Address resolution protocol (arp), Computer Network Security

ADDRESS RESOLUTION PROTOCOL (ARP)

TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarantee that all devices agree on the same format and meaning of message used to get addresses. The TCP/IP protocol suite adds an Address Resolution Protocol (ARP).

 

 The ARP standard describes two basic message categories:

  • Request
  • Response

REQUEST:

  This occupies and IP address and requests the corresponding machine address.

RESPONSE:

  This occupies both the IP address sent in the request and the machine address.

ARP MESSAGE DELIVERY:

 ARP data packet delivery is given in the figure below.

 

167_Adress Resulution Protocol (ARP).png

Posted Date: 8/1/2012 6:56:20 AM | Location : United States







Related Discussions:- Address resolution protocol (arp), Assignment Help, Ask Question on Address resolution protocol (arp), Get Answer, Expert's Help, Address resolution protocol (arp) Discussions

Write discussion on Address resolution protocol (arp)
Your posts are moderated
Related Questions
Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a


(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Discuss how developers should apply the following countermeasures to improve the security of their code:

CRC in matlab

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio