Address resolution with message exchange, Computer Network Security

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE

An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across a network and gets a reply. The message takes a request that species the protocol address and reply carries the corresponding hardware address.

 In that type there are two possible functions:

  • Centralized
  • Distributed

 

CENTRALIZED:

 A network adds one or more networks that are given the task of answering address resolution requests. It has an advantage that resolution is simpler to manage, configure and control.

DISTRIBUTED:

 Every computer on the network participates in address resolution by agreeing to result resolution request for its physical address. It also has an advantage that address resolution networks can become a bottleneck and reduce price.

 

Posted Date: 8/1/2012 6:51:07 AM | Location : United States







Related Discussions:- Address resolution with message exchange, Assignment Help, Ask Question on Address resolution with message exchange, Get Answer, Expert's Help, Address resolution with message exchange Discussions

Write discussion on Address resolution with message exchange
Your posts are moderated
Related Questions
#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca