This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.

a. firewall b. NAT c. DHCP d. DMZ