Address resolution with closed-form computation, Computer Network Security

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION

For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible. A resolver is used to compute a mathematical operation that maps an IP address to a machine address.

 

 When a device connects to a network that uses configurable address, the local network administrator must select a hardware address as well as an IP address. The two values can be selected to create address resolution trivial. Let's take an example.

EXAMPLE:

 

 Consider a configurable network number:

220.123.5.0/22

The IP address of first receiver = 220.123.5.1

Hardware Address = 1

The IP address of second receiver = 220.123.5.2

Hardware Address = 2

The IP address of router = 220.123.5.102

Hardware Address = 102

A simple Boolean 'and' operation can calculate the computer's hardware address.

Hardware Address = ip_address & 0xff

 

Posted Date: 8/1/2012 6:50:00 AM | Location : United States







Related Discussions:- Address resolution with closed-form computation, Assignment Help, Ask Question on Address resolution with closed-form computation, Get Answer, Expert's Help, Address resolution with closed-form computation Discussions

Write discussion on Address resolution with closed-form computation
Your posts are moderated
Related Questions
(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

which is best algorithm