Routing tables and address masks, Computer Network Security

ROUTING TABLES AND ADDRESS MASKS

Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address mask describes how many bits of address are in prefix. Prefix describes how much of address used to check network.

 For example, class B mask is 255.0.0.0 which is needed for subnetting. A routing table with address masks is given in the figure below:

 

1882_ROUTING TABLES AND ADDRESS MASKS.png

Posted Date: 8/1/2012 7:59:28 AM | Location : United States







Related Discussions:- Routing tables and address masks, Assignment Help, Ask Question on Routing tables and address masks, Get Answer, Expert's Help, Routing tables and address masks Discussions

Write discussion on Routing tables and address masks
Your posts are moderated
Related Questions

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M