Locality of reference , Computer Network Security

LOCALITY OF REFERENCE PRINCIPLE:

 Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows:

a) Spatial locality of reference

b) Temporal locality of reference

a) SPATIAL LOCALITY OF REFERENCE:

In this pattern devices are likely to interact with other computers that are located

nearby.

b) TEMPORAL LOCALITY OF REFERENCE:

In this pattern computers are likely to interact with the same computers repeatedly. Thus LANs are very effective because of spatial locality of reference. Temporal locality of reference can give insight into which devices could be on a LAN.

 

Posted Date: 7/30/2012 6:44:50 AM | Location : United States







Related Discussions:- Locality of reference , Assignment Help, Ask Question on Locality of reference , Get Answer, Expert's Help, Locality of reference Discussions

Write discussion on Locality of reference
Your posts are moderated
Related Questions
on LAN,where are IP datagrams transported?

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

SDES encryption and decryption

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change