Locality of reference , Computer Network Security

LOCALITY OF REFERENCE PRINCIPLE:

 Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows:

a) Spatial locality of reference

b) Temporal locality of reference

a) SPATIAL LOCALITY OF REFERENCE:

In this pattern devices are likely to interact with other computers that are located

nearby.

b) TEMPORAL LOCALITY OF REFERENCE:

In this pattern computers are likely to interact with the same computers repeatedly. Thus LANs are very effective because of spatial locality of reference. Temporal locality of reference can give insight into which devices could be on a LAN.

 

Posted Date: 7/30/2012 6:44:50 AM | Location : United States







Related Discussions:- Locality of reference , Assignment Help, Ask Question on Locality of reference , Get Answer, Expert's Help, Locality of reference Discussions

Write discussion on Locality of reference
Your posts are moderated
Related Questions
QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

define .

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)