Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
Douglas Jacobsonamazon.com
Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
destination. This discovery protocol can be a source of attack, which will be discussed in Part II of the book.
Often the two computers with the same IP address will detect each other and report an error. If the two computers are not in the same network, then the computer on the network defined by the destination IP address will get the packet.
Also, Part II discusses methods that can be used to change the hardware address of a device or to ignore the address filter and read all packets on the network.