Address resolution with closed-form computation, Computer Network Security

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION

For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible. A resolver is used to compute a mathematical operation that maps an IP address to a machine address.

 

 When a device connects to a network that uses configurable address, the local network administrator must select a hardware address as well as an IP address. The two values can be selected to create address resolution trivial. Let's take an example.

EXAMPLE:

 

 Consider a configurable network number:

220.123.5.0/22

The IP address of first receiver = 220.123.5.1

Hardware Address = 1

The IP address of second receiver = 220.123.5.2

Hardware Address = 2

The IP address of router = 220.123.5.102

Hardware Address = 102

A simple Boolean 'and' operation can calculate the computer's hardware address.

Hardware Address = ip_address & 0xff

 

Posted Date: 8/1/2012 6:50:00 AM | Location : United States







Related Discussions:- Address resolution with closed-form computation, Assignment Help, Ask Question on Address resolution with closed-form computation, Get Answer, Expert's Help, Address resolution with closed-form computation Discussions

Write discussion on Address resolution with closed-form computation
Your posts are moderated
Related Questions
QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern