layer gives reliable delivery. Network layer - IP - can checked and report errors without actually solving them. It focuses on packet delivery. Application layer is not interested in differentiating among delivery causes at intermediate routers.

 

Posted Date: 8/1/2012 8:00:52 AM | Location : United States







Related Discussions:- Address masks, Assignment Help, Ask Question on Address masks, Get Answer, Expert's Help, Address masks Discussions

Write discussion on Address masks
Your posts are moderated
Related Questions
According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib