Address masks, Computer Network Security

ADDRESS MASKS

To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the ith entry in the table.

 

i.e. if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]

 

FORWARDING, DESTINATION ADDRESS AND NEXT-HOP:

 

 Receiver address in IP datagram is usually ultimate destination. Router looks up next-hop address and transfer datagram. Network interface layer operates on two parameters:

 

  • IP datagram
  • Next-hop address

 

Next-hop address never sees in IP datagram.

BEST-EFFORT DELIVERY:

 IP gives service equivalent to LAN. It does not guarantee to save duplicate packets, out-of-order delivery or delayed, corruption of datagram loss and data. Transport layer gives reliable delivery. Network layer - IP - can checked and report errors without actually solving them. It focuses on packet delivery. Application layer is not interested in differentiating among delivery causes at intermediate routers.

 

Posted Date: 8/1/2012 8:00:52 AM | Location : United States







Related Discussions:- Address masks, Assignment Help, Ask Question on Address masks, Get Answer, Expert's Help, Address masks Discussions

Write discussion on Address masks
Your posts are moderated
Related Questions
Let me know the details of protocol tcp/ip

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t