Address resolution with message exchange, Computer Network Security

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE

An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across a network and gets a reply. The message takes a request that species the protocol address and reply carries the corresponding hardware address.

 In that type there are two possible functions:

  • Centralized
  • Distributed

 

CENTRALIZED:

 A network adds one or more networks that are given the task of answering address resolution requests. It has an advantage that resolution is simpler to manage, configure and control.

DISTRIBUTED:

 Every computer on the network participates in address resolution by agreeing to result resolution request for its physical address. It also has an advantage that address resolution networks can become a bottleneck and reduce price.

 

Posted Date: 8/1/2012 6:51:07 AM | Location : United States







Related Discussions:- Address resolution with message exchange, Assignment Help, Ask Question on Address resolution with message exchange, Get Answer, Expert's Help, Address resolution with message exchange Discussions

Write discussion on Address resolution with message exchange
Your posts are moderated
Related Questions
Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

CRC in matlab

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po


QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.