Address resolution protocol (arp), Computer Network Security

ADDRESS RESOLUTION PROTOCOL (ARP)

TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).

 

 The ARP standard describes two basic message categories:

  • Request
  • Response

REQUEST:

  This occupies and IP address and requests the corresponding machine address.

RESPONSE:

  This occupies both the IP address sent in the request and the machine address.

ARP MESSAGE DELIVERY:

 ARP data packet delivery is given in the figure below.

 

167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States







Related Discussions:- Address resolution protocol (arp), Assignment Help, Ask Question on Address resolution protocol (arp), Get Answer, Expert's Help, Address resolution protocol (arp) Discussions

Write discussion on Address resolution protocol (arp)
Your posts are moderated
Related Questions
QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

How much would it cost to have a project completed by tomorrow night?

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th