Address resolution protocol (arp), Computer Network Security


TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).


 The ARP standard describes two basic message categories:

  • Request
  • Response


  This occupies and IP address and requests the corresponding machine address.


  This occupies both the IP address sent in the request and the machine address.


 ARP data packet delivery is given in the figure below.


167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States

Related Discussions:- Address resolution protocol (arp), Assignment Help, Ask Question on Address resolution protocol (arp), Get Answer, Expert's Help, Address resolution protocol (arp) Discussions

Write discussion on Address resolution protocol (arp)
Your posts are moderated
Related Questions
Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

CRC in matlab

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit