Arp responses, Computer Network Security

ARP RESPONSES

Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP message. The Ethernet standard substance that the type field in an Ethernet frame carrying an ARP data packet must has the hexadecimal value 0 x 806, as given in the figure below.

 

396_ARP RESPONSES.png

 

CASHING ARP RESPONSES:

Although message interchange can be used to bind addresses, sending a request for every binding is hopelessly not efficient. To remove network traffic, ARP software saves and extracts the information from a response so  that it may be used for subsequent data packets. ARP manages the Table as a cache short-term memory.

 

Posted Date: 8/1/2012 7:16:25 AM | Location : United States







Related Discussions:- Arp responses, Assignment Help, Ask Question on Arp responses, Get Answer, Expert's Help, Arp responses Discussions

Write discussion on Arp responses
Your posts are moderated
Related Questions
INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared