Routing tables and address masks, Computer Network Security

ROUTING TABLES AND ADDRESS MASKS

Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address mask describes how many bits of address are in prefix. Prefix describes how much of address used to check network.

 For example, class B mask is 255.0.0.0 which is needed for subnetting. A routing table with address masks is given in the figure below:

 

1882_ROUTING TABLES AND ADDRESS MASKS.png

Posted Date: 8/1/2012 7:59:28 AM | Location : United States







Related Discussions:- Routing tables and address masks, Assignment Help, Ask Question on Routing tables and address masks, Get Answer, Expert's Help, Routing tables and address masks Discussions

Write discussion on Routing tables and address masks
Your posts are moderated
Related Questions
Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

IPV6 NEXT HEADER It is given in the figure below:

Ask question #Minimum 100 words are there non parasitic viruses