Address resolution with message exchange, Computer Network Security

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE

An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across a network and gets a reply. The message takes a request that species the protocol address and reply carries the corresponding hardware address.

 In that type there are two possible functions:

  • Centralized
  • Distributed

 

CENTRALIZED:

 A network adds one or more networks that are given the task of answering address resolution requests. It has an advantage that resolution is simpler to manage, configure and control.

DISTRIBUTED:

 Every computer on the network participates in address resolution by agreeing to result resolution request for its physical address. It also has an advantage that address resolution networks can become a bottleneck and reduce price.

 

Posted Date: 8/1/2012 6:51:07 AM | Location : United States







Related Discussions:- Address resolution with message exchange, Assignment Help, Ask Question on Address resolution with message exchange, Get Answer, Expert's Help, Address resolution with message exchange Discussions

Write discussion on Address resolution with message exchange
Your posts are moderated
Related Questions
Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Need Assignemnt help in Information security assignemnt

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

How safe is the encryption of virtual private networks?

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni