Address resolution techniques, Computer Network Security

Address resolution algorithms may be grouped into three basic types:

  • Table lookup
  • Closed-form computation
  • Message Exchange

1. TABLE LOOKUP:

In Table Lookup, mapping or binding is stored in a table in storage, which the software searches when it requires to resolve an address.

2. CLOSED-FORM COMPUTATION:

In Closed-form calculation, the protocol address given to a computer is selected carefully so that computer's hardware address may be calculated from the protocol address using basic arithmetic and Boolean operations.

3. MESSAGE EXCHANGE:

Computers interchange messages across a network to give an address. One computer transmit a message that requests an address binding (translation) and another computer transmit a reply that has the requested information.

 

 

Posted Date: 8/1/2012 6:43:04 AM | Location : United States







Related Discussions:- Address resolution techniques, Assignment Help, Ask Question on Address resolution techniques, Get Answer, Expert's Help, Address resolution techniques Discussions

Write discussion on Address resolution techniques
Your posts are moderated
Related Questions
In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

how can i start thesis? Please mention so of examples?

implementing password policy in organisation

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

Need Assignemnt help in Information security assignemnt

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature