Address masks, Computer Network Security

ADDRESS MASKS

To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the ith entry in the table.

 

i.e. if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]

 

FORWARDING, DESTINATION ADDRESS AND NEXT-HOP:

 

 Receiver address in IP datagram is usually ultimate destination. Router looks up next-hop address and transfer datagram. Network interface layer operates on two parameters:

 

  • IP datagram
  • Next-hop address

 

Next-hop address never sees in IP datagram.

BEST-EFFORT DELIVERY:

 IP gives service equivalent to LAN. It does not guarantee to save duplicate packets, out-of-order delivery or delayed, corruption of datagram loss and data. Transport layer gives reliable delivery. Network layer - IP - can checked and report errors without actually solving them. It focuses on packet delivery. Application layer is not interested in differentiating among delivery causes at intermediate routers.

 

Posted Date: 8/1/2012 8:00:52 AM | Location : United States







Related Discussions:- Address masks, Assignment Help, Ask Question on Address masks, Get Answer, Expert's Help, Address masks Discussions

Write discussion on Address masks
Your posts are moderated
Related Questions
FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Describe the process a proposed standard goes through to become an RFC

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI