Routing tables and address masks, Computer Network Security

ROUTING TABLES AND ADDRESS MASKS

Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address mask describes how many bits of address are in prefix. Prefix describes how much of address used to check network.

 For example, class B mask is 255.0.0.0 which is needed for subnetting. A routing table with address masks is given in the figure below:

 

1882_ROUTING TABLES AND ADDRESS MASKS.png

Posted Date: 8/1/2012 7:59:28 AM | Location : United States







Related Discussions:- Routing tables and address masks, Assignment Help, Ask Question on Routing tables and address masks, Get Answer, Expert's Help, Routing tables and address masks Discussions

Write discussion on Routing tables and address masks
Your posts are moderated
Related Questions
Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op