Routing tables and address masks, Computer Network Security

ROUTING TABLES AND ADDRESS MASKS

Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address mask describes how many bits of address are in prefix. Prefix describes how much of address used to check network.

 For example, class B mask is 255.0.0.0 which is needed for subnetting. A routing table with address masks is given in the figure below:

 

1882_ROUTING TABLES AND ADDRESS MASKS.png

Posted Date: 8/1/2012 7:59:28 AM | Location : United States







Related Discussions:- Routing tables and address masks, Assignment Help, Ask Question on Routing tables and address masks, Get Answer, Expert's Help, Routing tables and address masks Discussions

Write discussion on Routing tables and address masks
Your posts are moderated
Related Questions
Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

How much would it cost to have a project completed by tomorrow night?

define .

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct