Locality of reference , Computer Network Security

LOCALITY OF REFERENCE PRINCIPLE:

 Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows:

a) Spatial locality of reference

b) Temporal locality of reference

a) SPATIAL LOCALITY OF REFERENCE:

In this pattern devices are likely to interact with other computers that are located

nearby.

b) TEMPORAL LOCALITY OF REFERENCE:

In this pattern computers are likely to interact with the same computers repeatedly. Thus LANs are very effective because of spatial locality of reference. Temporal locality of reference can give insight into which devices could be on a LAN.

 

Posted Date: 7/30/2012 6:44:50 AM | Location : United States







Related Discussions:- Locality of reference , Assignment Help, Ask Question on Locality of reference , Get Answer, Expert's Help, Locality of reference Discussions

Write discussion on Locality of reference
Your posts are moderated
Related Questions
Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the



(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Let me know the details of protocol tcp/ip

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t