Address resolution , Computer Network Security

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another device on the similar physical network. A computer never replace the address of a computer that attaches to a server.

In the diagram below a simple Internet with routers R2 & R1 connecting three physical networks is given each network has two host devices attached.

 

841_Address resolution Protocol (ARP).png

 

In the diagram, A resulted protocol address for B for protocol data packet from an application on A transmit to a program on B. A does not find a protocol address for F. Through the Internet layer, A sends to F by routing through R2 and R1. A find R1 hardware address.

 Network layer on A passes packet having resultant protocol address F for delivery to R1.

 

Posted Date: 8/1/2012 6:40:07 AM | Location : United States







Related Discussions:- Address resolution , Assignment Help, Ask Question on Address resolution , Get Answer, Expert's Help, Address resolution Discussions

Write discussion on Address resolution
Your posts are moderated
Related Questions
what is computer network?

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo