Locality of reference , Computer Network Security

LOCALITY OF REFERENCE PRINCIPLE:

 Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows:

a) Spatial locality of reference

b) Temporal locality of reference

a) SPATIAL LOCALITY OF REFERENCE:

In this pattern devices are likely to interact with other computers that are located

nearby.

b) TEMPORAL LOCALITY OF REFERENCE:

In this pattern computers are likely to interact with the same computers repeatedly. Thus LANs are very effective because of spatial locality of reference. Temporal locality of reference can give insight into which devices could be on a LAN.

 

Posted Date: 7/30/2012 6:44:50 AM | Location : United States







Related Discussions:- Locality of reference , Assignment Help, Ask Question on Locality of reference , Get Answer, Expert's Help, Locality of reference Discussions

Write discussion on Locality of reference
Your posts are moderated
Related Questions
how to access tomcat by internet

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m