Address resolution , Computer Network Security

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another device on the similar physical network. A computer never replace the address of a computer that attaches to a server.

In the diagram below a simple Internet with routers R2 & R1 connecting three physical networks is given each network has two host devices attached.

 

841_Address resolution Protocol (ARP).png

 

In the diagram, A resulted protocol address for B for protocol data packet from an application on A transmit to a program on B. A does not find a protocol address for F. Through the Internet layer, A sends to F by routing through R2 and R1. A find R1 hardware address.

 Network layer on A passes packet having resultant protocol address F for delivery to R1.

 

Posted Date: 8/1/2012 6:40:07 AM | Location : United States







Related Discussions:- Address resolution , Assignment Help, Ask Question on Address resolution , Get Answer, Expert's Help, Address resolution Discussions

Write discussion on Address resolution
Your posts are moderated
Related Questions
QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me


Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The