Address resolution with closed-form computation, Computer Network Security

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION

For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible. A resolver is used to compute a mathematical operation that maps an IP address to a machine address.

 

 When a device connects to a network that uses configurable address, the local network administrator must select a hardware address as well as an IP address. The two values can be selected to create address resolution trivial. Let's take an example.

EXAMPLE:

 

 Consider a configurable network number:

220.123.5.0/22

The IP address of first receiver = 220.123.5.1

Hardware Address = 1

The IP address of second receiver = 220.123.5.2

Hardware Address = 2

The IP address of router = 220.123.5.102

Hardware Address = 102

A simple Boolean 'and' operation can calculate the computer's hardware address.

Hardware Address = ip_address & 0xff

 

Posted Date: 8/1/2012 6:50:00 AM | Location : United States







Related Discussions:- Address resolution with closed-form computation, Assignment Help, Ask Question on Address resolution with closed-form computation, Get Answer, Expert's Help, Address resolution with closed-form computation Discussions

Write discussion on Address resolution with closed-form computation
Your posts are moderated
Related Questions
TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???