Address resolution protocol (arp), Computer Network Security

ADDRESS RESOLUTION PROTOCOL (ARP)

TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).

 

 The ARP standard describes two basic message categories:

  • Request
  • Response

REQUEST:

  This occupies and IP address and requests the corresponding machine address.

RESPONSE:

  This occupies both the IP address sent in the request and the machine address.

ARP MESSAGE DELIVERY:

 ARP data packet delivery is given in the figure below.

 

167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States







Related Discussions:- Address resolution protocol (arp), Assignment Help, Ask Question on Address resolution protocol (arp), Get Answer, Expert's Help, Address resolution protocol (arp) Discussions

Write discussion on Address resolution protocol (arp)
Your posts are moderated
Related Questions
TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

discuss the merits and demerits of computers freezing

what are the participant of marketing channal?

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

how can you enter the ASVAB practice test on line?

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)


Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and