Address resolution , Computer Network Security

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another device on the similar physical network. A computer never replace the address of a computer that attaches to a server.

In the diagram below a simple Internet with routers R2 & R1 connecting three physical networks is given each network has two host devices attached.

 

841_Address resolution Protocol (ARP).png

 

In the diagram, A resulted protocol address for B for protocol data packet from an application on A transmit to a program on B. A does not find a protocol address for F. Through the Internet layer, A sends to F by routing through R2 and R1. A find R1 hardware address.

 Network layer on A passes packet having resultant protocol address F for delivery to R1.

 

Posted Date: 8/1/2012 6:40:07 AM | Location : United States







Related Discussions:- Address resolution , Assignment Help, Ask Question on Address resolution , Get Answer, Expert's Help, Address resolution Discussions

Write discussion on Address resolution
Your posts are moderated
Related Questions
Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Normal 0 false false false EN-US X-NONE X-NONE

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio