Address resolution techniques, Computer Network Security

Address resolution algorithms may be grouped into three basic types:

  • Table lookup
  • Closed-form computation
  • Message Exchange


In Table Lookup, mapping or binding is stored in a table in storage, which the software searches when it requires to resolve an address.


In Closed-form calculation, the protocol address given to a computer is selected carefully so that computer's hardware address may be calculated from the protocol address using basic arithmetic and Boolean operations.


Computers interchange messages across a network to give an address. One computer transmit a message that requests an address binding (translation) and another computer transmit a reply that has the requested information.



Posted Date: 8/1/2012 6:43:04 AM | Location : United States

Related Discussions:- Address resolution techniques, Assignment Help, Ask Question on Address resolution techniques, Get Answer, Expert's Help, Address resolution techniques Discussions

Write discussion on Address resolution techniques
Your posts are moderated
Related Questions
QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li