Processing an incoming arp message, Computer Network Security

PROCESSING AN INCOMING ARP MESSAGE

When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's addresses binding and checks to see if It is represent in the cache. If not, it modifies the cache.

 

 The receiver calculates the operation field of the message to calculate whether the message is a response or a request. If the message is a request, the receiver compares the field TARGET PADDR with the local protocol address. If the two are same, the computer is the target of the request and must transmit an ARP response.

 

Posted Date: 8/1/2012 7:29:57 AM | Location : United States







Related Discussions:- Processing an incoming arp message, Assignment Help, Ask Question on Processing an incoming arp message, Get Answer, Expert's Help, Processing an incoming arp message Discussions

Write discussion on Processing an incoming arp message
Your posts are moderated
Related Questions
ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

what are the participant of marketing channal?

Explain the architecture of ISDN.....?