Routing tables and address masks, Computer Network Security

ROUTING TABLES AND ADDRESS MASKS

Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address mask describes how many bits of address are in prefix. Prefix describes how much of address used to check network.

 For example, class B mask is 255.0.0.0 which is needed for subnetting. A routing table with address masks is given in the figure below:

 

1882_ROUTING TABLES AND ADDRESS MASKS.png

Posted Date: 8/1/2012 7:59:28 AM | Location : United States







Related Discussions:- Routing tables and address masks, Assignment Help, Ask Question on Routing tables and address masks, Get Answer, Expert's Help, Routing tables and address masks Discussions

Write discussion on Routing tables and address masks
Your posts are moderated
Related Questions
Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

discuss the merits and demerits of computers freezing

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi