Advantages - point to point , Computer Networking

Advantages

There are  times when  using  packet filters makes  sense. If the  connections require high  throughput  or the protocols  has proprietary technology that makes  it not  compatibles with  other  firewall  technologies  a packet filtering firewall   might  be in order. Although packet  filters have limitations they  also have the followings  advantage over other  firewall  technologies.

a.Compatibility packet  filters  do not modify the packet stream so they works with any  protocols.

b.Performance packet filters are very fast since they look only at the headers.

c.Scalability since  packets  filters are simple  it is easy to scale the solution.

Posted Date: 3/19/2013 12:19:07 AM | Location : United States







Related Discussions:- Advantages - point to point , Assignment Help, Ask Question on Advantages - point to point , Get Answer, Expert's Help, Advantages - point to point Discussions

Write discussion on Advantages - point to point
Your posts are moderated
Related Questions
Q. Explain Stop--and--Wait automatic repeat request? 1. Numbering frames prevents the retaining off duplicate frames. 2. Numbered acknowledgement are needed in case of delay

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no


Q. Show Example on Check Sum? Data: 10101001 00111001 Computing Checksum: 10101001 00111001 --------------- Sum 11100010 Receiver Side: 10101


Internet  Mail Access Protocol Another  mail access  protocols  is internet  mail access  protocols  version 4 (  IMAP4). IMAP4 is  similar to POP3 but it  has more  feature

Which layer is responsible for coordinating communication between systems Ans) The Session layer performs the following: Responsible for establishing and maintaining connections

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE