Address resolution with message exchange, Computer Network Security

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE

An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across a network and gets a reply. The message takes a request that species the protocol address and reply carries the corresponding hardware address.

 In that type there are two possible functions:

  • Centralized
  • Distributed

 

CENTRALIZED:

 A network adds one or more networks that are given the task of answering address resolution requests. It has an advantage that resolution is simpler to manage, configure and control.

DISTRIBUTED:

 Every computer on the network participates in address resolution by agreeing to result resolution request for its physical address. It also has an advantage that address resolution networks can become a bottleneck and reduce price.

 

Posted Date: 8/1/2012 6:51:07 AM | Location : United States







Related Discussions:- Address resolution with message exchange, Assignment Help, Ask Question on Address resolution with message exchange, Get Answer, Expert's Help, Address resolution with message exchange Discussions

Write discussion on Address resolution with message exchange
Your posts are moderated
Related Questions
(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

what is hacking

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

how can i start thesis? Please mention so of examples?