Address resolution techniques, Computer Network Security

Address resolution algorithms may be grouped into three basic types:

  • Table lookup
  • Closed-form computation
  • Message Exchange

1. TABLE LOOKUP:

In Table Lookup, mapping or binding is stored in a table in storage, which the software searches when it requires to resolve an address.

2. CLOSED-FORM COMPUTATION:

In Closed-form calculation, the protocol address given to a computer is selected carefully so that computer's hardware address may be calculated from the protocol address using basic arithmetic and Boolean operations.

3. MESSAGE EXCHANGE:

Computers interchange messages across a network to give an address. One computer transmit a message that requests an address binding (translation) and another computer transmit a reply that has the requested information.

 

 

Posted Date: 8/1/2012 6:43:04 AM | Location : United States







Related Discussions:- Address resolution techniques, Assignment Help, Ask Question on Address resolution techniques, Get Answer, Expert's Help, Address resolution techniques Discussions

Write discussion on Address resolution techniques
Your posts are moderated
Related Questions
To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

CRC in matlab

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order