Address resolution with message exchange, Computer Network Security

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE

An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across a network and gets a reply. The message takes a request that species the protocol address and reply carries the corresponding hardware address.

 In that type there are two possible functions:

  • Centralized
  • Distributed

 

CENTRALIZED:

 A network adds one or more networks that are given the task of answering address resolution requests. It has an advantage that resolution is simpler to manage, configure and control.

DISTRIBUTED:

 Every computer on the network participates in address resolution by agreeing to result resolution request for its physical address. It also has an advantage that address resolution networks can become a bottleneck and reduce price.

 

Posted Date: 8/1/2012 6:51:07 AM | Location : United States







Related Discussions:- Address resolution with message exchange, Assignment Help, Ask Question on Address resolution with message exchange, Get Answer, Expert's Help, Address resolution with message exchange Discussions

Write discussion on Address resolution with message exchange
Your posts are moderated
Related Questions
Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli