Arp responses, Computer Network Security

ARP RESPONSES

Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP message. The Ethernet standard substance that the type field in an Ethernet frame carrying an ARP data packet must has the hexadecimal value 0 x 806, as given in the figure below.

 

396_ARP RESPONSES.png

 

CASHING ARP RESPONSES:

Although message interchange can be used to bind addresses, sending a request for every binding is hopelessly not efficient. To remove network traffic, ARP software saves and extracts the information from a response so  that it may be used for subsequent data packets. ARP manages the Table as a cache short-term memory.

 

Posted Date: 8/1/2012 7:16:25 AM | Location : United States







Related Discussions:- Arp responses, Assignment Help, Ask Question on Arp responses, Get Answer, Expert's Help, Arp responses Discussions

Write discussion on Arp responses
Your posts are moderated
Related Questions
DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

what is computer network?

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its