Address resolution techniques, Computer Network Security

Address resolution algorithms may be grouped into three basic types:

  • Table lookup
  • Closed-form computation
  • Message Exchange

1. TABLE LOOKUP:

In Table Lookup, mapping or binding is stored in a table in storage, which the software searches when it requires to resolve an address.

2. CLOSED-FORM COMPUTATION:

In Closed-form calculation, the protocol address given to a computer is selected carefully so that computer's hardware address may be calculated from the protocol address using basic arithmetic and Boolean operations.

3. MESSAGE EXCHANGE:

Computers interchange messages across a network to give an address. One computer transmit a message that requests an address binding (translation) and another computer transmit a reply that has the requested information.

 

 

Posted Date: 8/1/2012 6:43:04 AM | Location : United States







Related Discussions:- Address resolution techniques, Assignment Help, Ask Question on Address resolution techniques, Get Answer, Expert's Help, Address resolution techniques Discussions

Write discussion on Address resolution techniques
Your posts are moderated
Related Questions
SDES encryption and decryption

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth


Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis