Locality of reference , Computer Network Security

LOCALITY OF REFERENCE PRINCIPLE:

 Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows:

a) Spatial locality of reference

b) Temporal locality of reference

a) SPATIAL LOCALITY OF REFERENCE:

In this pattern devices are likely to interact with other computers that are located

nearby.

b) TEMPORAL LOCALITY OF REFERENCE:

In this pattern computers are likely to interact with the same computers repeatedly. Thus LANs are very effective because of spatial locality of reference. Temporal locality of reference can give insight into which devices could be on a LAN.

 

Posted Date: 7/30/2012 6:44:50 AM | Location : United States







Related Discussions:- Locality of reference , Assignment Help, Ask Question on Locality of reference , Get Answer, Expert's Help, Locality of reference Discussions

Write discussion on Locality of reference
Your posts are moderated
Related Questions
Describe the process a proposed standard goes through to become an RFC

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?