Address resolution protocol (arp), Computer Network Security

ADDRESS RESOLUTION PROTOCOL (ARP)

TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).

 

 The ARP standard describes two basic message categories:

  • Request
  • Response

REQUEST:

  This occupies and IP address and requests the corresponding machine address.

RESPONSE:

  This occupies both the IP address sent in the request and the machine address.

ARP MESSAGE DELIVERY:

 ARP data packet delivery is given in the figure below.

 

167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States






Your posts are moderated
Related Questions
Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M