Address resolution protocol (arp), Computer Network Security

ADDRESS RESOLUTION PROTOCOL (ARP)

TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).

 

 The ARP standard describes two basic message categories:

  • Request
  • Response

REQUEST:

  This occupies and IP address and requests the corresponding machine address.

RESPONSE:

  This occupies both the IP address sent in the request and the machine address.

ARP MESSAGE DELIVERY:

 ARP data packet delivery is given in the figure below.

 

167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States






Your posts are moderated
Related Questions
Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i