Address resolution with closed-form computation, Computer Network Security

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION

For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible. A resolver is used to compute a mathematical operation that maps an IP address to a machine address.

 

 When a device connects to a network that uses configurable address, the local network administrator must select a hardware address as well as an IP address. The two values can be selected to create address resolution trivial. Let's take an example.

EXAMPLE:

 

 Consider a configurable network number:

220.123.5.0/22

The IP address of first receiver = 220.123.5.1

Hardware Address = 1

The IP address of second receiver = 220.123.5.2

Hardware Address = 2

The IP address of router = 220.123.5.102

Hardware Address = 102

A simple Boolean 'and' operation can calculate the computer's hardware address.

Hardware Address = ip_address & 0xff

 

Posted Date: 8/1/2012 6:50:00 AM | Location : United States







Related Discussions:- Address resolution with closed-form computation, Assignment Help, Ask Question on Address resolution with closed-form computation, Get Answer, Expert's Help, Address resolution with closed-form computation Discussions

Write discussion on Address resolution with closed-form computation
Your posts are moderated
Related Questions
(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (


BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Need Assignemnt help in Information security assignemnt

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.


which is best algorithm