Address resolution techniques, Computer Network Security

Address resolution algorithms may be grouped into three basic types:

  • Table lookup
  • Closed-form computation
  • Message Exchange

1. TABLE LOOKUP:

In Table Lookup, mapping or binding is stored in a table in storage, which the software searches when it requires to resolve an address.

2. CLOSED-FORM COMPUTATION:

In Closed-form calculation, the protocol address given to a computer is selected carefully so that computer's hardware address may be calculated from the protocol address using basic arithmetic and Boolean operations.

3. MESSAGE EXCHANGE:

Computers interchange messages across a network to give an address. One computer transmit a message that requests an address binding (translation) and another computer transmit a reply that has the requested information.

 

 

Posted Date: 8/1/2012 6:43:04 AM | Location : United States







Related Discussions:- Address resolution techniques, Assignment Help, Ask Question on Address resolution techniques, Get Answer, Expert's Help, Address resolution techniques Discussions

Write discussion on Address resolution techniques
Your posts are moderated
Related Questions
QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

how to access tomcat by internet

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp