StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Simulation of Address Resolution Protocol - Dissertation Example

Cite this document
Summary
The dissertation "Simulation of Address Resolution Protocol" explains that anytime a router, needs to find the physical address of another host or router on its network, it sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Simulation of Address Resolution Protocol
Read Text Preview

Extract of sample "Simulation of Address Resolution Protocol"

Download file to see previous pages

HTYPE (Hardware Type). This is a 16-bit field defining the type of the network on which ARP is running. Each LAN has been assigned an integer based on its type. For example, Ethernet is given the type 1. ARP can be used on any physical network. PTYPE (Protocol Type). This is a 16-bit field defining the protocol. For example, the value of this field for the IPv4 protocol is 080016. ARP can be used with any higher-level protocol. HLEN (Hardware Length). This is an 8-bit field defining the length of the physical address in bytes.

For example, for Ethernet, the value is 6. PLEN (Protocol Length). This is an 8-bit field defining the length of the logical address in bytes. For example, for the IPv4 protocol, the value is 4. OPER (Operation). This is a 16-bit field defining the type of packet. Two packet types are defined: 1 for ARP request and 2 for ARP reply. SHA (Sender Hardware Address). This is a variable-length field defining the physical address of the sender. For example. For Ethernet this field is 6 bytes long and contains the MAC address of sender.

SPA (Sender Protocol Address). This is a variable-length field defining the logical (for example, IP) address of the sender. For the IP protocol, this field is 4 bytes long. THA (Target Hardware Address). This is a variable-length field defining the physical address of the target. For example, for Ethernet, this field is 6 bytes long. For an ARP request message, this field is all 0s because the sender does not know the physical address of the target.. ARP can be used with any higher-level protocol.

HLEN (Hardware Length). This is an 8-bit field defining the length of the physical address in bytes. For example, for Ethernet, the value is 6.PLEN (Protocol Length). This is an 8-bit field defining the length of the logical address in bytes. For example, for the IPv4 protocol, the value is 4.OPER (Operation). This is a 16-bit field defining the type of packet. Two packet types are defined: 1 for ARP request and 2 for ARP reply.SHA (Sender Hardware Address). This is a variable-length field defining the physical address of the sender.

For example. For Ethernet this field is 6 bytes long and contains the MAC address of sender.SPA (Sender Protocol Address). This is a variable-length field defining the logical (for example, IP) address of the sender. For the IP protocol, this field is 4 bytes long.THA (Target Hardware Address). This is a variable-length field defining the physical address of the target. For example, for Ethernet, this field is 6 bytes long. For an ARP request message, this field is all 0s because the sender does not know the physical address of the target.

TPA (Target Protocol Address). This is a variable-length field defining the logical (for example, IP) address of the target. For the IPv4 protocol, this field is 4 bytes long.Encapsulation:An ARP packet is encapsulated directly into a data link frame. For example, an ARP packet is encapsulated in an Ethernet frame.Operation:Let us see how ARP functions on a typical internet. First, the steps involved have been described, then the four cases in which a host or router needs to use ARP have been discussed.

STEPS INVOLVED.These are the steps involved in an ARP process:1. The

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Simulation of Address Resolution Protocol Dissertation”, n.d.)
Simulation of Address Resolution Protocol Dissertation. Retrieved from https://studentshare.org/information-technology/1531904-simulation-of-address-resolution-protocol
(Simulation of Address Resolution Protocol Dissertation)
Simulation of Address Resolution Protocol Dissertation. https://studentshare.org/information-technology/1531904-simulation-of-address-resolution-protocol.
“Simulation of Address Resolution Protocol Dissertation”, n.d. https://studentshare.org/information-technology/1531904-simulation-of-address-resolution-protocol.
  • Cited: 0 times

CHECK THESE SAMPLES OF Simulation of Address Resolution Protocol

Web Security

There are several protocols, which are used in this network layer commonly known as internet protocol (Blaze et al, 1996; Blaze et al, 1999).... In many cases, the standard protocol technique, which is employed by the IPSEC, involves summarizing a coded network layer-packet, which is usually placed on a standard network packet, which normally makes the encryption more vivid to the transitional protuberances, which must process packet headers for the drive of routing....
6 Pages (1500 words) Essay

Two Vulnerabilities That Have Been Discovered in the Past Two Years (BlackBerry, Cisco IOS Software)

Moreover, the discussion will be based upon the vulnerability issues that had taken place in the BlackBerry Enterprise Server and multiple vulnerabilities within the translation process of various protocols that were found in the network address translation of Cisco IOS Software.... Network address Translation Vulnerabilities in Cisco IOS Software The Cisco IOS Software Network address Translation (NAT) attribute...
6 Pages (1500 words) Essay

Computer Communication

The paper "Computer Communication" tells us about the system of transferring information.... It is the exchange of information and ideas from one person to another and from one place to another.... There are so many methods of transferring information and ideas by communicating in many different languages....
21 Pages (5250 words) Essay

Definition and Characteristics of Mobile IP

This kind of "indirect routing" is inefficient and undesirable; Too many unwanted duplicated fields in "IP within IP": The way to encapsulate the datagram is to put the original datagram (= IP header + payload) inside another IP envelope, of which the whole packet = outer IP header (Care-of address) + original datagram.... In this context it has been stated by Mobile IP Overview (2006) that the common problems related with the Mobile IP technology can be classified in the following categories: Indirect routing: Consider that if a mobile node happens to move to the same subnetwork as its correspondent node that wants to send it datagrams, this is what will happen for the datagram to be received by the mobile node, based on the base Mobile IP protocol: the correspondent node will send the datagram to the mobile node's home agent, which may be a half globe away; its home agent will then forward the datagram to its care-of-address, which might just take a half-second to reach if the datagram is sent directly from the correspondent node....
22 Pages (5500 words) Essay

Human Rights Movements in International Politics and its Effect on State Behaviour

The nefarious activities of some unscrupulous groups or individuals perpetuated against those who are helpless to fight back or are left without resources to wage a campaign have propelled human rights movements to take more proactive stance to protect and defend human rights.... … Governments as vanguard of civil liberties are supposed to protect and promote the general welfare of its citizens however even governments are not immune to allegations of human rights violations....
11 Pages (2750 words) Research Paper

Techniques That Use Bandwidth Aggregation to Increase Bandwidth

Cisco introduced a standard based on bandwidth aggregation, it is the protocol named EtherChannel that works between LAN (Local Area Network) switches [1].... PPP (Point to Point protocol) is extended into a new form as PPP multilink protocols (MP).... The main focus of the literature review refers to exploration of Bandwidth aggregation techniques, methods and ways....
15 Pages (3750 words) Literature review

Common Use IP Networks: Should They Be Implemented in a Mall

"Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall.... This report provides a comprehensive overview of the main implementation overview of the IP Network at Mall.... hellip; I have outlined the main working and handling areas that can be handled through this system....
9 Pages (2250 words) Coursework

XP Windows Operating Systems

DEP and ASLR Two of the common features in this operating system are the Data Execution Prevention commonly known as DEP and address Space Layout Randomization also known as ASLR.... … The paper "XP Windows Operating Systems" is an engrossing example of coursework on logic and programming....
18 Pages (4500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us