Address resolution , Computer Network Security

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another device on the similar physical network. A computer never replace the address of a computer that attaches to a server.

In the diagram below a simple Internet with routers R2 & R1 connecting three physical networks is given each network has two host devices attached.

 

841_Address resolution Protocol (ARP).png

 

In the diagram, A resulted protocol address for B for protocol data packet from an application on A transmit to a program on B. A does not find a protocol address for F. Through the Internet layer, A sends to F by routing through R2 and R1. A find R1 hardware address.

 Network layer on A passes packet having resultant protocol address F for delivery to R1.

 

Posted Date: 8/1/2012 6:40:07 AM | Location : United States







Related Discussions:- Address resolution , Assignment Help, Ask Question on Address resolution , Get Answer, Expert's Help, Address resolution Discussions

Write discussion on Address resolution
Your posts are moderated
Related Questions
I need a help on how to write good assignment on the above topic

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

define .

how can you enter the ASVAB practice test on line?

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio