Address resolution with closed-form computation, Computer Network Security

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION

For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible. A resolver is used to compute a mathematical operation that maps an IP address to a machine address.

 

 When a device connects to a network that uses configurable address, the local network administrator must select a hardware address as well as an IP address. The two values can be selected to create address resolution trivial. Let's take an example.

EXAMPLE:

 

 Consider a configurable network number:

220.123.5.0/22

The IP address of first receiver = 220.123.5.1

Hardware Address = 1

The IP address of second receiver = 220.123.5.2

Hardware Address = 2

The IP address of router = 220.123.5.102

Hardware Address = 102

A simple Boolean 'and' operation can calculate the computer's hardware address.

Hardware Address = ip_address & 0xff

 

Posted Date: 8/1/2012 6:50:00 AM | Location : United States







Related Discussions:- Address resolution with closed-form computation, Assignment Help, Ask Question on Address resolution with closed-form computation, Get Answer, Expert's Help, Address resolution with closed-form computation Discussions

Write discussion on Address resolution with closed-form computation
Your posts are moderated
Related Questions
Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

What is the concept of topology?

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across