Address resolution , Computer Network Security

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another device on the similar physical network. A computer never replace the address of a computer that attaches to a server.

In the diagram below a simple Internet with routers R2 & R1 connecting three physical networks is given each network has two host devices attached.

 

841_Address resolution Protocol (ARP).png

 

In the diagram, A resulted protocol address for B for protocol data packet from an application on A transmit to a program on B. A does not find a protocol address for F. Through the Internet layer, A sends to F by routing through R2 and R1. A find R1 hardware address.

 Network layer on A passes packet having resultant protocol address F for delivery to R1.

 

Posted Date: 8/1/2012 6:40:07 AM | Location : United States







Related Discussions:- Address resolution , Assignment Help, Ask Question on Address resolution , Get Answer, Expert's Help, Address resolution Discussions

Write discussion on Address resolution
Your posts are moderated
Related Questions
(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm